Muutke küpsiste eelistusi

E-raamat: Safeguarding Critical E-Documents: Implementing a Program for Securing Confidential Information Assets

  • Formaat: EPUB+DRM
  • Ilmumisaeg: 20-Jun-2012
  • Kirjastus: John Wiley & Sons Inc
  • Keel: eng
  • ISBN-13: 9781118282274
  • Formaat - EPUB+DRM
  • Hind: 56,06 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Raamatukogudele
  • Formaat: EPUB+DRM
  • Ilmumisaeg: 20-Jun-2012
  • Kirjastus: John Wiley & Sons Inc
  • Keel: eng
  • ISBN-13: 9781118282274

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records Managers and public officials are looking for technology and information governance solutions to "information leakage" in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications.





Provides practical, step-by-step guidance on protecting sensitive and confidential documentseven if they leave the organization electronically or on portable devices Presents a blueprint for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard internal electronic documents and private communications Offers a concise format for securing your organizations from information leakage

In light of the recent WikiLeaks revelations, governments and businesses have heightened awareness of the vulnerability of confidential internal documents and communications. Timely and relevant, Safeguarding Critical E-Documents shows how to keep internal documents from getting into the wrong hands and weakening your competitive position, or possible damaging your organization's reputation and leading to costly investigations.
Foreword xiii
Preface xv
Acknowledgments xvii
PART I THE PROBLEM AND BASIC TOOLS
Chapter 1 The Problem: Securing Confidential Electronic Documents
3(10)
WikiLeaks: A Wake-Up Call
3(2)
U.S. Government Attempts to Protect Intellectual Property
5(1)
Threats Persist across the Pond: U.K. Companies on Guard
5(1)
Increase in Corporate and Industrial Espionage
6(1)
Risks of Medical Identity Theft
7(1)
Why Don't Organizations Safeguard Their Information Assets?
8(1)
The Blame Game: Where Does Fault Lie When Information Is Leaked?
9(1)
Consequences of Not Employing E-Document Security
10(1)
Notes
11(2)
Chapter 2 Information Governance: The Crucial First Step
13(14)
First, Better Policies; Then, Better Technology for Better Enforcement
13(1)
Defining Information Governance
14(2)
Accountability Is Key
16(1)
Why IG Is Good Business
17(1)
Impact of a Successful IG Program
18(1)
Critical Factors in an IG Program
19(3)
Who Should Determine IG Policies?
22(1)
Notes
23(4)
PART II INFORMATION PLATFORM RISKS AND COUNTERMEASURES
Chapter 3 Managing E-Documents and Records
27(8)
Enterprise Content Management
27(1)
Document Management Principles
28(1)
The Goal: Document Lifecycle Security
29(1)
Electronic Document Management Systems
29(2)
Records Management Principles
31(1)
Electronic Records Management
31(2)
Notes
33(2)
Chapter 4 Information Governance and Security for E-mail Messages
35(14)
Employees Regularly Expose Organizations to E-mail Risk
36(1)
E-mail Policies Should Be Realistic and Technology Agnostic
37(1)
Is E-mail Encryption the Answer?
38(1)
Common E-mail Security Mistakes
39(1)
E-mail Security Myths
40(1)
E-record Retention: Fundamentally a Legal Issue
41(1)
Preserve E-mail Integrity and Admissibility with Automatic Archiving
42(4)
Notes
46(3)
Chapter 5 Information Governance and Security for Instant Messaging
49(8)
Instant Messaging Security Threats
50(1)
Best Practices for Business IM Use
51(2)
Technology to Monitor IM
53(1)
Tips for Safer IM
53(2)
Notes
55(2)
Chapter 6 Information Governance and Security for Social Media
57(12)
Types of Social Media in Web 2.0
57(2)
Social Media in the Enterprise
59(1)
Key Ways Social Media Is Different from E-mail and Instant Messaging
60(1)
Biggest Security Threats of Social Media
60(3)
Legal Risks of Social Media Posts
63(1)
Tools to Archive Facebook and Twitter
64(1)
IG Considerations for Social Media
65(1)
Notes
66(3)
Chapter 7 Information Governance and Security for Mobile Devices
69(14)
Current Trends in Mobile Computing
71(1)
Security Risks of Mobile Computing
72(1)
Securing Mobile Data
73(1)
IG for Mobile Computing
73(2)
Building Security into Mobile Applications
75(3)
Best Practices to Secure Mobile Applications
78(2)
Notes
80(3)
Chapter 8 Information Governance and Security for Cloud Computing Use
83(18)
Defining Cloud Computing
84(1)
Key Characteristics of Cloud Computing
85(1)
What Cloud Computing Really Means
86(1)
Cloud Deployment Models
87(1)
Greatest Security Threats to Cloud Computing
87(7)
IG Guidelines: Managing Documents and Records in the Cloud
94(1)
Managing E-Docs and Records in the Cloud: A Practical Approach
95(2)
Notes
97(4)
PART III E-RECORDS CONSIDERATIONS
Chapter 9 Information Governance and Security for Vital Records
101(14)
Defining Vital Records
101(2)
Types of Vital Records
103(1)
Impact of Losing Vital Records
104(1)
Creating, Implementing, and Maintaining a Vital Records Program
105(3)
Implementing Protective Procedures
108(3)
Auditing the Vital Records Program
111(2)
Notes
113(2)
Chapter 10 Long-Term Preservation of E-Records
115(10)
Defining Long-Term Digital Preservation
115(1)
Key Factors in LTDP
116(2)
Electronic Records Preservation Processes
118(1)
Controlling the Process of Preserving Records
118(3)
Notes
121(4)
PART IV INFORMATION TECHNOLOGY CONSIDERATIONS
Chapter 11 Technologies That Can Help Secure E-Documents
125(22)
Challenge of Securing E-Documents
125(3)
Apply Better Technology for Better Enforcement in the Extended Enterprise
128(3)
Controlling Access to Documents Using Identity Access Management
131(2)
Enforcing IG: Protect Files with Rules and Permissions
133(1)
Data Governance Software to Manage Information Access
133(1)
E-mail Encryption
134(1)
Secure Communications Using Record-Free E-mail
134(1)
Digital Signatures
135(2)
Document Encryption
137(1)
Data Loss Prevention Technology
137(2)
The Missing Piece: Information Rights Management
139(5)
Notes
144(3)
Chapter 12 Safeguarding Confidential Information Assets
147(22)
Cyber Attacks Proliferate
147(1)
The Insider Threat: Malicious or Not
148(2)
Critical Technologies for Securing Confidential Documents
150(4)
A Hybrid Approach: Combining DLP and IRM Technologies
154(1)
Securing Trade Secrets after Layoffs and Terminations
155(1)
Persistently Protecting Blueprints and CAD Documents
156(1)
Securing Internal Price Lists
157(1)
Approaches for Securing Data Once It Leaves the Organization
157(2)
Document Labeling
159(2)
Document Analytics
161(1)
Confidential Stream Messaging
161(3)
Notes
164(5)
PART V ROLLING IT OUT: PROJECT AND PROGRAM ISSUES
Chapter 13 Building the Business Case to Justify the Program
169(10)
Determine What Will Fly in Your Organization
169(1)
Strategic Business Drivers for Project Justification
170(3)
Benefits of Electronic Records Management
173(3)
Presenting the Business Case
176(1)
Notes
177(2)
Chapter 14 Securing Executive Sponsorship
179(8)
Executive Sponsor Role
180(1)
Project Manager: Key Tasks
181(2)
It's the Little Things
183(1)
Evolving Role of the Executive Sponsor
183(2)
Notes
185(2)
Chapter 15 Safeguarding Confidential Information Assets: Where Do You Start?
187(10)
Business Driver Approach
187(1)
Classification
188(1)
Document Survey Methodology
189(1)
Interviewing Staff in the Target Area
190(2)
Preparing Interview Questions
192(1)
Prioritizing: Document and Records Value Assessment
193(1)
Second Phase of Implementation
194(1)
Notes
195(2)
Chapter 16 Procurement: The Buying Process
197(18)
Evaluation and Selection Process: RFI, RFP, or RFQ?
197(5)
Evaluating Software Providers: Key Criteria
202(5)
Negotiating Contracts: Ensuring the Decision
207(3)
More Contract Caveats
210(1)
How to Pick a Consulting Firm: Evaluation Criteria
211(4)
Chapter 17 Maintaining a Secure Environment for Information Assets
215(4)
Monitoring and Accountability
215(1)
Continuous Process Improvement
216(1)
Why Continuous Improvement Is Needed
216(2)
Notes
218(1)
Conclusion 219(2)
Appendix A Digital Signature Standard 221(2)
Appendix B Regulations Related to Records Management 223(4)
Appendix C Listing of Technology and Service Providers 227(20)
Glossary 247(1)
About the Author 247(2)
Index 249
ROBERT F. SMALLWOOD is a Partner and Executive Director of the E-Records Institute at IMERGE Consulting. One of the world's most respected authorities on e-records and document management, he has published more research reports on e-records, e-documents, and e-mail security issues over the past five years than any other person or organization. His research and consulting clients include Johnson & Johnson, IBM, Apple, MillerCoors, Ricoh Americas Corporation, South Carolina Retirement Systems, Dallas Independent School District, U.S. FDA, National Archives and Records Administration, Transportation Safety Board of Canada, Canadian Parliament, Supreme Court of Canada, Canada Mortgage and Housing Corporation, and National Archives of Australia, among others.