skip to main content
Sign In / My Account
e-Shelf
My Account
Sign out
Sign in
This feature requires javascript
New Search
Database A to Z
Ejournal Locator
Digital Collections
Help
Search by Citation
Tags
Help
Language:
English
Polski
Français
Deutsch
Spanish
This feature required javascript
This feature requires javascript
Primo Search
Search For:
Clear Search Box
Search in:
Central Connecticut State University
Or hit Enter to replace search target
Or select another collection:
Search in:
Central Connecticut State University
Search in:
CCSU Catalog (Books, etc.)
Search in:
Course Reserves
Search in:
CSCU Library Consortium
Search in:
Articles
Advanced Search
Browse Search
This feature requires javascript
Resource type
criteria input
All items
Books
Articles
Journals
Audio Visual
Databases
Images
Show Results with:
criteria input
that contain my keywords
with my exact phrase
starts with
Show Results with:
Index
criteria input
anywhere in the record
in the title
as author/creator
in subject
Show Results with:
in the title
Show Results with:
anywhere in the record
in the title
as author/creator
in subject
This feature requires javascript
Outsourcing information security
Axelrod, C. Warren.
Boston : Artech House c2004
Online access. The library also has physical copies.
View It
Get It
Locations
Details
Reviews & Tags
Virtual Browse
This feature requires javascript
Actions
EndNote
Export RIS
EasyBib
Export BibTeX
RefWorks
Print
Citation
Permalink
E-mail
Add to e-Shelf
Remove from e-Shelf
This feature requires javascript
Title:
Outsourcing information security
Author/Creator:
Axelrod, C. Warren.
Publisher:
Boston : Artech House
Creation Date:
c2004
Language:
English
Physical Description:
1 online resource (xxvi, 248 p.) : ill.
Bibliography:
Includes bibliographical references (p. 209-233) and index.
Subjects:
Computer networks -- Computer networks -- Security measures -- United States
;
Computers -- Access control -- United States
;
Data encryption (Computer science)
Related Titles:
Series: Artech House computer security series.
Description:
This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.
Notes:
Includes bibliographical references (p. 209-233) and index.
Contents:
Outsourcing and Information Security
Y2K as a Turning Point
The Post Y2K Outsourcing Speed Bump
Shaky Managed Security Services Providers
A Prognosis
The Information Security Market
Information Security Risks
Threats
From Internal Source
From External Sources
Review of Threats
Vulnerabilities
Computer Systems and Networks
Software Development
Systemic Risks
Operational Risk
Operator and Administrator Risk
Complexity Risk
Life-Cycle Risk
Risks of Obsolescence
Vendor Viability Risk
Risk of Poor Quality Support
Conversion Risk
Risk of Dependency on Key Individuals
Justifying Outsourcing
Professed Reasons to Outsource
The Basis for Decision
Reasons for Considering Outsourcing
Cost Savings
Performance
Security
Expertise
Computer Applications
Support
Financial Arrangements
The Other Side of the Outsourcing Decision
Risks of Outsourcing
Loss of Control
Viability of Service Providers
Reasons for Abandoning Service
Relative Size of Customer
Quality of Service
Tangibles
Reliability
Responsiveness
Assurance
Empathy
The Issue of Trust
Performance of Applications and Services
Lack of Expertise
Hidden and Uncertain Costs
Limited Customization and Enhancements
Knowledge Transfer
Shared Environments
Legal and Regulatory Matters
Categorizing Costs and Benefits
Structured, Unbiased Analysis
The Ideal
Costs and Benefits.
Table of Contents; Foreword; Preface; Acknowledgments; 1 Outsourging and Information Security; 2 Information Security Risks; 3 Justifying Outsourcing; 4 Risks of Outsourcing; 5 Categorizing Costs and Benefits; 6 Costs and Benefits Throughout the Evaluation Process; 7 The Outsourcing Evaluation Process-Customer and Outsourcer Requirements; 8 Outsourcing Security Functions and Security Considerations When Outsourcing; 9 Summary of the Outsourcing Process-Soup to Nuts; Appendix A; Appendix B; Appendix C; Selected Bibliography; About the Author; Index
OCLC Number:
56985843
56420389
559837668
Identifier:
ISBN
1580539556 (electronic bk.);
ISBN
9781580539555 (electronic bk.);
ISBN
9781580535311 (alk. paper);
ISBN
1580535313 (alk. paper)
Links
Table of Contents
This item in WorldCat®
sourcerecord
Display Source Record
This feature requires javascript
This feature requires javascript
Back to results list
This feature requires javascript
This feature requires javascript