Information Technology Security Handbook

Informational and Communication Technologies (ICT) plays a fundamental role for social and economic development. Similarly, it is recognized that there cannot be an effective use of ICT in the absence of a safe and trusted ICT environment. Thus, IT security plays a prime role in helping creating the environment needed to set the ground for implementing successful national ICT plans, e-Government or e-Commerce activities, as well as sectoral projects, such as, for example, in the areas of education, health, or finance. IT security is a complex topic and evolves almost as fast as technology does. The authors provide technology-independent best practices, as well as recommendations for particular IT environments. As technology evolves, the accompanying web site (www.infodev-security.net) will provide updates as appropriate, allowing for a constant dissemination of developments in the field of IT security. The book is composed of five parts, each of which can be read independently. After an introduction to general issues of IT security, the book addresses issues relevant specifically to individuals, small and medium organizations, government, and technical administrators. Although most of the research and publications on IT security comes from developed countries, the authors have attempted to provide practical guidance applicable anywhere and to include examples from developing countries.

Saved in:
Bibliographic Details
Main Authors: Sadowsky, George, Dempsey, James X., Greenberg, Alan, Mack, Barbara J., Schwartz, Alan
Format: Publication biblioteca
Language:English
en_US
Published: Washington, DC: World Bank 2003
Subjects:ADEQUATE SECURITY, APPLICATION SOFTWARE, ASP, BUILDING SECURITY, BUSINESS INFORMATION, COLLABORATION, COMMUNICATION TECHNOLOGIES, COMMUNICATIONS TECHNOLOGY, COMPUTER CRIME, COMPUTER NETWORKS, COMPUTER SECURITY, COMPUTER SYSTEMS, COMPUTER USERS, COMPUTERS, COPYRIGHT, COPYRIGHT PROTECTION, COUNSEL, CRIMINAL ACTIVITY, CRIMINALS, DATA SECURITY, DEVELOPED COUNTRIES, DIGITAL AGE, DIGITAL DIVIDE, DOCUMENTS, E-BUSINESS, E-COMMERCE, E-GOVERNMENT, ENCRYPTION, FRAUD, ICT, INFORMATICS, INFORMATION COMMUNICATION TECHNOLOGY, INFORMATION PROCESSING, INFORMATION SERVICES, INFORMATION SHARING, INFORMATION SYSTEMS, INFORMATION TECHNOLOGY, INNOVATION, INSTANT MESSAGING, INTERNATIONAL COMMUNITY, INTERNATIONAL COOPERATION, INTERNATIONAL TRADE, INTERNET CULTURE, INTERNET SECURITY, KNOWLEDGE CREATION, KNOWLEDGE SHARING, KNOWLEDGE TRANSFER, LEARNING, LIABILITY, LOCAL KNOWLEDGE, MEDIA, NATIONAL INFORMATION INFRASTRUCTURE, NETWORK TRAFFIC, NETWORKS, NEW PRODUCTS, ONLINE BANKING, OPPORTUNITY COSTS, OUTSOURCING, PHONES, PHYSICAL SECURITY, POLICY, POLITICAL ISSUES, POSTAL SERVICES, PRIVACY POLICIES, PRODUCTIVITY, PROGRAMS, PROTOCOLS, RISK EVALUATION, ROUTERS, SCIENCE & TECHNOLOGY, SECURITY POLICIES, SECURITY RISKS, SECURITY THREATS, SOCIAL DEVELOPMENT, TECHNICAL ASPECTS, TECHNICAL GUIDELINES, TECHNOLOGY, TECHNOLOGY DEVELOPMENT, TELECOMMUNICATIONS, TELEPHONY, TEXT, THREATS, TRAINING WORKSHOPS, UNIVERSITIES, WORLD WIDE WEB,
Online Access:http://documents.worldbank.org/curated/en/2003/01/5155128/information-technology-security-handbook
http://hdl.handle.net/10986/15005
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Informational and Communication Technologies (ICT) plays a fundamental role for social and economic development. Similarly, it is recognized that there cannot be an effective use of ICT in the absence of a safe and trusted ICT environment. Thus, IT security plays a prime role in helping creating the environment needed to set the ground for implementing successful national ICT plans, e-Government or e-Commerce activities, as well as sectoral projects, such as, for example, in the areas of education, health, or finance. IT security is a complex topic and evolves almost as fast as technology does. The authors provide technology-independent best practices, as well as recommendations for particular IT environments. As technology evolves, the accompanying web site (www.infodev-security.net) will provide updates as appropriate, allowing for a constant dissemination of developments in the field of IT security. The book is composed of five parts, each of which can be read independently. After an introduction to general issues of IT security, the book addresses issues relevant specifically to individuals, small and medium organizations, government, and technical administrators. Although most of the research and publications on IT security comes from developed countries, the authors have attempted to provide practical guidance applicable anywhere and to include examples from developing countries.