search query: @indexterm COMPUTER SECURITY / total: 169
reference: 6 / 169
« previous | next »
Author:Austin, R.D.
Darby, C.A.R.
Title:The myth of secure computing
Journal:Harvard Business Review
2003 : JUN, VOL. 81:6, p. 120-126
Index terms:Executives
Management
Decision making
Information technology
Computer security
Language:eng
Abstract:When it comes to digital security, there is no such thing as an impenetrable defense. You can, however, mitigate risk by following sound operating practices. The article recommends eight processes in all, ranging from deciding how much protection each digital asset deserves to insisting on secure software to rehearsing a response to a security breach. The important think to realize is that decisions about digital security are not much different from other cost-benefit decisions.
SCIMA record nr: 244219
add to basket
« previous | next »
SCIMA