Information Technology Security Handbook
Informational and Communication
Technologies (ICT) plays a fundamental role for social and
economic development. Similarly, it is recognized that there
cannot be an effective use of ICT in the absence of a safe
and trusted ICT environment. Thus, IT security plays a prime
role in helping creating the environment needed to set the
ground for implementing successful national ICT plans,
e-Government or e-Commerce activities, as well as sectoral
projects, such as, for example, in the areas of education,
health, or finance. IT security is a complex topic and
evolves almost as fast as technology does. The authors
provide technology-independent best practices, as well as
recommendations for particular IT environments. As
technology evolves, the accompanying web site
(www.infodev-security.net) will provide updates as
appropriate, allowing for a constant dissemination of
developments in the field of IT security. The book is
composed of five parts, each of which can be read
independently. After an introduction to general issues of IT
security, the book addresses issues relevant specifically to
individuals, small and medium organizations, government, and
technical administrators. Although most of the research and
publications on IT security comes from developed countries,
the authors have attempted to provide practical guidance
applicable anywhere and to include examples from developing countries.
Saved in:
Bibliographic Details
Main Authors: |
Sadowsky, George,
Dempsey, James X.,
Greenberg, Alan,
Mack, Barbara J.,
Schwartz, Alan |
Language: | English en_US |
Published: |
Washington, DC: World Bank
2003
|
Subjects: | ADEQUATE SECURITY,
APPLICATION SOFTWARE,
ASP,
BUILDING SECURITY,
BUSINESS INFORMATION,
COLLABORATION,
COMMUNICATION TECHNOLOGIES,
COMMUNICATIONS TECHNOLOGY,
COMPUTER CRIME,
COMPUTER NETWORKS,
COMPUTER SECURITY,
COMPUTER SYSTEMS,
COMPUTER USERS,
COMPUTERS,
COPYRIGHT,
COPYRIGHT PROTECTION,
COUNSEL,
CRIMINAL ACTIVITY,
CRIMINALS,
DATA SECURITY,
DEVELOPED COUNTRIES,
DIGITAL AGE,
DIGITAL DIVIDE,
DOCUMENTS,
E-BUSINESS,
E-COMMERCE,
E-GOVERNMENT,
ENCRYPTION,
FRAUD,
ICT,
INFORMATICS,
INFORMATION COMMUNICATION TECHNOLOGY,
INFORMATION PROCESSING,
INFORMATION SERVICES,
INFORMATION SHARING,
INFORMATION SYSTEMS,
INFORMATION TECHNOLOGY,
INNOVATION,
INSTANT MESSAGING,
INTERNATIONAL COMMUNITY,
INTERNATIONAL COOPERATION,
INTERNATIONAL TRADE,
INTERNET CULTURE,
INTERNET SECURITY,
KNOWLEDGE CREATION,
KNOWLEDGE SHARING,
KNOWLEDGE TRANSFER,
LEARNING,
LIABILITY,
LOCAL KNOWLEDGE,
MEDIA,
NATIONAL INFORMATION INFRASTRUCTURE,
NETWORK TRAFFIC,
NETWORKS,
NEW PRODUCTS,
ONLINE BANKING,
OPPORTUNITY COSTS,
OUTSOURCING,
PHONES,
PHYSICAL SECURITY,
POLICY,
POLITICAL ISSUES,
POSTAL SERVICES,
PRIVACY POLICIES,
PRODUCTIVITY,
PROGRAMS,
PROTOCOLS,
RISK EVALUATION,
ROUTERS,
SCIENCE & TECHNOLOGY,
SECURITY POLICIES,
SECURITY RISKS,
SECURITY THREATS,
SOCIAL DEVELOPMENT,
TECHNICAL ASPECTS,
TECHNICAL GUIDELINES,
TECHNOLOGY,
TECHNOLOGY DEVELOPMENT,
TELECOMMUNICATIONS,
TELEPHONY,
TEXT,
THREATS,
TRAINING WORKSHOPS,
UNIVERSITIES,
WORLD WIDE WEB, |
Online Access: | http://documents.worldbank.org/curated/en/2003/01/5155128/information-technology-security-handbook
https://hdl.handle.net/10986/15005
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|