ebook img

Artech House, Outsourcing Information Security PDF

277 Pages·2004·2.39 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Artech House, Outsourcing Information Security

TLFeBOOK Outsourcing Information Security TLFeBOOK ForacompletelistingoftheArtechHouseComputerSecuritySeries, turntothebackofthisbook. TLFeBOOK Outsourcing Information Security C. Warren Axelrod Artech House Boston • London www.artechhouse.com TLFeBOOK LibraryofCongressCataloging-in-PublicationData AcatalogrecordforthisbookisavailablefromtheLibraryofCongress BritishLibraryCataloguinginPublicationData AcatalogrecordforthisbookisavailablefromtheBritishLibrary. CoverdesignbyIgorValdman ©2004ARTECHHOUSE,INC. 685CantonStreet Norwood,MA02062 All rights reserved. Printed and bound in the United States of America. No part of this book maybereproducedorutilizedinanyformorbyanymeans,electronicormechanical,including photocopying,recording,orbyanyinformationstorageandretrievalsystem,withoutpermission inwritingfromthepublisher. Alltermsmentionedinthisbookthatareknowntobetrademarksorservicemarkshavebeen appropriatelycapitalized.ArtechHousecannotattesttotheaccuracyofthisinformation.Useof aterminthisbookshouldnotberegardedasaffectingthevalidityofanytrademarkorservice mark. InternationalStandardBookNumber:1-58053-531-3 10987654321 TLFeBOOK Tomyownin-housesupportteam:Judy,David,andElizabeth TLFeBOOK . TLFeBOOK Contents Foreword xv Preface xix Acknowledgments xxv 1 OutsourcingandInformationSecurity 1 First…SomeDefinitions 2 Second…AClarification 2 Y2KasaTurningPoint 3 ThePostY2KOutsourcingSpeedBump 5 ShakyManagedSecurityServicesProviders 6 APrognosis 7 TheInformationSecurityMarket 8 References 9 2 InformationSecurityRisks 11 Threats 11 FromInternalSources 11 FromExternalSources 13 vii TLFeBOOK viii OutsourcingInformationSecurity ReviewofThreats 16 Vulnerabilities 17 ComputerSystemsandNetworks 17 SoftwareDevelopment 17 SystemicRisks 18 OperationalRisk 19 OperatorandAdministratorRisk 20 ComplexityRisk 21 Life-CycleRisk 21 RisksofObsolescence 23 VendorViabilityRisk 24 RiskofPoorQualitySupport 24 ConversionRisk 24 RiskofDependencyonKeyIndividuals 25 Summary 25 References 25 3 JustifyingOutsourcing 27 ProfessedReasonstoOutsource 27 TheBasisforDecision 28 ReasonsforConsideringOutsourcing 28 CostSavings 29 Performance 35 Security 37 Expertise 40 ComputerApplications 41 Support 43 FinancialArrangements 45 Summary 47 TheOtherSideoftheOutsourcingDecision 48 References 48 4 RisksofOutsourcing 49 LossofControl 49 TLFeBOOK Contents ix ViabilityofServiceProviders 50 ReasonsforAbandoningService 54 RelativeSizeofCustomer 55 QualityofService 56 Tangibles 56 Reliability 56 Responsiveness 57 Assurance 57 Empathy 57 Definitions 59 TheIssueofTrust 59 PerformanceofApplicationsandServices 62 LackofExpertise 63 HiddenandUncertainCosts 63 LimitedCustomizationandEnhancements 66 KnowledgeTransfer 66 SharedEnvironments 67 LegalandRegulatoryMatters 67 SummaryandConclusion 68 References 68 5 CategorizingCostsandBenefits 71 Structured,UnbiasedAnalysis—TheIdeal 71 CostsandBenefits 72 TangibleVersusIntangibleCostsandBenefits 72 ObjectiveVersusSubjectiveCostsandBenefits 72 DirectVersusIndirectCostsandBenefits 73 ControllableVersusNoncontrollableCostsandBenefits 73 CertainVersusProbabilisticCostsandBenefits 73 FixedVersusVariableCostsandBenefits 73 One-TimeVersusOngoingCostsandBenefits 74 Tangible-Objective-DirectCostsandBenefits 75 TLFeBOOK

Description:
For a complete listing of the Artech House Computer Security Series, turn to the back of this book. TLFeBOOK 1. Outsourcing and Information Security. 1. First … Some Definitions. 2. Second … A Clarification. 2. Y2K as a Turning Point. 3. The Post Y2K Outsourcing Speed Bump. 5. Shaky Managed
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.