LIMITED OFFER
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code needed.
This book provides a unique in–depth focus on how financial organizations and suppliers of computer security are currently addressing – in strategic terms – the problem of comput… Read more
LIMITED OFFER
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Written in an easy to read, non technical style the book is essential reading for all those involved in the management of this sensitive area, from computer security managers, financial directors and managers to analysts and designers in financial software houses.
The report analyses the computer security requirements of a wide variety of organizations in the financial services sector, ranging from retail, commercial and investment banks to financial trading and investment management organizations.
★ Prioritizing computer security
★ Computer security technology
★ Developing a strategic approach to computer security
★ Principal computer security hazards and responses
★ The physical access hazard
★ The electronic access hazard
★ A note on password security
★ The communications hazard
★ The systems shutdown hazard
★ Impact analysis
★ Contingency planning
★ Disaster recovery service options
★ "Hot" disaster recovery service
★ The electromagnetic induction hazard
★ Banking control mechanisms
★ Audit trails
★ Computer security – a personal view
★ Security at SWIFT
The Computer Criminal at Work.
A comprehensive examination of the factors that motivate computer criminals, plus examples of Computer Crimes.
Computer Security and the Law.
Covering legislation initiatives in the UK and USA and key enforcement agencies.
I: "Trouble Ahead: Information Crime & Jurisdiction". II: The Enforcers: The United States Secret Service ★ The City of London Police Fraud Department ★ The UK Serious Fraud Office ★ Kroll Associates. III: Computer Crime Legislation in the United States and UK.
Experts' Viewpoints.
Preventing Breaches in Computer Security.
This chapter summarizes the major findings of the report, and enables financial organizations to plan successfully their computer security policy. Guidelines for maximising Computer Security are also given.
Bibliography. Glossary. Index.