Warner, Richard
(forfatter)
Why Don't We Defend Better? e-bog
177,19 DKK
The wave of data breaches raises two pressing questions: Why don't we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy answers those questions. It distinguishes three technical sources of data breaches corresponding to three types of vulnerabilities: software, human, and…
The wave of data breaches raises two pressing questions: Why don't we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy answers those questions. It distinguishes three technical sources of data breaches corresponding to three types of vulnerabilities: software, human, and network. It discusses two risk management goals: business and consumer. The authors propose mandatory anonymous reporting of information as an essential step toward better defense, as well as a general reporting requirement. They also provide a systematic overview of data breach defense, combining technological and public policy considerations. FeaturesExplains why data breach defense is currently often ineffectiveShows how to respond to the increasing frequency of data breachesCombines the issues of technology, business and risk management, and legal liabilityDiscusses the different issues faced by large versus small and medium-sized businesses (SMBs)Provides a practical framework in which public policy issues about data breaches can be effectively addressed
E-bog
177,19 DKK
Forlag
CRC Press
Udgivet
05.07.2019
Længde
108 sider
Genrer
Central / national / federal government policies
Sprog
English
Format
pdf
Beskyttelse
LCP
ISBN
9781351127295
The wave of data breaches raises two pressing questions: Why don't we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy answers those questions. It distinguishes three technical sources of data breaches corresponding to three types of vulnerabilities: software, human, and network. It discusses two risk management goals: business and consumer. The authors propose mandatory anonymous reporting of information as an essential step toward better defense, as well as a general reporting requirement. They also provide a systematic overview of data breach defense, combining technological and public policy considerations. FeaturesExplains why data breach defense is currently often ineffectiveShows how to respond to the increasing frequency of data breachesCombines the issues of technology, business and risk management, and legal liabilityDiscusses the different issues faced by large versus small and medium-sized businesses (SMBs)Provides a practical framework in which public policy issues about data breaches can be effectively addressed
Dansk