Computers, Business, and Security

Computers, Business, and Security

The New Role for Security

1st Edition - February 19, 1987

Write a review

  • Author: James A Schweitzer
  • eBook ISBN: 9781483144894

Purchase options

Purchase options
DRM-free (PDF)
Sales tax will be calculated at check-out

Institutional Subscription

Free Global Shipping
No minimum order

Description

Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind. This book discusses the technological aspects of the total security programs. Organized into three parts encompassing 10 chapters, this book begins with an overview of how the developing information age is affecting business management, operations, and organization. This text then examines a number of vulnerabilities that arise in the process of using business computing and communications systems. Other chapters consider the integration of electronic information technology into the security function. This book discusses as well the need for the integration of computing technology into the business security staff. The final chapter deals with the structure of the security program and explains the components of the overall security responsibility. This book is a valuable resource for professional business security managers, systems administrators, and software/hardware maintenance specialists.

Table of Contents


  • Preface

    Part I The Computer and Security in the Information Age

    Chapter 1 Managing Security in the Information Age

    The Five Critical Tasks

    Implications for Business Security

    Chapter 2 Computers and Security

    Risks in Using Computers

    Applying Information Security Technology

    Defining Preferred Protection Methods

    Levels of Protection

    Protecting Mental Information

    Protecting Written Information

    Protecting Electronic Information

    The Technology of Attack

    Causes of Security Violations

    Protection Measures

    Summary

    Part II The Five Critical Tasks

    Chapter 3 Critical Task 1: Integrating Computing into the Security Function

    Technical Competence on the Security Staff

    Selecting the Right Person

    Job Assignments

    Electronic Security Tasks

    Electronic Information Security Standards

    Chapter 4 Critical Task 2: Integrating Technology into the Security Function

    Ultrasonics

    Sensing Technologies

    Video

    Control Systems

    Biometrics and Smart Cards

    Electronic Surveillance and Countermeasures

    Radio Wave Interception

    System Integration

    Chapter 5 Critical Task 3: Adapting the Business Security Management Process to Information Age Requirements

    Information Application

    Reduction of Overhead, Improvement of Quality, Return on Assets

    Making Security Investment Decisions

    Security Strategy as a Basis for Choice

    Chapter 6 Critical Task 4: Protecting the Business Information Resource

    Background

    A Beginning

    Information Resource Management

    Attributes of Quality Information

    Implementing Information Resource Management

    Security Roles in Information Resource Management

    Classification of Information

    Setting Policy

    Regulations Covering Classification

    General Guidelines

    Classification References

    Chapter 7 Critical Task 5: Establishing Security as an Essential Management Function

    The Security Manager as Business Executive

    Establishing Leadership among Peers in the Company

    The Security Manager and Senior Executive Management

    Executive Management Characteristics

    Considerations: The Security Manager and Executive Management

    Risk Management Concepts: A Framework

    Part III Securing Today's Business

    Chapter 8 Putting It Together: A Security Program for the Information Age

    Program Assumptions and Requirements

    The Security Manager as a Business Manager

    The Right Security Product

    Making Competent Technology Decisions

    Demonstrating a Contribution

    Security Organization for the Information Age

    Principles of Security Organization

    Organizational Alternatives

    Planning

    Setting the Security Organizational Structure

    Rules of Thumb for Security Organization

    Implementing the Security Program

    Getting the Security Message to the People

    The Security Coordinator Network

    The Security Coordinator's Tasks

    Security Coordinator Selection, Training, and Motivation

    Chapter 9 Business Security Operations in the Information Age

    Leadership

    Working Relationships

    The Core Functions

    Support to Unit or Local Security Activities

    Training

    The Security Career Path

    Unit or Local Responsibilities

    Chapter 10 Security Policies and Standards

    Policy

    Standards or Procedures

    Details for Security Standards

    Preparing the Standards

    Organization of the Standards

    An Illustrative Electronic Information Security Standard

    Sample Standards

    Appendix A A Primer on Computing

    Appendix B Sample Information Security Policy

    Appendix C Sample Electronic Security Review

    Appendix D A Glossary of Technology Terms

    References

    Index

Product details

  • No. of pages: 166
  • Language: English
  • Copyright: © Butterworth-Heinemann 1987
  • Published: February 19, 1987
  • Imprint: Butterworth-Heinemann
  • eBook ISBN: 9781483144894

About the Author

James A Schweitzer

Ratings and Reviews

Write a review

There are currently no reviews for "Computers, Business, and Security"