From data breach to information stewardship
نویسنده
چکیده
This journal and the individual contributions contained in it are protected under copyright by Elsevier Ltd, and the following terms and conditions apply to their use: Photocopying Single photocopies of single articles may be made for personal use as allowed by national copyright laws. Permission of the publisher and payment of a fee is required for all other photocopying, including multiple or systematic copying, copying for advertising or promotional purposes, resale, and all forms of document delivery. Special rates are available for educational institutions that wish to make photocopies for non-profit educational classroom use. L oss and theft of information from organisations continues to be a significant problem. Why do these leaks still occur and what can be done to improve matters? People would not treat money with the same disregard that they treat information and data. Taking care to look after property that is not your own is called stewardship, and what is needed is better information stewardship, explains Mike Small, a member of the London Chapter of the ISACA Security Advisory Group. This journal and the individual contributions contained in it are protected under copyright by Elsevier Ltd, and the following terms and conditions apply to their use: Photocopying Single photocopies of single articles may be made for personal use as allowed by national copyright laws. Permission of the publisher and payment of a fee is required for all other photocopying, including multiple or systematic copying, copying for advertising or promotional purposes, resale, and all forms of document delivery. Special rates are available for educational institutions that wish to make photocopies for non-profit educational classroom use. NEWS Silk Road online drug market taken down 1 Mobile malware tops one million, but Google says problem exaggerated 2 FEATURES From data breach to information stewardship 5 Organisations need to start treating data the same way they treat money. People handle data that isn't theirs, so what's needed is a proper sense of stewardship, argues Mike Small, a member of the London Chapter of the ISACA Security Advisory Group. Deployment and management with next-generation firewalls 8 The Next-Generation Firewall (NGFW) delivers a great deal of additional capability over traditional devices. But with that comes extra deployment and management overhead. Sam Erdheim of AlgoSec describes an approach to sizing and deploying NGFWs in users' environments, and to managing firewall policies, to minimise complexity. Privilege management – the industry's best-kept secret 12 The …
منابع مشابه
Method to assess identifiability in electronic data files.
The authors developed the Record Uniqueness (RU) software program to assess electronic data files for risk of confidentiality breach based on unique combinations of key variables. The underlying methodology utilized by the RU program generates a frequency distribution for every variable selected for analysis and for all combinations of the variables selected. In addition, the program provides t...
متن کاملEvaluating the Quality and Usefulness of Data Breach Information Systems
As the nation confronts a growing tide of security breaches, the importance of having quality data breach information systems becomes paramount. Yet too little attention is paid to evaluating these systems. This article draws on data quality scholarship to develop a yardstick that assesses the quality of data breach notification systems in the U.S. at both the state and national levels from the...
متن کاملDigital Stewardship Education at the Graduate School of Library & Information Science, Simmons College
This paper describes two initiatives based in the Graduate School of Library and Information Science, Simmons College that contribute to meeting educational and training needs in digital stewardship: the online Digital Stewardship Certificate and the Digital Curriculum Laboratory. Keywords—Digital, curation, stewardship, Digital Stewardship Certificate, Digital Curriculum Laboratory, Simmons.
متن کاملAnalysing the Stewardship Function in Botswana’s Health System: Reflecting on the Past, Looking to the Future
Background In many parts of the world, ongoing deficiencies in health systems compromise the delivery of health interventions. The World Health Organization (WHO) identified four functions that health systems need to perform to achieve their goals: Efforts to strengthen health systems focus on the way these functions are carried out. While a number of studies on health systems functions have be...
متن کاملHuman Resource Management Practices and organization Turnover Intentions; A review of the mediating role of Psychological Contract Breach
The main goal of this research has been investigating the impact of human resource management practices on the employee turnover intentions by considering psychological contract breach in the gas company of Rasht. So, it's considered an applied research, in terms of its goals, a descriptive survey, in terms of information gathering and correlational in terms of the interrelation between the res...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Network Security
دوره 2013 شماره
صفحات -
تاریخ انتشار 2013