Read Anywhere and on Any Device!

Subscribe to Read | $0.00

Join today and start reading your favorite books for Free!

Read Anywhere and on Any Device!

  • Download on iOS
  • Download on Android
  • Download on iOS

Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy

Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy

Richard Warner
0/5 ( ratings)
The wave of data breaches raises two pressing questions: Why don't we defend our networks better? And, what practical incentives can we create to improve our defenses?
Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy
answers those questions. It distinguishes three technical sources of data breaches corresponding to three types of vulnerabilities: software, human, and network. It discusses two risk management goals: business and consumer. The authors propose mandatory anonymous reporting of information as an essential step toward better defense, as well as a general reporting requirement. They also provide a systematic overview of data breach defense, combining technological and public policy considerations.

Features



Explains why data breach defense is currently often ineffective

Shows how to respond to the increasing frequency of data breaches

Combines the issues of technology, business and risk management, and legal liability

Discusses the different issues faced by large versus small and medium-sized businesses

Provides a practical framework in which public policy issues about data breaches can be effectively addressed
Pages
108
Format
Hardcover
Publisher
CRC Press
Release
July 15, 2019
ISBN
0815356625
ISBN 13
9780815356622

Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy

Richard Warner
0/5 ( ratings)
The wave of data breaches raises two pressing questions: Why don't we defend our networks better? And, what practical incentives can we create to improve our defenses?
Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy
answers those questions. It distinguishes three technical sources of data breaches corresponding to three types of vulnerabilities: software, human, and network. It discusses two risk management goals: business and consumer. The authors propose mandatory anonymous reporting of information as an essential step toward better defense, as well as a general reporting requirement. They also provide a systematic overview of data breach defense, combining technological and public policy considerations.

Features



Explains why data breach defense is currently often ineffective

Shows how to respond to the increasing frequency of data breaches

Combines the issues of technology, business and risk management, and legal liability

Discusses the different issues faced by large versus small and medium-sized businesses

Provides a practical framework in which public policy issues about data breaches can be effectively addressed
Pages
108
Format
Hardcover
Publisher
CRC Press
Release
July 15, 2019
ISBN
0815356625
ISBN 13
9780815356622

More books from Richard Warner

Rate this book!

Write a review?

loader