Assessing Information Security

Assessing Information Security

Strategies, Tactics, Logic and Framework

Unknown - 2014
Rate this:
Build a strategic response to cyber attacks The activities of the cyber criminal are both deliberate and hostile, and they can be compared to military operations. Many people in business understand that the insights from the classics of military strategy are as relevant to modern commerce as they are to war. It is clear that organisations need to develop a view of cybersecurity that goes beyond technology: all staff in the organisation have a role to play, and it is the senior managers who must ensure, like generals marshalling their forces, that all staff know the cyber security policies that.
Publisher: Ely, Cambridgeshire : IT Governance Publishing, 2014.
Edition: Second edition.
Characteristics: 1 online resource (424 pages).


From the critics

Community Activity


Add a Comment

There are no comments for this title yet.

Age Suitability

Add Age Suitability

There are no age suitabilities for this title yet.


Add a Summary

There are no summaries for this title yet.


Add Notices

There are no notices for this title yet.


Add a Quote

There are no quotes for this title yet.

Explore Further


Subject Headings

No similar edition of this title was found at APL.

Try searching for Assessing Information Security to see if APL owns related versions of the work.

To Top