Safeguarding Critical E-Documents: Implementing a Program for Securing Confidential Information Assets
Lýsing:
Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records Managers and public officials are looking for technology and information governance solutions to "information leakage" in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications.
Provides practical, step-by-step guidance on protecting sensitive and confidential documentseven if they leave the organization electronically or on portable devices Presents a blueprint for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard internal electronic documents and private communications Offers a concise format for securing your organizations from information leakage In light of the recent WikiLeaks revelations, governments and businesses have heightened awareness of the vulnerability of confidential internal documents and communications.
Annað
- Höfundur: Robert F. Smallwood, Barclay T. Blair
- Útgáfa:1
- Útgáfudagur: 20-06-2012
- Hægt að prenta út 2 bls.
- Hægt að afrita 10 bls.
- Format:ePub
- ISBN 13: 9781118282274
- Print ISBN: 9781118159088
- ISBN 10: 1118282272
Efnisyfirlit
- Cover
- Conents
- Title Page
- Copyright
- Dedication
- Foreword
- Preface
- Acknowledgments
- PART I: The Problem and Basic Tools
- CHAPTER 1: The Problem: Securing Confidential Electronic Documents
- WikiLeaks: A Wake-Up Call
- U.S. Government Attempts to Protect Intellectual Property
- Threats Persist across the Pond: U.K. Companies on Guard
- Increase in Corporate and Industrial Espionage
- Risks of Medical Identity Theft
- Why Don't Organizations Safeguard Their Information Assets?
- The Blame Game: Where Does Fault Lie When Information Is Leaked?
- Consequences of Not Employing E-Document Security
- Notes
- CHAPTER 2: Information Governance: The Crucial First Step
- First, Better Policies; Then, Better Technology for Better Enforcement
- Defining Information Governance
- Accountability Is Key
- Why IG Is Good Business
- Impact of a Successful IG Program
- Critical Factors in an IG Program
- Who Should Determine IG Policies?
- Notes
- CHAPTER 1: The Problem: Securing Confidential Electronic Documents
- CHAPTER 3: Managing E-Documents and Records
- Enterprise Content Management
- Document Management Principles
- The Goal: Document Lifecycle Security
- Electronic Document Management Systems
- Records Management Principles
- Electronic Records Management
- Notes
- CHAPTER 4: Information Governance and Security for E-mail Messages
- Employees Regularly Expose Organizations to E-mail Risk
- E-mail Policies Should Be Realistic and Technology Agnostic
- Is E-mail Encryption the Answer?
- Common E-mail Security Mistakes
- E-mail Security Myths
- E-record Retention: Fundamentally a Legal Issue
- Preserve E-mail Integrity and Admissibility with Automatic Archiving
- Notes
- CHAPTER 5: Information Governance and Security for Instant Messaging
- Instant Messaging Security Threats
- Best Practices for Business IM Use
- Technology to Monitor IM
- Tips for Safer IM
- Notes
- CHAPTER 6: Information Governance and Security for Social Media
- Types of Social Media in Web 2.0
- Social Media in the Enterprise
- Key Ways Social Media Is Different from E-mail and Instant Messaging
- Biggest Security Threats of Social Media
- Legal Risks of Social Media Posts
- Tools to Archive Facebook and Twitter
- IG Considerations for Social Media
- Notes
- CHAPTER 7: Information Governance and Security for Mobile Devices
- Current Trends in Mobile Computing
- Security Risks of Mobile Computing
- Securing Mobile Data
- IG for Mobile Computing
- Building Security into Mobile Applications
- Best Practices to Secure Mobile Applications
- Notes
- CHAPTER 8: Information Governance and Security for Cloud Computing Use
- Defining Cloud Computing
- Key Characteristics of Cloud Computing
- What Cloud Computing Really Means
- Cloud Deployment Models
- Greatest Security Threats to Cloud Computing
- IG Guidelines: Managing Documents and Records in the Cloud
- Managing E-Docs and Records in the Cloud: A Practical Approach
- Notes
- CHAPTER 9: Information Governance and Security for Vital Records
- Defining Vital Records
- Types of Vital Records
- Impact of Losing Vital Records
- Creating, Implementing, and Maintaining a Vital Records Program
- Implementing Protective Procedures
- Auditing the Vital Records Program
- Notes
- CHAPTER 10: Long-Term Preservation of E-Records
- Defining Long-Term Digital Preservation
- Key Factors in LTDP
- Electronic Records Preservation Processes
- Controlling the Process of Preserving Records
- Notes
- CHAPTER 11: Technologies That Can Help Secure E-Documents
- Challenge of Securing E-Documents
- Apply Better Technology for Better Enforcement in the Extended Enterprise
- Controlling Access to Documents Using Identity Access Management
- Enforcing IG: Protect Files with Rules and Permissions
- Data Governance Software to Manage Information Access
- E-Mail Encryption
- Secure Communications Using Record-Free E-Mail
- Digital Signatures
- Document Encryption
- Data Loss Prevention Technology
- The Missing Piece: Information Rights Management
- Notes
- CHAPTER 12: Safeguarding Confidential Information Assets
- Cyber Attacks Proliferate
- The Insider Threat: Malicious or Not
- Critical Technologies for Securing Confidential Documents
- A Hybrid Approach: Combining DLP and IRM Technologies
- Securing Trade Secrets after Layoffs and Terminations
- Persistently Protecting Blueprints and CAD Documents
- Securing Internal Price Lists
- Approaches for Securing Data Once It Leaves the Organization
- Document Labeling
- Document Analytics
- Confidential Stream Messaging
- Notes
- CHAPTER 13: Building the Business Case to Justify the Program
- Determine What Will Fly in Your Organization
- Strategic Business Drivers for Project Justification
- Benefits of Electronic Records Management
- Confidential Stream Messaging
- Notes
- CHAPTER 14: Securing Executive Sponsorship
- Executive Sponsor Role
- Project Manager: Key Tasks
- It's the Little Things
- Evolving Role of the Executive Sponsor
- Notes
- CHAPTER 15: Safeguarding Confidential Information Assets: Where Do You Start?
- Business Driver Approach
- Classification
- Document Survey Methodology
- Interviewing Staff in the Target Area
- Preparing Interview Questions
- Prioritizing: Document and Records Value Assessment
- Second Phase of Implementation
- Notes
- CHAPTER 16: Procurement: The Buying Process
- Evaluation and Selection Process: RFI, RFP, or RFQ?
- Evaluating Software Providers: Key Criteria
- Negotiating Contracts: Ensuring the Decision
- More Contract Caveats
- How to Pick a Consulting Firm: Evaluation Criteria
- CHAPTER 17: Maintaining a Secure Environment for Information Assets
- Monitoring and Accountability
- Continuous Process Improvement
- Why Continuous Improvement Is Needed
- Notes
- Conclusion
- Notes
- Appendix A: Digital Signature Standard
- Notes
- Appendix B: Regulations Related to Records Management
- Department of Defense Rule 5015.2-STD
- National Archives and Records Administration (NARA)
- Gramm-Leach-Bliley Act
- Healthcare Insurance Portability and Accountability Act of 1996 (HIPAA)
- Patriot Act (Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001)
- Sarbanes-Oxley Act (SOX)
- SEC Rule 17A-4
- CFR Title 47, Part 42—Telecommunications
- CFR Title 21, Part 11—Pharmaceuticals
- Appendix C: Listing of Technology and Service Providers
- Glossary
- About the Author
- Index
UM RAFBÆKUR Á HEIMKAUP.IS
Bókahillan þín er þitt svæði og þar eru bækurnar þínar geymdar. Þú kemst í bókahilluna þína hvar og hvenær sem er í tölvu eða snjalltæki. Einfalt og þægilegt!Rafbók til eignar
Rafbók til eignar þarf að hlaða niður á þau tæki sem þú vilt nota innan eins árs frá því bókin er keypt.
Þú kemst í bækurnar hvar sem er
Þú getur nálgast allar raf(skóla)bækurnar þínar á einu augabragði, hvar og hvenær sem er í bókahillunni þinni. Engin taska, enginn kyndill og ekkert vesen (hvað þá yfirvigt).
Auðvelt að fletta og leita
Þú getur flakkað milli síðna og kafla eins og þér hentar best og farið beint í ákveðna kafla úr efnisyfirlitinu. Í leitinni finnur þú orð, kafla eða síður í einum smelli.
Glósur og yfirstrikanir
Þú getur auðkennt textabrot með mismunandi litum og skrifað glósur að vild í rafbókina. Þú getur jafnvel séð glósur og yfirstrikanir hjá bekkjarsystkinum og kennara ef þeir leyfa það. Allt á einum stað.
Hvað viltu sjá? / Þú ræður hvernig síðan lítur út
Þú lagar síðuna að þínum þörfum. Stækkaðu eða minnkaðu myndir og texta með multi-level zoom til að sjá síðuna eins og þér hentar best í þínu námi.
Fleiri góðir kostir
- Þú getur prentað síður úr bókinni (innan þeirra marka sem útgefandinn setur)
- Möguleiki á tengingu við annað stafrænt og gagnvirkt efni, svo sem myndbönd eða spurningar úr efninu
- Auðvelt að afrita og líma efni/texta fyrir t.d. heimaverkefni eða ritgerðir
- Styður tækni sem hjálpar nemendum með sjón- eða heyrnarskerðingu
- Gerð : 208
- Höfundur : 12312
- Útgáfuár : 2012
- Leyfi : 379