Examine les lois actuelles sur la criminalité informatique, discute des précautions de sécurité, de l'assurance criminalité et de la planification de la reprise après sinistre, et suggère des moyens de filtrer le personnel de traitement des données
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Vendeur : UHR Books, Hollis Center, ME, Etats-Unis
Hardcover. Etat : Near Fine. No Jacket. First Edition. Examines the human factor in computer crime, and its role in crime deterrence, prevention, detection, and risk assessment on the physical, hardward, software,and personnel security levels. Book. N° de réf. du vendeur 019363
Quantité disponible : 1 disponible(s)
Vendeur : Lowest Priced Quality Rare Books, Allison Park, PA, Etats-Unis
Hardcover. Etat : As New. Etat de la jaquette : Fine. 1st Edition. Appears un-read, Stated 1st printing, (PHOTOS ARE OF ACTUAL BOOK). N° de réf. du vendeur P-3/15-702
Quantité disponible : 1 disponible(s)
Vendeur : Past Pages, Oshawa, ON, Canada
Hard Cover. Etat : Fair. Etat de la jaquette : Good. First Edition 1st Printing. BOOK: Previous Owner Markings/Ex-Library; Front Free Endpaper Missing; Front, Rear Fixed Endpapers Pulled From Removal of Jacket Cover; Corners, Spine, Boards Bumped; Moderate Shelf Rub to Boards; Edges Lightly Soiled. DUST JACKET: Lightly Creased; Moderately Chipped; Moderate Fading to Spine Area Due to Sun Exposure; Moderate Yellowing Due to Age; In Archival Quality Jacket Cover. DESIGNED BY: Diane L. Backes. CONTENTS: ONE Introduction; TWO Establishing Computer Security; THREE Physical Security; FOUR Hardware Security; FIVE Software Security; SIX Personnel Security; SEVEN Contingency and Disaster Recovery Planning; EIGHT EDP Insurance; Glossary; Bibliography; Index. SYNOPSIS: "Computer crime costs American business at least $1 billion a year and could be as high as $10 billion per year."--The American Bar Association To appreciate the extent to which human factors play in computer crime, we have to be aware of its role in crime deterrence, prevention, detection, and risk assessment on the physical, hardware, software, and personnel security levels. Most DP installations have spent thousands and hundreds of thousands of dollars to secure their computer hardware and software, yet these two inanimate objects do not commit crimes, people do! This does not mean to imply that proper security measures should not be taken with hardware and software. Nevertheless, the human factor--an element often ignored by management and neglected by high technology technicians--is seldom considered in every aspect of computer security. The examples presented within this book will serve to separate the myth and the recent nationwide hype about outsiders being the greatest threat to business and government DP security. The truth is that insiders pose a far greater threat to the organization's computer security than outside "electronic invaders" possibly could. The reason is pure and simple. Insiders are familiar with their employer's DP operations and the type of data each system and application is storing and processing. Consequently they know where to look for specific data. And if they are in doubt, they can reference the systems' documentation which usually includes programming specifications, file and record layouts, a date element dictionary, and so on. But most significantly, insiders have or can get the password to access stored crucial information such as financial, marketing, manufacturing, technological, or research data unless proper prevention and detection measures are in effect. What is computer security? According to the experts, computer security is an umbrella that protects the organization's hardware and software, as well as the data and information processed by the computer, against abuse, fraud, embezzlement, sabotage, and intentional or accidental damage or natural disaster. The responsibility for protecting the company's computer systems belongs to the highest level of management. Only management can institute the rules, define their philosophy, and implement proper measures not only to secure the physical properties, but also personnel measures that will go a long way towards the deterrence of computer crime by an individual or groups of individuals. Our author, has created a list of "things" that management should follow to provide the maximum security for their installations. Throughout the entire text, Ms. Van Duyn stresses that the first step in deterrence and prevention of crime is management's willingness to accept the fact that people do and can commit crime. Julia Van Duyn is currently teaching Computer Security and Systems Analysis at Sacramento State College. Previously she was employed at a number of computer installations as a systems analyst and documentation specialist. She has written several books prior to this one. Size: 8vo - over 7¾" - 9¾" tall. Ex-Library. N° de réf. du vendeur 004017
Quantité disponible : 1 disponible(s)