skip to main content
Resource type Show Results with: Show Results with: Index

Outsourcing information security

Axelrod, C. Warren.

Boston : Artech House c2004

Online access. The library also has physical copies.

  • Title:
    Outsourcing information security
  • Author/Creator: Axelrod, C. Warren.
  • Publisher: Boston : Artech House
  • Creation Date: c2004
  • Language: English
  • Physical Description: 1 online resource (xxvi, 248 p.) : ill.
  • Bibliography: Includes bibliographical references (p. 209-233) and index.
  • Subjects: Computer networks -- Computer networks -- Security measures -- United States; Computers -- Access control -- United States; Data encryption (Computer science)
  • Description: This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.
  • Notes: Includes bibliographical references (p. 209-233) and index.
  • Contents: Outsourcing and Information Security
    Y2K as a Turning Point
    The Post Y2K Outsourcing Speed Bump
    Shaky Managed Security Services Providers
    A Prognosis
    The Information Security Market
    Information Security Risks
    Threats
    From Internal Source
    From External Sources
    Review of Threats
    Vulnerabilities
    Computer Systems and Networks
    Software Development
    Systemic Risks
    Operational Risk
    Operator and Administrator Risk
    Complexity Risk
    Life-Cycle Risk
    Risks of Obsolescence
    Vendor Viability Risk
    Risk of Poor Quality Support
    Conversion Risk
    Risk of Dependency on Key Individuals
    Justifying Outsourcing
    Professed Reasons to Outsource
    The Basis for Decision
    Reasons for Considering Outsourcing
    Cost Savings
    Performance
    Security
    Expertise
    Computer Applications
    Support
    Financial Arrangements
    The Other Side of the Outsourcing Decision
    Risks of Outsourcing
    Loss of Control
    Viability of Service Providers
    Reasons for Abandoning Service
    Relative Size of Customer
    Quality of Service
    Tangibles
    Reliability
    Responsiveness
    Assurance
    Empathy
    The Issue of Trust
    Performance of Applications and Services
    Lack of Expertise
    Hidden and Uncertain Costs
    Limited Customization and Enhancements
    Knowledge Transfer
    Shared Environments
    Legal and Regulatory Matters
    Categorizing Costs and Benefits
    Structured, Unbiased Analysis
    The Ideal
    Costs and Benefits.
    Table of Contents; Foreword; Preface; Acknowledgments; 1 Outsourging and Information Security; 2 Information Security Risks; 3 Justifying Outsourcing; 4 Risks of Outsourcing; 5 Categorizing Costs and Benefits; 6 Costs and Benefits Throughout the Evaluation Process; 7 The Outsourcing Evaluation Process-Customer and Outsourcer Requirements; 8 Outsourcing Security Functions and Security Considerations When Outsourcing; 9 Summary of the Outsourcing Process-Soup to Nuts; Appendix A; Appendix B; Appendix C; Selected Bibliography; About the Author; Index
  • OCLC Number: 56985843
    56420389
    559837668
  • Identifier: ISBN1580539556 (electronic bk.);ISBN9781580539555 (electronic bk.);ISBN9781580535311 (alk. paper);ISBN1580535313 (alk. paper)