ABSTRACT

Information Risk and Security explains the complex and diverse sources of risk for any organization and provides clear guidance and strategies to address these threats before they happen, and to investigate them, if and when they do. Edward Wilding focuses particularly on internal IT risk, workplace crime, and the preservation of evidence, because it is these areas that are generally so mismanaged. There is advice on: ¢ preventing computer fraud, IP theft and systems sabotage ¢ adopting control and security measures that do not hinder business operations but which effectively block criminal access and misuse ¢ securing information - in both electronic and hard copy form ¢ understanding and countering the techniques by which employees are subverted or entrapped into giving access to systems and processes ¢ dealing with catastrophic risk ¢ best-practice for monitoring and securing office and wireless networks ¢ responding to attempted extortion and malicious information leaks ¢ conducting covert operations and forensic investigations ¢ securing evidence where computer misuse occurs and presenting this evidence in court and much more. The author's clear and informative style mixes numerous case studies with practical, down-to-earth and easily implemented advice to help everyone with responsibility for this threat to manage it effectively. This is an essential guide for risk and security managers, computer auditors, investigators, IT managers, line managers and non-technical experts; all those who need to understand the threat to workplace computers and information systems.

chapter 1|14 pages

Perception of Risk

chapter 2|32 pages

Computer Fraud

chapter 4|20 pages

Password Misuse

chapter 5|10 pages

Trash Risk

chapter 6|6 pages

Wireless Risks

chapter 7|18 pages

Sabotage, Extortion and Blackmail

chapter 8|10 pages

Social Engineering

chapter 9|14 pages

Risks with Personal Computers

chapter 10|8 pages

Pornography

chapter 11|8 pages

Anonymous Letters 153

chapter 12|8 pages

Press Leaks

chapter 13|16 pages

Incident Response

chapter 14|32 pages

Ground Rules on Computer Evidence

chapter 15|16 pages

Covert Operations

chapter 16|16 pages

Analytical Modes

chapter 17|26 pages

Investigative Resources

chapter 18|6 pages

Computer Evidence in Court

chapter 19|14 pages

Exit Procedures

chapter 20|4 pages

Conclusion

part |2 pages

Appendices

chapter 3|2 pages

Search Orders

chapter 5|6 pages

Security Guidelines