dashboard
Serie
The Psychology of Insider Threat Prevention
|
Overview
This book, the third of a four book series, introduces forty behavioral, psychological, management, and technical strategies that collectively enable organizations to unify Continuous Performance Management and other enterprise models with Insider Threat Prevention Cyber Security interventions. Recognizing the core functions of Cyber Security, including Identify, Protect, Detect, Respond, and Recover, do not adequately secure organizations against malicious or accidental insider attacks, the author has designed an Insider Threat Prevention strategic architecture that unifies the Insider Threat Prevention function with the enterprise architecture. Through this unification process, every organization becomes an Insider Threat Prevention Cyber Security enterprise that facilitates the success of all business units by recognizing and neutralizing every incidence of unacceptable insider intrusion.
With the constant incursion of very powerful and complicated information technologies into every corner of human life at work and home, the ascent of Insider Threat Prevention Cyber Security as an absolute necessity seems more than reasonable. Unfortunately, this ascent had not yet materialized for several reasons. In the first place, people generally view Insider Threat Prevention Cyber Security as just another kind of technical intrusion that interferes with daily life. People do not see the reasonableness of piling technology upon technology to better control technology. Secondly, Insider Threat Prevention Cyber Security is expensive in several ways, money and inconvenience. Insider Threat Prevention Cyber Security gets in the way by interfering with one's lifestyle and it depletes financial resources. Beyond these common objectives, people draw back from it because they do not what to life this way, everything, every word and every act, monitored every minute of every day at work, and perhaps at home for the home-bound employee. It is kind of spooky to work in a fish bowl. In the modern workplace people want to be trusted and be coached, but not managed and certainly not monitored throughout the day.
This is just scratching the surface. When asked about Insider Threat Prevention Cyber Security, people think that it is a good idea for other organizations, but their organization never does anything dubious enough to raise the concern of managers. However, management absolutely should monitor people in the other departments because one can never be too sure what is going on in the world of today. As management begins to summarize the conflicting opinions and attitudes about Insider Threat Prevention Cyber Security throughout the enterprise, they can clearly see that Insider Threat Prevention Cyber Security is essential to the safe governance and operations of the information technology assets, including people and data.
The author wrote this series to guide management and their organizations through the pitfalls and tarpits of designing and implementing a unified Continuous Performance Management and Insider Threat Prevention Cyber Security Program.
Título : Implementing Insider Threat Prevention Cyber Security
EAN : 9781393353782
Editorial : Systems Management Institute
El libro electrónico Implementing Insider Threat Prevention Cyber Security está en formato ePub protegido por CARE
¿Quieres leer en un eReader de otra marca? Sigue nuestra guía.
Puede que no esté disponible para la venta en tu país, sino sólo para la venta desde una cuenta en Francia.
Si la redirección no se produce automáticamente, haz clic en este enlace.
Conectarme
Mi cuenta