Information Security: Managing the Legal RisksCCH Australia Limited, 2009 |
Turinys
1 skirsnis. | |
2 skirsnis. | |
3 skirsnis. | |
4 skirsnis. | |
5 skirsnis. | |
6 skirsnis. | |
7 skirsnis. | |
8 skirsnis. | |
14 skirsnis. | |
15 skirsnis. | |
16 skirsnis. | |
17 skirsnis. | |
18 skirsnis. | |
19 skirsnis. | |
20 skirsnis. | |
21 skirsnis. | |
9 skirsnis. | |
10 skirsnis. | |
11 skirsnis. | |
12 skirsnis. | |
13 skirsnis. | |
22 skirsnis. | |
23 skirsnis. | |
24 skirsnis. | |
Kiti leidimai - Peržiūrėti viską
Pagrindiniai terminai ir frazės
accessed September 2009 acquiring bank action agreement andthe application assessment assets attack Australian botnet breachof chapter claim common law company’s compliance conduct confidential information contract corporate courts credit card criminal Cybercrime damage data centre data storage devices database devices directors documented downloaded duty duty of care employees encryption ensuring example exploit firewall Footnotes forexample hacker hacking identified identity theft implementing information security regime informationsecurity infrastructure inthe issuing banks Keystroke Logging laptop leakage liability litigation loss malicious Malware negligence ofthe onthe operating organisation organisation’s particularly parties password patch management PCI DSS perspective plaintiff policies and procedures potential practical reasonable regarding requirements result risk management scenario section 52 security incidents security policies sensitive server Snide specific staff standard thatthe theft tort tothe unauthorised USB stick vicarious liability vulnerabilities Whilst