Information Risk and Security
Computers make it a lot easier for people to steal and commit fraud but they also make it far easier to prevent and detect in the first place. You may think that the largest source of risk to information within your organization - databases, marketing plans, financial information, money flows - is from hackers, bugs and viruses. In fact, your own employees are far more likely to put your information at risk, fraudulently for their own gain, negligently or simply from ignorance.
Ed Wilding's Information Risk and Security explains the main sources of risk to your information and financial assets. He also explains the policies and procedures you must follow to protect these assets and shows you how to prepare your organization should you be the victims of information or financial fraud and need to initiate an investigation, whilst the fraud is still ongoing or, failing that, once the guilty party has fled.
The result is a definitive guide for heads of corporate security, human resource and finance directors and fraud investigators, both internal and external.
Publisher: Gower Publishing
Publish date: 2006-04-01
What recourse does a victim of computer crime have? What protection does a victim have if his privacy can be invaded by those who are supposed to uphold the law but the facts are twisted in a court of law?
Even the best precautions cannot ensure the worst will not happen.
You need to be logged in to post reviews