Pesquisa de referências
Atrás

Five steps to IT risk management best practices

Fichero PDF / PDF file
Seção: Artigos
Título: Five steps to IT risk management best practices / Greg HughesAutor: Hughes, Greg
Notas: As individuals, corporations, and our economy grow increasingly dependent on the Internet and IT systems, the risk in these systems become far more visible and significant. Breaches or failures of information systems cause serious business crises, including reputation damage caused by identify theft, business losses stemming from system failures and regulatory restrictions arising from compliance issues.Registros relacionados: En: Risk management. - New York. - Vol. 53, nº 7, July 2006 ; p. 34-40Materia / lugar / evento: Gerencia de riesgos Tecnología de la información Riesgo informático Seguridad de la información Control de riesgos Sistemas de información Seguridad informática Protección de la información Seguridad Títulos secundários: Título: Risk management
Outras classificações: 7
Ver detalhe do número