TITLE

IT controls cut costs

PUB. DATE
March 1995
SOURCE
Accountancy;Mar1995, Vol. 115 Issue 1219, p72
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article describes the information security standard certification from the British Standards Institution titled "British Standards 7799 for Information Security Management." The accreditation covers the assessment of existing information technology security and the establishment of formal security procedures.
ACCESSION #
9504211207

 

Related Articles

  • Security Certification--The Big Winner. Tittel, Ed // Certification Magazine;Feb2003, Vol. 5 Issue 2, pSG2 

    Comments on security certifications in the information technology (IT) industry. Features for IT certification; Advantage of security certification choices to IT vendors; Considerations in the selection of security programs.

  • What IT Staff Worry About Most. Frenkel, Karen A. // CIO Insight;10/9/2013, p2 

    The article presents the result of a survey among information technology (IT) executives conducted by EiQ Networks, a company that offers security, risk and compliance solutions. The survey reveals that IT professionals deal with security issues covering external data breach for financial gain,...

  • IPSes ready for prime time. Sturdevant, Cameron // eWeek;3/29/2004, Vol. 21 Issue 13, p37 

    The term security bulletin is becoming something of a misnomer, as reports of holes and of worms and viruses taking advantage of those holes, are becoming part of the daily information technology routine. It's not enough to be alerted when problems occur; IT managers must find a way to dump...

  • I'm An Alien -- An Illegal Alien. MacLeod, Calum // Software World;Jul2011, Vol. 42 Issue 4, p16 

    In this article the author shares his views on the failure for information technology (IT) security world to properly implement best practices associated with the expiry of encryption keys and certificates. He discusses several ways in managing certificates which include tracking certificate...

  • Preventive measures. Fonseca, Brian // InfoWorld;4/7/2003, Vol. 25 Issue 14, p1 

    Focuses on concerns regarding the effectiveness of intrusion prevention systems and intrusion detection systems in delivering enterprise network security. Issues considering information technology and enterprise security. INSET: PREVENTION POSSIBILITIES.

  • An Installer's Options for Networked Security Cabling. Engebretson, David // SDM: Security Distributing & Marketing;Jun2005, Vol. 35 Issue 6, p90 

    This article focuses on networked security cabling. When planning the connection paths of a network security system, installing companies can be confronted with a variety of potential cabling options. Most structured cabling installations that a security firm might encounter will generally...

  • Untitled. Meehra, Deepak // Computer Weekly;10/24/2006, p28 

    The article presents a query related to Information Technology (IT) security. One person had graduated in computer science, and has been working in desktop support and doing minor project work. He wants to know how to move into security, and get certified as an MCSA. An IT consultant advises him...

  • OPTIMIZING AND ANALYSING THE EFFECTIVENESS OF SECURITY HARDENING MEASURES USING VARIOUS OPTIMIZATION TECHNIQUES AS WELL AS NETWORK MANAGEMENT MODELS GIVING SPECIAL EMPHASIS TO ATTACK TREE MODEL. Vishwakarma, Prabhat Kumar // International Journal of Network Security & Its Applications;Jul2011, Vol. 3 Issue 4, p100 

    To cope up the network security measures with the financial restrictions in the corporate world is still a challenge. At global scenario the tradeoff between the protection of IT infrastructure and the financial boundation for any organization using IT as valuable resource is quite essential....

  • The basics of good security.  // Computer Weekly;9/19/2006, p30 

    The article focuses on the importance of maintaining effective Information Technology (IT) security in organizations. Companies make efforts to block every gap in their networks to secure data. IT directors have to give attention to the changing techniques that threaten the business priorities....

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics