The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
There are many ways to approach information security. This chapter looks at information security from a risk management point of view by focusing on the evaluation of information security risks. The evaluation looks at information-related assets that are critical to the success and survivability of an enterprise. By looking at these critical assets, determining how they are at risk, and developing...
Problems in network security management have outgrown the capabilities of current human-intensive administrative methodologies. There is a significant need for automation of network security operations that is not being addressed. This article proposes a new way of looking at the security automation problem and lays down some requirements for developing appropriate technologies to minimize human involvement...
The Internal Revenue Service (IRS), a branch of the Department of the Treasury, is a large Federal agency with over 100,000 employees and 750 facilities. In 2000, it collected more than $2 trillion in revenue and processed 226 million tax returns. In carrying out its tax administration responsibilities, the IRS is committed to adequately protecting the confidentiality of the taxpayer records that...
Previous chapters in this book have examined a wide range of technical, legal, and organizational issues with regard to security. This final chapter provides in-depth coverage of the issues involved in developing a secure organization. It starts by examining the forces that are making security a top organizational concern. It goes on to a description of the information security organization from the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.