Synopsis
All too often, managers and technicians responsible for protecting their company's computer systems from viruses, vandals, and other calamities find themselves reacting after catastrophe strikes. With the help of this pragmatic guide, co-sponsored by the National Computer Security Association, you'll learn how to shield your enterprisewide system from loss or damage before it happens.
Concise, accessible, and up-to-date, The NCSA Guide to Enterprise Security focuses on real-world issues encompassing all types of businesses. Dozens of case studies help you put into context the dangers that await inadequately protected systems. You'll learn how to identify key threats and vulnerabilities; devise effective countermeasures for each type of computer crime; develop cooperative efforts to protect against threats from employees, ex-employees, and software vendors; improve physical security at your facility; apply appropriate encryption techniques to improve security; convene a high-level task force for disaster prevention, mitigation, and recovery; plus, you'll find a wealth of references to current technical literature.
From the Back Cover
Arm yourself with practical, fail-safe solutions for protecting vital corporate information. All too often, managers and technicians responsible for protecting their company's computer systems from viruses, vandals, and other calamities find themselves reacting after catastrophe strikes. With the help of this pragmatic guide, co-sponsored by the National Computer Security, you'll learn how to shield your enterprisewide system from loss or damage before it happens. Concise, accessible, and up-to-date, The NCSA Guide to Enterprise Security focuses on real-world issues encompassing all types of businesses. Dozens of case studies help you put into context the danges that await inadequately protected systems. You'll learn how to: Identify key threats and vulnerabilities; Devise effective countermeasures for each type of computer crime; Develop cooperative efforts to protect against threats from employees, ex-employees, and software vendors; Improve physical security at your facility; Apply appropiate encryption techniques to improve security; Convene a high-level task force for disaster prevention, mitigation, and recovery. Plus, you'll find a wealth of references to current technical literature.
"About this title" may belong to another edition of this title.