Integrated Behavior: Improvement Over Stovepipes

Schwartau, Winn
September 2008
Security: Solutions for Enterprise Security Leaders;Sep2008, Vol. 45 Issue 9, p128
Trade Publication
The article presents the information security of Whistler Cougar Corp. (WCC). WCC has over 22,000 employees in 34 countries and it takes information security very seriously. Its business units include hotels, finance, food, and travel and tourism. The company has to comply with a wide range of governances in the U.S. The company has begun a program to phase out Windows at the end-points of their networks in favor of Linux and Mac OSX.


Related Articles

  • SECURITY A TOP 10 TECH CONCERN.  // Practical Accountant;Apr2007, Vol. 40 Issue 4, p18 

    A list of the top 10 information security management issues in 2007 is presented. The number one factor that has a powerful impact over businesses is the protection of critical systems and information. Next, is identity and access management. Such technologies involve the application of...

  • Graphical Password Security Evaluation by Fuzzy AHP. Lashkari, Arash Habibi; Manaf, Azizah Abdul; Masrom, Maslin // World Academy of Science, Engineering & Technology;2012, Issue 66, p289 

    In today's day and age, one of the important topics in information security is authentication. There are several alternatives to text-based authentication of which includes Graphical Password (GP) or Graphical User Authentication (GUA). These methods stems from the fact that humans recognized...

  • THE GREAT PRIORITY PUZZLE. Samani, Raj // Computer Weekly;4/15/2008, p24 

    The article presents the author's views on information security. The author thinks that compliance, security and operability are interlinked risk objectives for an organisation. According to the author, more regulation and greater reliance on internet will drive security demand. It is stated...

  • SECURITY POLICIES AND PROCEDURES. Pabrai, Uday O. Ali // Certification Magazine;May2004, Vol. 6 Issue 5, p52 

    The article provides guidelines on the development and implementation of security policies and procedures in an organization's information security program. The objective of developing security policies should include the development of information security and other security policy documents,...

  • Vendors line up to see Jericho vision. Condon, Ron // SC Magazine: For IT Security Professionals (UK Edition);Feb2005, p12 

    This article reports on the white paper that will be published in February 2005 with the goal of outlining the future of information security. It will be the product of a year's intensive discussion between a group of global organizations. It started in Europe, but now encompasses the developed...

  • Expression of Security Policy in Medical Systems for Electronic Healthcare Records. Lea, Nathan C.; Austin, Tony; Hailes, Stephen; Kalra, Dipak // Proceedings of World Academy of Science: Engineering & Technolog;May2009, Vol. 53, p711 

    This paper introduces a tool that is being developed for the expression of information security policy controls that govern electronic healthcare records. By reference to published findings, the paper introduces the theory behind the use of knowledge management for automatic and consistent...

  • Companies forced to reconsider security as SHA-1 code is broken. Mohamed, Arif // Computer Weekly;3/8/2005, p14 

    The article presents information on companies who were forced to reconsider security as SHA-1 code. Security researchers at Shandong University in China reported last week that the SHA-1 encryption method can be cracked in days. Richard Brain, technical director at security consultancy...

  • Computer misuse in the workplace. H. M. P. S. Herath; Wijayanayake, W. M. J. I. // Journal of Business Continuity & Emergency Planning;May2009, Vol. 3 Issue 3, p259 

    Many information security specialists believe that promoting good end-user behaviour and restricting inappropriate end-user behaviour are vital for effective information security. Because of the importance of security-related end-user behaviour, it is important to have a systematic viewpoint on...

  • IS Security Requirements Identification from Conceptual Models in Systems Analysis and Design: The Fun & Fitness, Inc. Case. Spears, Janine L.; Parrish Jr., James L. // Journal of Information Systems Education;Spring2013, Vol. 24 Issue 1, p17 

    This teaching case introduces students to a relatively simple approach to identifying and documenting security requirements within conceptual models that are commonly taught in systems analysis and design courses. An introduction to information security is provided, followed by a classroom...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics