Building a Worthy Case For Data Protection

September 2003
Bank Technology News;Sep2003, Vol. 16 Issue 9, p51
Trade Publication
Focuses on the measurement of the business value of data protection through Net Present Value (NPV) in the U.S. List of risk assessment steps for data protection; Significance of the steps for information technology professionals; Concept of NPV.


Related Articles

  • Security action plan. Bronson, Gary // eWeek;6/23/2003, Vol. 20 Issue 25, p49 

    People want to use secure products, but building an environment where data is safe means ongoing diligence, both in the use of technical best practices and in confronting social engineering threats through changes in individual and group behavior. With this in mind, the author decided to...

  • CYBERCRIME: Finding Security in Cyberspace. Campbell, Melissa // Alaska Business Monthly;Jun2002, Vol. 18 Issue 6, p60 

    Focuses on the measures recommended by the law enforcement and private sector to avoid computer hackers in the U.S. Relevance of risk assessment; Use of firewall protection; Need to change passwords for the files.

  • OVERCOMING OBSTACLES. Shumard, Craig; Beaulieu, Serge // Information Security;Nov2011, Vol. 13 Issue 9, p35 

    The article discusses the importance of improving the risk assessment program to ensure implementation of necessary security controls. According to the author, risk assessments, regardless of methodology used, are fundamentally subjective exercises with its results dependent on factors including...

  • Above and Beyond. HOLMQUIST, ERIC // Information Security;May2011, Vol. 13 Issue 4, p20 

    The article focuses on a comprehensive information security program that can promise data security and security compliance. The author says that one of the most important things to remember is that being complaint does not always mean a secure system. He cites that data inventory, risk inventory...

  • Protecting Sensitive Information: The Virtue of Self-Restraint. Boyd, Dallas // Homeland Security Affairs;2011, Vol. 7 Issue 1, p1 

    An abundance of information that could be useful to terrorists is available in the open literature. This information, unclassified but nonetheless sensitive, includes risk assessments that identify infrastructure vulnerabilities, analyses that hypothesize creative attacks, and otherwise...

  • Awareness Training: Strengthen Your Weakest Link:. Ali Pabrai, Uday O. // Certification Magazine;Aug2005, Vol. 7 Issue 8, p28 

    The article deals with the importance of security awareness training to businesses. Businesses must educate employees about the vulnerabilities of organizations' sensitive information, and share ways to protect that information on a regular basis. The amount and type of training depend on an...

  • Making your Mark ...or Digital Signature. Craik, Peter // Manager: British Journal of Administrative Management;Feb/Mar2007, Issue 57, p26 

    The article examines questions of electronic data protection and the protection of business documents and archives in the event of a physical disaster, such as a fire or flood, befalling a business enterprise. The importance of estimating risk to a business is stressed. The article discusses the...

  • Data Security: The Time Is Now. Delaney, John F.; Fischer, L. Richard; Kahn, Sherman W.; Kennedy, Charles H.; Warrington, Joan P.; Wugmeister, Miriam H. // Venulex Legal Summaries;2005 Q3, p1 

    The article focuses on the need for tougher data security policies in companies to protect themselves from information theft and liabilities resulting from such incidents. A credible data security policy begins with a thorough risk assessment to identify internal and external threats to the...

  • Personal dosimetry for interventional operators: when and how should monitoring be done? MARTIN, C. J. // British Journal of Radiology;Jul2011, Vol. 84 Issue 1003, p639 

    Objective: Assessment of the potential doses to the hands and eyes for interventional radiologists and cardiologists can be difficult. A review of studies of doses to interventional operators reported in the literature has been undertaken. Methods: Distributions for staff dose to relevant parts...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics