Managing cyber-security resources : A cost-benefit analysis

Breaches in cybersecurity are on the rise. Between 1998 and 2003, reported cybersecurity incidents increased over thirty-fold. Well-publicized information security breaches have made cybersecurity a critical and timely topic for the general public, as well as for corporations, not-for-profit organiz...

Mô tả đầy đủ

Đã lưu trong:
Chi tiết về thư mục
Tác giả chính: Gorden, Lawrence A.
Định dạng: Sách
Ngôn ngữ:Undetermined
Được phát hành: New York McGraw-Hill 2006
Những chủ đề:
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
Thư viện lưu trữ: Trung tâm Học liệu Trường Đại học Cần Thơ
LEADER 02045nam a2200229Ia 4500
001 CTU_138356
008 210402s9999 xx 000 0 und d
020 |c 35.84 
082 |a 658.4 
082 |b G662 
100 |a Gorden, Lawrence A. 
245 0 |a Managing cyber-security resources : 
245 2 |b A cost-benefit analysis 
245 0 |c Lawrence A. Gordon, Martin P. Loeb 
260 |a New York 
260 |b McGraw-Hill 
260 |c 2006 
520 |a Breaches in cybersecurity are on the rise. Between 1998 and 2003, reported cybersecurity incidents increased over thirty-fold. Well-publicized information security breaches have made cybersecurity a critical and timely topic for the general public, as well as for corporations, not-for-profit organizations and the government. As a result, organizations need to be able to make the business case for spending the right amount on cybersecurity. They also need to know how to efficiently allocate these funds to specific cybersecurity activities. Managing Cybersecurity Resources is the first book to specifically focus on providing a framework for understanding how to use economic and financial management tools in helping to address these important issues. The McGraw-Hill Homeland Security Series draws on frontline government, military, and business experts to detail what individuals and businesses can and must do to understand and move forward in this challenging new environment. Books in this timely and noteworthy series will cover everything from the balance between freedom and safety to strategies for protection of intellectual, business, and personal property to structures and goals of terrorist groups including Al-Qaeda. 
650 |a Business,Computer security,Information technology,Data protection,Kinh doanh 
650 |x Data processing,Security measures,Security measures,Xử lý dữ liệu,Sự đo lường độ bảo mật 
904 |i Nguyễn Thị Kiều Đượm 
980 |a Trung tâm Học liệu Trường Đại học Cần Thơ