Information Risk and Security: Preventing and Investigating Workplace Computer Crime
By: Edward Wilding (author)Hardback
1 - 2 weeks availability
Information Risk and Security explains the complex and diverse sources of risk for any organization and provides clear guidance and strategies to address these threats before they happen, and to investigate them, if and when they do. Edward Wilding focuses particularly on internal IT risk, workplace crime, and the preservation of evidence, because it is these areas that are generally so mismanaged. There is advice on: preventing computer fraud, IP theft and systems sabotage adopting control and security measures that do not hinder business operations but which effectively block criminal access and misuse securing information - in both electronic and hard copy form understanding and countering the techniques by which employees are subverted or entrapped into giving access to systems and processes dealing with catastrophic risk best-practice for monitoring and securing office and wireless networks responding to attempted extortion and malicious information leaks conducting covert operations and forensic investigations securing evidence where computer misuse occurs and presenting this evidence in court and much more.
The author's clear and informative style mixes numerous case studies with practical, down-to-earth and easily implemented advice to help everyone with responsibility for this threat to manage it effectively. This is an essential guide for risk and security managers, computer auditors, investigators, IT managers, line managers and non-technical experts; all those who need to understand the threat to workplace computers and information systems.
Edward Wilding has investigated several hundred cases of computer fraud and misuse in many jurisdictions. His previous book, Computer Evidence: A Forensic Investigations Handbook (Sweet and Maxwell 1996) was one of the first to discuss computer forensic investigations. The author has lectured widely, trained incident response teams, and conducted security and risk reviews for a diversity of clients. He has also served as an expert witness in civil and criminal cases, tribunals and official hearings, including the Hutton Inquiry. In 2002, he co-founded Data Genetics International (DGI), specializing in computer crime investigation, incident response and forensic evidence.
Contents: Introduction; Perception of risk; Computer fraud; Espionage, intellectual property theft and leaks; Password misuse; Trash risk; Wireless risks; Sabotage, extortion and blackmail; Social engineering; Risks with personal computers; Pornography; Anonymous letters; Press leaks; Incident response; Ground rules on computer evidence; Covert operations; Analytical modes; Investigative resources; Computer evidence in court; Exit procedures; Conclusion; Appendices; Glossary; Index.
Number Of Pages:
- ID: 9780566086854
- Saver Delivery: Yes
- 1st Class Delivery: Yes
- Courier Delivery: Yes
- Store Delivery: Yes
Prices are for internet purchases only. Prices and availability in WHSmith Stores may vary significantly
© Copyright 2013 - 2016 WHSmith and its suppliers.
WHSmith High Street Limited Greenbridge Road, Swindon, Wiltshire, United Kingdom, SN3 3LD, VAT GB238 5548 36