Information Risk and Security: Preventing and Investigating Workplace Computer Crime.
0566086859Information risk and security; preventing and investigating workplace computer crime.
Wilding, Edward.
Ashgate Publishing Co.
2006
341 pages
$144.95
Hardcover
HV6773
In the world of information technology security, much time and effort is spent making sure outside threats cannot gain access to organizational networks and information. While a necessary task, it neglects to account for threats from within organizations, such as employees, contractors, and other insiders who may be corrupt, criminal, or merely incompetent. It is upon these insider risks that Wilding (co-founder of Data Genetics International, a company specializing in computer crime investigation, incident response, and forensic evidence) concentrates. He offers chapters discussing perception of risk; computer fraud; espionage, intellectual property theft, and leaks; password misuse; trash risk; wireless risk; sabotage, extortion, and blackmail; social engineering; risks with personal computers; pornography; anonymous letters; press leaks; incident response; ground rules on computer evidence; covert operations; analysis of audit trails and event logs; investigative resources; the use computer evidence in court; and employee exit procedures.
([c]20062005 Book News, Inc., Portland, OR)
![]() ![]() ![]() ![]() | |
Publication: | Reference & Research Book News |
---|---|
Article Type: | Book Review |
Date: | Aug 1, 2006 |
Words: | 173 |
Previous Article: | The Social Construction of Intellectual Disability. |
Next Article: | Ben-Gurion's Political Struggles: 1963-1967, a Lion in Winter. |
Topics: |