Securing an IT organization through governance, risk management, and audit
By: Sigler, Ken
Title By: Rainey, James L. III
Material type: BookSeries: Publisher: Boca Raton : CRC Press, c2016.Description: xxviii, 367 p. : ill. ; 25 cm.ISBN: 9781498737319Subject(s): Information technology -- Management | BUSINESS & ECONOMICS / Industrial ManagementDDC classification: 004.068 Online resources: Location Map
Summary:
Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been demonstrated that common hackers can use tools and techniques downloaded from the Internet to attack government and commercial information systems. Although threats may come from mischief makers and pranksters, they are more likely to result from hackers working in concert for profit, hackers working under the protection of nation states, or malicious insiders.
Item type | Home library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
REGULAR | University of Wollongong in Dubai Main Collection | 004.068 SI SE (Browse shelf) | Available | T0035483 |
Total holds: 0
, Shelving location: Main Collection Close shelf browser
004.068 KU IM Implementing service quality based on ISO/IEC 20000 : | 004.068 RO UN Unleashing the Power of IT : | 004.068 SI NE The next wave of technologies : | 004.068 SI SE Securing an IT organization through governance, risk management, and audit | 004.068 WE IN Information technology and competitive advantage in small firms / | 004.0681 SC IN Information technology investment : | 004.0681 SC IN Information technology investment : |
Part 1. Cybersecurity risk management and the framework for improving critical infrastructure cybersecurity -- part 2. Cybersecurity, governance, audit, and the COBIT 5 framework.
Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been demonstrated that common hackers can use tools and techniques downloaded from the Internet to attack government and commercial information systems. Although threats may come from mischief makers and pranksters, they are more likely to result from hackers working in concert for profit, hackers working under the protection of nation states, or malicious insiders.