Amazon cover image
Image from Amazon.com
Image from Google Jackets

Managing the human factor in information security : how to win over staff and influence business managers / David Lacey.

By: Material type: TextTextPublication details: Chichester, West Sussex, England ; Hoboken, NJ : Wiley, c2009.Description: xxiv, 374 p. ; 24 cmISBN:
  • 9780470721995
Subject(s): DDC classification:
  • 658.478   22
Contents:
Chapter 1: Power to the people -- Chapter 2: Everyone makes a difference -- Chapter 3: Thereâ ™s no such thing as an isolated incident -- Chapter 4: Zen and the art of risk management -- Chapter 5: Who can you trust? -- Chapter 6: Managing organization culture and politics -- Chapter 7: Designing effective awareness programs -- Chapter 8: Transforming organization attitudes and behavior -- Chapter 9: Gaining executive board and business buy-in -- Chapter 10: Designing security systems that work -- Chapter 11: Harnessing the power of the organization.
Summary: With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a security expert with more than 25 years' experience, this book examines how fundamental staff awareness is to establishing security and addresses such challenges as containing threats, managing politics, developing programs, and getting a business to buy into a security plan. Illustrated with real-world examples throughout, this is a must-have guide for security and IT professionals.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Books Books Main library General Stacks 658.478 / LA.M 2009 (Browse shelf(Opens below)) 1 Available 006590

Includes bibliographical references (p. 353-356) and index.

Chapter 1: Power to the people -- Chapter 2: Everyone makes a difference -- Chapter 3: Thereâ ™s no such thing as an isolated incident -- Chapter 4: Zen and the art of risk management -- Chapter 5: Who can you trust? -- Chapter 6: Managing organization culture and politics -- Chapter 7: Designing effective awareness programs -- Chapter 8: Transforming organization attitudes and behavior -- Chapter 9: Gaining executive board and business buy-in -- Chapter 10: Designing security systems that work -- Chapter 11: Harnessing the power of the organization.

With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a security expert with more than 25 years' experience, this book examines how fundamental staff awareness is to establishing security and addresses such challenges as containing threats, managing politics, developing programs, and getting a business to buy into a security plan. Illustrated with real-world examples throughout, this is a must-have guide for security and IT professionals.

1

There are no comments on this title.

to post a comment.