Over 10 mio. titler Fri fragt ved køb over 499,- Hurtig levering Forlænget returret til 31/01/25

Information Governance and Security

- Protecting and Managing Your Company’s Proprietary Information

  • Format
  • Bog, paperback
  • Engelsk

Beskrivelse

Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization’s most important asset—its proprietary information—safe from cyber and physical compromise. Many intrusions can be prevented if appropriate precautions are taken, and this book establishes the enterprise-level systems and disciplines necessary for managing all the information generated by an organization. In addition, the book encompasses the human element by considering proprietary information lost, damaged, or destroyed through negligence. By implementing the policies and procedures outlined in Information Governance and Security, organizations can proactively protect their reputation against the threats that most managers have never even thought of.

Læs hele beskrivelsen
Detaljer
Størrelse og vægt
  • Vægt270 g
  • coffee cup img
    10 cm
    book img
    15,2 cm
    22,9 cm

    Findes i disse kategorier...

    Se andre, der handler om...

    Internet Software Access Revision Virus DOS Firewalls CIA Surfing Training Encryption Automation Small-business Security-breach Communication Corporate responsibility Culture Databases. Efficiency Evaluation Guidelines Information technology Operating systems Risk management Prevention Voice Negligence Alteration Passwords Costs Detection Testing Hardware Spyware Storage Transparency Recovery Compliance Business travel Confidentiality Identity theft Communications Social engineering Phishing Accountability Hacking Policies Security Social media Balance Implementation Legal Assessment Big data Private Sector Laws profitability Network Personal Certificates cyber Healthcare Legal issues Human Organizational Legal Management Résolution Cybercrime VPN Portable device Decision-makers Business Continuity Strengths Pharming Portable Devices White hat Password Management Black-Hat Data Assessment Physical Security E-Discovery Bit Security Methods Need to know Tailgating Senior management HIPAA Spoofing Non-Profit Information governance Mobile devices Malware External Threats Profits Vendor Management Cloud Corporate espionage Effort APPROACHES Productivity Weaknesses Finance Management Board of directors Managing risk Updating Data breach Insider Threats Considerations Privacy rights Need Cyber-crime Skimming Compliance Regulation Predictive Coding Business Size Penalties Vishing Disgruntled employees Terabyte Spear Phishing Negative perceptions Sensitive Information accidental Access Badges Benefits baiting Blue Hacking Blue Snarfing Child ID Theft Client Confidence Code Names for Projects Brontobyte Cost of a Breach Disorganization Breach Notification Employee Backgrounds Employment Agreement Employment Fraud ID Theft Financial ID Theft Committee for Information Governance Employee Security Continuing Efforts Governmental Benefits ID Theft Criminal ID Driver's License ID Theft Exabyte Consumer Identity Theft Creation of Policies Criminal acts Hacking/Malware Gigabyte Determine Needs Hardware/network changes Internet and Online Access HITECH Act Kilobyte Key Words Lack of Information Governance Education Medical Benefits ID Mitigation of Risks malicious Marketing/Sales Megabyte Governmental Threats planning methods Privacy Act Petabyte Physical Acts insider threat Policy Revisions Internet Use Technology skills Tablets and smartphones Synthetic ID Theft Senior ID Theft Technology Upgrades Unintended Disclosure Zettabyte Non-Disclosure Agreements Not Following Laws Medium size business Overseas production Polices Phrases and Definitions Portable Data Storage Not Following Policies Notification Laws Pre-texting Social Media ID Theft Thumb Drives and Laptops Red Flag Payment Card Fraud Response Programs Physical Loss Yottabyte Transferring Data Social Security Number ID Theft Stationary Device Unauthorized Disclosure Termination of an Employee
    Machine Name: SAXO080