Back to School Savings: Save up to 30% on print books and eBooks. No promo code needed.
Back to School Savings: Save up to 30%
Computers, Business, and Security
The New Role for Security
1st Edition - February 19, 1987
Author: James A Schweitzer
9 7 8 - 1 - 4 8 3 1 - 4 4 8 9 - 4
Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating… Read more
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code is needed.
Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind. This book discusses the technological aspects of the total security programs.
Organized into three parts encompassing 10 chapters, this book begins with an overview of how the developing information age is affecting business management, operations, and organization. This text then examines a number of vulnerabilities that arise in the process of using business computing and communications systems. Other chapters consider the integration of electronic information technology into the security function. This book discusses as well the need for the integration of computing technology into the business security staff. The final chapter deals with the structure of the security program and explains the components of the overall security responsibility. This book is a valuable resource for professional business security managers, systems administrators, and software/hardware maintenance specialists.
PrefacePart I The Computer and Security in the Information Age Chapter 1 Managing Security in the Information Age The Five Critical Tasks Implications for Business Security Chapter 2 Computers and Security Risks in Using Computers Applying Information Security Technology Defining Preferred Protection Methods Levels of Protection Protecting Mental Information Protecting Written Information Protecting Electronic Information The Technology of Attack Causes of Security Violations Protection Measures SummaryPart II The Five Critical Tasks Chapter 3 Critical Task 1: Integrating Computing into the Security Function Technical Competence on the Security Staff Selecting the Right Person Job Assignments Electronic Security Tasks Electronic Information Security Standards Chapter 4 Critical Task 2: Integrating Technology into the Security Function Ultrasonics Sensing Technologies Video Control Systems Biometrics and Smart Cards Electronic Surveillance and Countermeasures Radio Wave Interception System Integration Chapter 5 Critical Task 3: Adapting the Business Security Management Process to Information Age Requirements Information Application Reduction of Overhead, Improvement of Quality, Return on Assets Making Security Investment Decisions Security Strategy as a Basis for Choice Chapter 6 Critical Task 4: Protecting the Business Information Resource Background A Beginning Information Resource Management Attributes of Quality Information Implementing Information Resource Management Security Roles in Information Resource Management Classification of Information Setting Policy Regulations Covering Classification General Guidelines Classification References Chapter 7 Critical Task 5: Establishing Security as an Essential Management Function The Security Manager as Business Executive Establishing Leadership among Peers in the Company The Security Manager and Senior Executive Management Executive Management Characteristics Considerations: The Security Manager and Executive Management Risk Management Concepts: A FrameworkPart III Securing Today's Business Chapter 8 Putting It Together: A Security Program for the Information Age Program Assumptions and Requirements The Security Manager as a Business Manager The Right Security Product Making Competent Technology Decisions Demonstrating a Contribution Security Organization for the Information Age Principles of Security Organization Organizational Alternatives Planning Setting the Security Organizational Structure Rules of Thumb for Security Organization Implementing the Security Program Getting the Security Message to the People The Security Coordinator Network The Security Coordinator's Tasks Security Coordinator Selection, Training, and Motivation Chapter 9 Business Security Operations in the Information Age Leadership Working Relationships The Core Functions Support to Unit or Local Security Activities Training The Security Career Path Unit or Local Responsibilities Chapter 10 Security Policies and Standards Policy Standards or Procedures Details for Security Standards Preparing the Standards Organization of the Standards An Illustrative Electronic Information Security Standard Sample StandardsAppendix A A Primer on ComputingAppendix B Sample Information Security PolicyAppendix C Sample Electronic Security ReviewAppendix D A Glossary of Technology TermsReferencesIndex