Pesquisa de referências

Five steps to IT risk management best practices

<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<rdf:Description>
<dc:creator>Hughes, Greg</dc:creator>
<dc:date>2006-07-01</dc:date>
<dc:description xml:lang="es">As individuals, corporations, and our economy grow increasingly dependent on the Internet and IT systems, the risk in these systems become far more visible and significant. Breaches or failures of information systems cause serious business crises, including reputation damage caused by identify theft, business losses stemming from system failures and regulatory restrictions arising from compliance issues.</dc:description>
<dc:identifier>https://documentacion.fundacionmapfre.org/documentacion/publico/es/bib/60099.do</dc:identifier>
<dc:language>eng</dc:language>
<dc:rights xml:lang="es">InC - http://rightsstatements.org/vocab/InC/1.0/</dc:rights>
<dc:subject xml:lang="es">Gerencia de riesgos</dc:subject>
<dc:subject xml:lang="es">Tecnología de la información</dc:subject>
<dc:subject xml:lang="es">Riesgo informático</dc:subject>
<dc:subject xml:lang="es">Seguridad de la información</dc:subject>
<dc:subject xml:lang="es">Control de riesgos</dc:subject>
<dc:subject xml:lang="es">Sistemas de información</dc:subject>
<dc:subject xml:lang="es">Seguridad informática</dc:subject>
<dc:subject xml:lang="es">Protección de la información</dc:subject>
<dc:subject xml:lang="es">Seguridad</dc:subject>
<dc:type xml:lang="es">Artículos y capítulos</dc:type>
<dc:title xml:lang="es">Five steps to IT risk management best practices</dc:title>
<dc:title xml:lang="es">Título: Risk management</dc:title>
<dc:relation xml:lang="es">En: Risk management. - New York. - Vol. 53, nº 7, July 2006 ; p. 34-40</dc:relation>
</rdf:Description>
</rdf:RDF>