Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy PDF

Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy PDF

Name:
Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy PDF

Published Date:
07/15/2019

Status:
[ Active ]

Description:

Publisher:
CRC Press Books

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$21.6
Need Help?
ISBN: 9781351127295

The wave of data breaches raises two pressing questions: Why don’t we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy answers those questions. It distinguishes three technical sources of data breaches corresponding to three types of vulnerabilities: software, human, and network. It discusses two risk management goals: business and consumer. The authors propose mandatory anonymous reporting of information as an essential step toward better defense, as well as a general reporting requirement. They also provide a systematic overview of data breach defense, combining technological and public policy considerations.

Features

Explains why data breach defense is currently often ineffective

Shows how to respond to the increasing frequency of data breaches

Combines the issues of technology, business and risk management, and legal liability

Discusses the different issues faced by large versus small and medium-sized businesses (SMBs)

Provides a practical framework in which public policy issues about data breaches can be effectively addressed

Authors: Robert H. Sloan, Richard Warner


Edition : 1
Number of Pages : 119
Published : 07/15/2019
isbn : 9781351127295

History


Related products


Best-Selling Products

ETSI Draft EN 301 908-13
Published Date: 11/01/2021
IMT cellular networks; Harmonised Standard for access to radio spectrum; Part 13: Evolved Universal Terrestrial Radio Access (E-UTRA) User Equipment (UE)
$9.81
ETSI EG 200 053
Published Date: 06/01/2004
Electromagnetic compatibility and Radio spectrum Matters (ERM); Radio site engineering for radio equipment and systems
$9.81
ETSI EG 200 234
Published Date: 02/01/2000
Telecommunications security; A guide to specifying requirements for cryptographic algorithms
21.80 21.31 you save 0.49
ETSI EG 200 351
Published Date: 09/01/1997
ETSI object identifier tree; Rules and registration procedures
$4.164
ETSI EG 200 351
Published Date: 09/01/1998
ETSI object identifier tree; Rules and registration procedures
$4.164
ETSI EG 200 351
Published Date: 10/01/1999
ETSI object identifier tree; Rules and registration procedures
17.83 17.34 you save 0.49