62,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in über 4 Wochen
  • Broschiertes Buch

Since information systems have become smaller, faster, cheaper and more interconnected many organizations have become more dependent on them for daily operations and to maintain critical data. This reliance on information systems is not without risk of attack. Because these systems are relied upon so heavily the impact of such an attack also increases, making the protection of these systems essential. Information system security often focuses on the risk of attack and damage from the outsider. High-profile issues such as hackers, viruses and denial-of-service are generally emphasized in…mehr

Produktbeschreibung
Since information systems have become smaller, faster, cheaper and more interconnected many organizations have become more dependent on them for daily operations and to maintain critical data. This reliance on information systems is not without risk of attack. Because these systems are relied upon so heavily the impact of such an attack also increases, making the protection of these systems essential. Information system security often focuses on the risk of attack and damage from the outsider. High-profile issues such as hackers, viruses and denial-of-service are generally emphasized in literature and other media outlets. A neglected area of computer security that is just as prevalent and potentially more damaging is the threat from a trusted insider. An organizational insider who misuses a system whether intentional or unintentional is often in a position to know where and how to access important information. How do we become aware of such activities and protect against this threat? This research was a historical analysis of the insider threat to information systems to develop a understanding and framework of the topic.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.