Wildy Logo
(020) 7242 5778
enquiries@wildy.com

Book of the Month

Cover of Derham on the Law of Set Off

Derham on the Law of Set Off

Price: £350.00

Lord Denning: Life, Law and Legacy



  


Welcome to Wildys

Watch


NEW EDITION
The Law of Rights of Light 2nd ed



 Jonathan Karas


Offers for Newly Called Barristers & Students

Special Discounts for Newly Called & Students

Read More ...


Secondhand & Out of Print

Browse Secondhand Online

Read More...


Christmas and New Year Closing

We are now closed for the Christmas and New Year period, reopening on Friday 3rd January 2025. Orders placed during this time will be processed upon our return on 3rd January.

Hide this message

Information Risk and Security: Preventing and Investigating Workplace Computer Crime


ISBN13: 9780566086854
ISBN: 0566086859
Published: April 2006
Publisher: Routledge
Country of Publication: UK
Format: Hardback
Price: £120.00



Despatched in 6 to 8 days.

Information Risk and Security explains the complex and diverse sources of risk for any organization and provides clear guidance and strategies to address these threats before they happen, and to investigate them, if and when they do. Edward Wilding focuses particularly on internal IT risk, workplace crime, and the preservation of evidence, because it is these areas that are generally so mismanaged.

There is advice on:-

  • preventing computer fraud, IP theft and systems sabotage
  • adopting control and security measures that do not hinder business operations but which effectively block criminal access and misuse
  • securing information - in both electronic and hard copy form
  • understanding and countering the techniques by which employees are subverted or entrapped into giving access to systems and processes
  • dealing with catastrophic risk
  • best-practice for monitoring and securing office and wireless networks
  • responding to attempted extortion and malicious information leaks
  • conducting covert operations and forensic investigations
  • securing evidence where computer misuse occurs and presenting this evidence in court
The author's clear and informative style mixes numerous case studies with practical, down-to-earth and easily implemented advice to help everyone with responsibility for this threat to manage it effectively. This is an essential guide for risk and security managers, computer auditors, investigators, IT managers, line managers and non-technical experts; all those who need to understand the threat to workplace computers and information systems.

Subjects:
IT, Internet and Artificial Intelligence Law
Contents:
Introduction
Perception of risk
Computer fraud
Espionage, intellectual property theft and leaks
Password misuse
Trash risk
Wireless risks
Sabotage, extortion and blackmail
Social engineering
Risks with personal computers
Pornography
Anonymous letters
Press leaks
Incident response
Ground rules on computer evidence
Covert operations
Analytical modes
Investigative resources
Computer evidence in court
Exit procedures
Conclusion
Appendices
Glossary
Index.