Managing Risk and Security in Outsourcing IT Services
Title | Managing Risk and Security in Outsourcing IT Services PDF eBook |
Author | Frank Siepmann |
Publisher | CRC Press |
Pages | 234 |
Release | 2013-12-09 |
Genre | Business & Economics |
ISBN | 1439879109 |
With cloud computing quickly becoming a standard in today's IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments-requiring a change in how we evaluate risk and protect information, processes, and people.Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and
Outsourcing Information Security
Title | Outsourcing Information Security PDF eBook |
Author | C. Warren Axelrod |
Publisher | Artech House |
Pages | 292 |
Release | 2004 |
Genre | Computers |
ISBN | 9781580539555 |
This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.
Outsourcing Information Security
Title | Outsourcing Information Security PDF eBook |
Author | C. Warren Axelrod |
Publisher | Artech House Publishers |
Pages | 248 |
Release | 2004-01-01 |
Genre | Business & Economics |
ISBN | 9781580535311 |
This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions. Moreover, it enables you to determine which information security functions should be performed by a third party, better manage third-party relationships, and ensure that any functions handed over to a third party meet good security standards.
Managing Information Security Risks
Title | Managing Information Security Risks PDF eBook |
Author | Christopher J. Alberts |
Publisher | Addison-Wesley Professional |
Pages | 516 |
Release | 2003 |
Genre | Business & Economics |
ISBN | 9780321118868 |
Describing OCTAVE (Operationally Critical Threat, Asset and Vulnerability Evaluation), a method of evaluating information security risk, this text should be of interest to risk managers.
Will Outsourcing IT Security Lead to a Higher Social Level of Security?
Title | Will Outsourcing IT Security Lead to a Higher Social Level of Security? PDF eBook |
Author | |
Publisher | |
Pages | |
Release | 2004 |
Genre | |
ISBN |
More firms outsource information technology (IT) security activities each year, as they determine that they can achieve cost savings or a higher level of security at the same cost. However, despite the estimated benefits, many firms still fail to see a clear positive net benefit from their (private) perspective, given the risks and costs involved. This paper investigates the positive externalities associated with IT security outsourcing. My research suggests that, when one organization decides to outsource its security, both direct and indirect benefits can accrue to other organizations and users. In this paper I analyze how a variety of decision characteristics affect whether and to what level such positive externalities will result. I also discuss implications for public policy and for firm-level decision making.
A Business Guide to Information Security
Title | A Business Guide to Information Security PDF eBook |
Author | Alan Calder |
Publisher | Kogan Page Publishers |
Pages | 198 |
Release | 2005 |
Genre | Business & Economics |
ISBN | 9780749443955 |
Nontechnical, simple, and straightforward, this handbook offers valuable advice to help managers protect their companies from malicious and criminal IT activity.
Psychological and Behavioral Examinations in Cyber Security
Title | Psychological and Behavioral Examinations in Cyber Security PDF eBook |
Author | McAlaney, John |
Publisher | IGI Global |
Pages | 358 |
Release | 2018-03-09 |
Genre | Computers |
ISBN | 1522540547 |
Cyber security has become a topic of concern over the past decade. As many individual and organizational activities continue to evolve digitally, it is important to examine the psychological and behavioral aspects of cyber security. Psychological and Behavioral Examinations in Cyber Security is a critical scholarly resource that examines the relationship between human behavior and interaction and cyber security. Featuring coverage on a broad range of topics, such as behavioral analysis, cyberpsychology, and online privacy, this book is geared towards IT specialists, administrators, business managers, researchers, and students interested in online decision making in cybersecurity.