Printer Friendly

Information Risk and Security: Preventing and Investigating Workplace Computer Crime.


Information risk and security; preventing and investigating workplace computer crime.

Wilding, Edward.

Ashgate Publishing Co.


341 pages




In the world of information technology security, much time and effort is spent making sure outside threats cannot gain access to organizational networks and information. While a necessary task, it neglects to account for threats from within organizations, such as employees, contractors, and other insiders who may be corrupt, criminal, or merely incompetent. It is upon these insider risks that Wilding (co-founder of Data Genetics International, a company specializing in computer crime investigation, incident response, and forensic evidence) concentrates. He offers chapters discussing perception of risk; computer fraud; espionage, intellectual property theft, and leaks; password misuse; trash risk; wireless risk; sabotage, extortion, and blackmail; social engineering; risks with personal computers; pornography; anonymous letters; press leaks; incident response; ground rules on computer evidence; covert operations; analysis of audit trails and event logs; investigative resources; the use computer evidence in court; and employee exit procedures.

([c]20062005 Book News, Inc., Portland, OR)
COPYRIGHT 2006 Book News, Inc.
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2006 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Publication:Reference & Research Book News
Article Type:Book Review
Date:Aug 1, 2006
Previous Article:The Social Construction of Intellectual Disability.
Next Article:Ben-Gurion's Political Struggles: 1963-1967, a Lion in Winter.

Related Articles
Computer Crimes: High-Tech Theft.
Automated Crime Information Systems.
High-Technology Crime.
Investigating Computer Crime.
Investigating Computer Crime.
Workplace Violence: A Continuum from Threat to Death.
e-Policy: How to Develop Computer, E-Mail, and Internet Guidelines to Protect Your Company and Its Assets.
Understanding and preventing car theft.
Integrating employee health; a model program for NASA.
Peter W. Greenwood, Changing Lives: Delinquency Prevention as Crime Control Policy.

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters