UID:
almahu_9949728652902882
Format:
1 online resource
ISBN:
9781315402659
,
1315402653
,
9781315402666
,
1315402661
,
9781315402635
,
1315402637
Content:
First Published in 2017. Routledge is an imprint of Taylor & Francis, an Informa company.
Note:
Cover ; Half Title; Title Page; Copyright Page; Table of Contents; Foreword ; Preface ; Introduction ; Acknowledgments ; Chapter 1: How This Book Will Help to Build a Security Philosophy and Strategy ; 1.1 Trends That Impact Security Efforts ; 1.2 What Insiders Can Do to an Organization ; 1.3 Categories of Security Measures ; 1.4 Obstacles to Developing and Implementing Appropriate Security Measures ; 1.5 Researching Industry and Government Input on Security ; 1.6 Checking in with Your Insurance Company ; 1.7 Addressing Cyber Security Issues ; 1.8 Adopting a Philosophy of Security.
,
1.9 Assessing an Organization's Perception of Security 1.10 Developing and Gauging an Organization's Philosophy of Security ; 1.11 Summary ; Course Discussion Questions ; Course Projects ; Course Test Questions ; Key Terms ; Chapter 2: Identifying What to Protect and Who to Protect It From ; 2.1 Starting with Basic Security for Data and Information ; 2.2 Protecting Cash, Bank Accounts, and Credit Tools ; 2.3 Securing Processes, Inventions, and Trade Secrets ; 2.4 Protecting Equipment, Parts, and Maintenance Supplies ; 2.5 Keeping Track of Production Materials and Supplies.
,
2.6 Controlling Inventory In-House and in the Supply Chain 2.7 Protecting an Organization's Public Image ; 2.8 Protecting against Lone Insiders and Insider Groups ; 2.9 Protecting against Insider-Outsider Teams ; 2.10 Assessing an Organization's Perception of Asset Protection ; 2.11 Developing and Gauging an Organization's Philosophy of Securing Assets ; 2.12 Summary ; Course Discussion Questions ; Course Projects ; Course Test Questions ; Key Terms ; Chapter 3: Developing a Plan to Improve Security and Reduce the Insider Threat ; 3.1 Selecting a Security Planning Mode.
,
3.2 Organizing the Security Plan Development Team 3.3 Security Planning and Implementation Workflow ; 3.4 Post-Security Planning and Maintenance Activities ; 3.5 Management Oversight of Security Planning Progress ; 3.6 Writing and Reviewing Security Policies ; 3.7 Writing and Reviewing Security Procedures ; 3.8 Creating and Maintaining the Final Security Plan Documents ; 3.9 Summary ; Course Discussion Questions ; Course Projects ; Course Test Questions ; Key Terms ; Chapter 4: Increasing Awareness, Diligence, and Vigilance ; 4.1 Past Trends in Achieving Organizational Change.
,
4.2 Focusing Efforts to Develop a Culture of Security 4.3 Developing Leadership to Support Strong Security ; 4.4 Achieving Vigilance to Enforce Strong Security ; 4.5 Fostering Evangelism to Promote Strong Security ; 4.6 Achieving High Levels of Performance Needed for Strong Security ; 4.7 Infusing Awareness Needed for Strong Security ; 4.8 Assuring Familiarity Needed for Strong Security ; 4.9 Training Employees on Data Security and Privacy Expectations ; 4.10 Promoting Security as a Positive Thing ; 4.11 Summary ; Course Discussion Questions ; Course Projects ; Course Test Questions.
Additional Edition:
Print version: Erbschloe, Michael, 1951- Walling out the insiders. Boca Raton, FL : CRC Press, 2017 ISBN 9781138031609
Language:
English
URL:
https://www.taylorfrancis.com/books/9781315402666
URL:
https://www.taylorfrancis.com/books/9781315402666