Search

Five steps to IT risk management best practices

<?xml version="1.0" encoding="UTF-8"?><modsCollection xmlns="http://www.loc.gov/mods/v3" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-8.xsd">
<mods version="3.8">
<titleInfo>
<title>Five steps to IT risk management best practices</title>
</titleInfo>
<titleInfo type="alternative">
<title>Risk management</title>
</titleInfo>
<name type="personal" usage="primary" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080045814">
<namePart>Hughes, Greg</namePart>
<nameIdentifier>MAPA20080045814</nameIdentifier>
</name>
<typeOfResource>text</typeOfResource>
<originInfo>
<place>
<placeTerm type="code" authority="marccountry">usa</placeTerm>
</place>
<dateIssued encoding="marc">2006</dateIssued>
<issuance>serial</issuance>
</originInfo>
<language>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription>
<form authority="marcform">print</form>
<form authority="marccategory">microform</form>
</physicalDescription>
<abstract>As individuals, corporations, and our economy grow increasingly dependent on the Internet and IT systems, the risk in these systems become far more visible and significant. Breaches or failures of information systems cause serious business crises, including reputation damage caused by identify theft, business losses stemming from system failures and regulatory restrictions arising from compliance issues.</abstract>
<note type="statement of responsibility">Greg Hughes</note>
<subject authority="lcshac" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080591182">
<topic>Gerencia de riesgos</topic>
</subject>
<subject authority="lcshac" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080623791">
<topic>Tecnología de la información</topic>
</subject>
<subject authority="lcshac" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080587581">
<topic>Riesgo informático</topic>
</subject>
<subject authority="lcshac" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080622251">
<topic>Seguridad de la información</topic>
</subject>
<subject authority="lcshac" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080584344">
<topic>Control de riesgos</topic>
</subject>
<subject authority="lcshac" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080612580">
<topic>Sistemas de información</topic>
</subject>
<subject authority="lcshac" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080603731">
<topic>Seguridad informática</topic>
</subject>
<subject authority="lcshac" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080623517">
<topic>Protección de la información</topic>
</subject>
<subject authority="lcshac" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080552619">
<topic>Seguridad</topic>
</subject>
<classification authority="">7</classification>
<relatedItem type="host">
<titleInfo>
<title>Risk management</title>
</titleInfo>
<originInfo>
<publisher>New York</publisher>
</originInfo>
<part>
<text>Vol. 53, nº 7, July 2006 ; p. 34-40</text>
</part>
</relatedItem>
<recordInfo>
<recordContentSource authority="marcorg">MAP</recordContentSource>
<recordCreationDate encoding="marc">060724</recordCreationDate>
<recordChangeDate encoding="iso8601">20080418125825.0</recordChangeDate>
<recordIdentifier source="MAP">MAP20071508205</recordIdentifier>
<languageOfCataloging>
<languageTerm type="code" authority="iso639-2b">spa</languageTerm>
</languageOfCataloging>
</recordInfo>
</mods>
</modsCollection>