Managerial guide for handling cyber-terrorism and information warfare
This book defines the organizational security measures that will decrease an organization's information system vulnerabilities to all types of attacks.
Main Author: | |
---|---|
Corporate Author: | |
Other Authors: | |
Format: | Electronic |
Language: | English |
Published: |
Hershey, Pa. :
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
c2005.
|
Subjects: | |
Online Access: | View fulltext via EzAccess |
Table of Contents:
- Information and Computer Security
- The Nature of Terrorism
- Cyber-Terrorism
- Physical Security
- Denial of Service Threat
- Web Defacements and Semantic Attacks
- DNS Attacks
- Routing Vulnerabilities
- Identity Stealing Attacks
- Identification, Authentication, and Access Control
- Personnel Security
- Operations Management
- Information Security Policy
- Business Continuity Management.