Computers at Risk

Computers at Risk

Author: National Research Council

Publisher: National Academies Press

Published: 1990-02-01

Total Pages: 320

ISBN-13: 0309043883

DOWNLOAD EBOOK

Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.


Fundamentals of Information Systems Security

Fundamentals of Information Systems Security

Author: David Kim

Publisher: Jones & Bartlett Publishers

Published: 2013-07-11

Total Pages: 569

ISBN-13: 1284031640

DOWNLOAD EBOOK

PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Revised and updated with the latest information from this fast-paced field, Fundamentals of Information System Security, Second Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transformation to a digital world, including a look at how business, government, and individuals operate today. Part 2 is adapted from the Official (ISC)2 SSCP Certified Body of Knowledge and presents a high-level overview of each of the seven domains within the System Security Certified Practitioner certification. The book closes with a resource for readers who desire additional material on information security standards, education, professional certifications, and compliance laws. With its practical, conversational writing style and step-by-step examples, this text is a must-have resource for those entering the world of information systems security. New to the Second Edition: - New material on cloud computing, risk analysis, IP mobility, OMNIBus, and Agile Software Development. - Includes the most recent updates in Information Systems Security laws, certificates, standards, amendments, and the proposed Federal Information Security Amendments Act of 2013 and HITECH Act. - Provides new cases and examples pulled from real-world scenarios. - Updated data, tables, and sidebars provide the most current information in the field.


Information Systems for Business and Beyond

Information Systems for Business and Beyond

Author: David T. Bourgeois

Publisher:

Published: 2014

Total Pages: 167

ISBN-13:

DOWNLOAD EBOOK

"Information Systems for Business and Beyond introduces the concept of information systems, their use in business, and the larger impact they are having on our world."--BC Campus website.


The Market Value of Information System (IS) Security

The Market Value of Information System (IS) Security

Author:

Publisher:

Published: 2012

Total Pages: 196

ISBN-13:

DOWNLOAD EBOOK

Understanding the financial value resulting from IS security investments is critically important to organizations focused on protecting service confidentiality, integrity, and availability in order to preserve firm revenues and reputations. Quantifying the financial effect from IS security investments is difficult to derive. This study investigated the relationship between e-banking investments in IS security and their market value impacts. Using an event study approach, the author captured e-banking firm specific data and isolated the IS security effect through the measured change in market values. The author hypothesized that announcements of IS security investments would result in statistically significant changes in market values. The author also hypothesized two sub-segments of the selected security investment data, technology and people, would support statistically significant changes in the market values of e-banking service providers. The hypotheses were tested by measuring stock market reactions to the IS security announcements selected from an eight-year period (2003-2010). Study findings indicated statistically significant market reactions for e-banking firms making IS security investment announcements and suggested that investors rewarded IS security technology investments more highly than e-banking firms making IS security people-focused investment announcements. The author concluded that because investors understand that mandatory regulatory compliance represents an e-banking firm's commitment to creating a secure computing environment, e-banking information systems are perceived as secure therefore, disclosing IS security investments results in weak changes to market values. Ultimately effective management of IS security requires acceptance of the idea that it is not technically feasible or financially viable to implement protections for all identified IS security risks therefore IS security investments must be effectively measured and risk levels consciously selected in order to implement the right technical and operational protections to support a firm's selected risk posture. The study contributes to the event study literature as well as the literature examining the economic effects of information systems security.


Information Security Evaluation

Information Security Evaluation

Author: Igli Tashi

Publisher: EPFL Press

Published: 2021-02-01

Total Pages: 216

ISBN-13: 2940222533

DOWNLOAD EBOOK

Information systems have become a critical element of every organization's structure. A malfunction of the information and communication technology (ICT) infrastructure can paralyze the whole organization and have disastrous consequences at many levels. On the other hand, modern businesses and organizations collaborate increasingly with companies, customers, and other stakeholders by technological means. This emphasizes the need for a reliable and secure ICT infrastructure for companies whose principal asset and added value is information. Information Security Evaluation.


Does It Matter?

Does It Matter?

Author: Nicholas G. Carr

Publisher: Harvard Business Press

Published: 2004-04-07

Total Pages: 193

ISBN-13: 1422129527

DOWNLOAD EBOOK

Over the last decade, and even since the bursting of the technology bubble, pundits, consultants, and thought leaders have argued that information technology provides the edge necessary for business success. IT expert Nicholas G. Carr offers a radically different view in this eloquent and explosive book. As IT's power and presence have grown, he argues, its strategic relevance has actually decreased. IT has been transformed from a source of advantage into a commoditized "cost of doing business"--with huge implications for business management. Expanding on Carr's seminal Harvard Business Review article that generated a storm of controversy, Does IT Matter? provides a truly compelling--and unsettling--account of IT's changing business role and its leveling influence on competition. Through astute analysis of historical and contemporary examples, Carr shows that the evolution of IT closely parallels that of earlier technologies such as railroads and electric power. He goes on to lay out a new agenda for IT management, stressing cost control and risk management over innovation and investment. And he examines the broader implications for business strategy and organization as well as for the technology industry. A frame-changing statement on one of the most important business phenomena of our time, Does IT Matter? marks a crucial milepost in the debate about IT's future. An acclaimed business writer and thinker, Nicholas G. Carr is a former executive editor of the Harvard Business Review.


Information Security

Information Security

Author: Seymour Goodman

Publisher: Taylor & Francis

Published: 2016-09-16

Total Pages: 297

ISBN-13: 1315288680

DOWNLOAD EBOOK

Information security is everyone's concern. The way we live is underwritten by information system infrastructures, most notably the Internet. The functioning of our business organizations, the management of our supply chains, and the operation of our governments depend on the secure flow of information. In an organizational environment information security is a never-ending process of protecting information and the systems that produce it.This volume in the "Advances in Management Information Systems" series covers the managerial landscape of information security. It deals with how organizations and nations organize their information security policies and efforts. The book covers how to strategize and implement security with a special focus on emerging technologies. It highlights the wealth of security technologies, and also indicates that the problem is not a lack of technology but rather its intelligent application.


Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security

Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security

Author: Gupta, Brij

Publisher: IGI Global

Published: 2016-05-16

Total Pages: 616

ISBN-13: 1522501061

DOWNLOAD EBOOK

Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world. However, with this increased usage comes heightened threats to security within digital environments. The Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention. Featuring theoretical perspectives, best practices, and future research directions, this handbook of research is a vital resource for professionals, researchers, faculty members, scientists, graduate students, scholars, and software developers interested in threat identification and prevention.


Management Information Systems

Management Information Systems

Author: Kenneth C. Laudon

Publisher: Pearson EducaciĆ³n

Published: 2004

Total Pages: 618

ISBN-13: 9789702605287

DOWNLOAD EBOOK

Management Information Systems provides comprehensive and integrative coverage of essential new technologies, information system applications, and their impact on business models and managerial decision-making in an exciting and interactive manner. The twelfth edition focuses on the major changes that have been made in information technology over the past two years, and includes new opening, closing, and Interactive Session cases.