TITLE

The seven sins of information risk management

AUTHOR(S)
Parapadakis, George
PUB. DATE
April 2007
SOURCE
IM@T.Online;Apr2007, p1
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article offers information on some faults committed during the management of information resources in a business organization that lead to information risk. Information risk refers to a possible event that prevents the proper use of information in a business organization. Selection of wrong information storage technologies can lead to accidental destruction or loss of information in an organization. Alteration and inaccuracy in business records also lead to information risk, which affects the success of a business.
ACCESSION #
25028386

 

Related Articles

  • Data Centers Aid HIPAA Compliance. Ferguson, Bill // Database Trends & Applications;Sep2004, Vol. 18 Issue 9, p8 

    When former U.S. President Bill Clinton signed the Health Insurance Portability and Accountability Act (HIPAA) in 1996, he established national standards for electronic health care transactions in the U.S. Part of HIPAA's mandate is establishing privacy and security standards that protect...

  • CDP: look before you leap. Staimer, Marc // Storage Magazine;Sep2006 Special Issue, Vol. 5 Issue 8, p22 

    The article offers pieces of advice on the possible replacement of traditional backup system with continuous data protection (CDP). This is a must-have technology which provides a recovery point objective and recovery time objective. CDP has the ability to rewind applications to any point in...

  • hidden threats to data. Benton, Dick // Storage Magazine;Oct2005, Vol. 4 Issue 8, p48 

    This article discusses the inadequacies in storage governance and weaknesses in data management. These inadequacies are often subtle and may pose far less-visible risks to a company's data. To mitigate these threats, one must be aware of the impact and probability of these risks to take...

  • Taking a Bite Out of Storage Woes.  // Storage Magazine;Oct2005, Vol. 4 Issue 8, p13 

    This article discusses the role of tiered storage infrastructure and Information Lifecycle Management practices in the improvement of data management. This entails allocating different types of data and applications to different classes of storage based on performance, availability and recovery...

  • Secure Online Backup Comes Of Age.  // Software World;Jul2013, Vol. 44 Issue 4, p9 

    The article discusses the importance for business organization to secure online backup of their data to ensure the continuity of their operation. It notes the result of the study conducted by the research firm Gartner, which shows that 50 percent of the businesses in Great Britain suffer...

  • Secure Set Union and Bag Union Computation for Guaranteeing Anonymity of Distrustful Participants. Böttcher, Stefan; Obermeier, Sebastian // Journal of Software (1796217X);Jan2008, Vol. 3 Issue 1, p9 

    The computation of the union operator for different distributed datasets involves two challenges when participants are curious and can even act malicious: guaranteeing anonymity and guaranteeing security. Anonymity means that the owner of a certain data item cannot be identified provided that...

  • We are not divided. Schwartau, Winn // Network World;11/22/2004, Vol. 21 Issue 47, p35 

    This article focuses on the unity of Americans when it comes to the subject of information technology. The most striking example of competitive partnerships might be seen in the nation's Information Sharing and Analysis Centers (ISAC), created by former President Bill Clinton's Presidential...

  • Legal Implications of the new Companies Act now facing Businesses. Fell, Jon // Credit Control;2005, Vol. 26 Issue 2, p16 

    The article discusses legal implications of new laws related to information sharing and data protection. Despite the reluctance of the past, there now appears to be a growing awareness at board level in companies of the importance of information security and the possible competitive advantages...

  • Depends on what the definition of WAS is. Johnson, Johna Till // Network World;8/23/2004, Vol. 21 Issue 34, p26 

    Wide-area storage (WAS) provides plenty of serious benefits. It lets companies protect data by storing it offsite in a location that is less likely than many headquarters to be a target for terrorists, hurricanes or earthquakes. It also provides the opportunity to house data in lower-cost real...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics