Information Technology Security Handbook
Informational and Communication Technologies (ICT) plays a fundamental role for social and economic development. Similarly, it is recognized that there cannot be an effective use of ICT in the absence of a safe and trusted ICT environment. Thus, IT...
Main Authors: | , , , , |
---|---|
Format: | Publication |
Language: | English en_US |
Published: |
Washington, DC: World Bank
2013
|
Subjects: | |
Online Access: | http://documents.worldbank.org/curated/en/2003/01/5155128/information-technology-security-handbook http://hdl.handle.net/10986/15005 |
id |
okr-10986-15005 |
---|---|
recordtype |
oai_dc |
spelling |
okr-10986-150052021-04-23T14:03:12Z Information Technology Security Handbook Sadowsky, George Dempsey, James X. Greenberg, Alan Mack, Barbara J. Schwartz, Alan ADEQUATE SECURITY APPLICATION SOFTWARE ASP BUILDING SECURITY BUSINESS INFORMATION COLLABORATION COMMUNICATION TECHNOLOGIES COMMUNICATIONS TECHNOLOGY COMPUTER CRIME COMPUTER NETWORKS COMPUTER SECURITY COMPUTER SYSTEMS COMPUTER USERS COMPUTERS COPYRIGHT COPYRIGHT PROTECTION COUNSEL CRIMINAL ACTIVITY CRIMINALS DATA SECURITY DEVELOPED COUNTRIES DIGITAL AGE DIGITAL DIVIDE DOCUMENTS E-BUSINESS E-COMMERCE E-GOVERNMENT ENCRYPTION FRAUD ICT INFORMATICS INFORMATION COMMUNICATION TECHNOLOGY INFORMATION PROCESSING INFORMATION SERVICES INFORMATION SHARING INFORMATION SYSTEMS INFORMATION TECHNOLOGY INNOVATION INSTANT MESSAGING INTERNATIONAL COMMUNITY INTERNATIONAL COOPERATION INTERNATIONAL TRADE INTERNET CULTURE INTERNET SECURITY KNOWLEDGE CREATION KNOWLEDGE SHARING KNOWLEDGE TRANSFER LEARNING LIABILITY LOCAL KNOWLEDGE MEDIA NATIONAL INFORMATION INFRASTRUCTURE NETWORK TRAFFIC NETWORKS NEW PRODUCTS ONLINE BANKING OPPORTUNITY COSTS OUTSOURCING PHONES PHYSICAL SECURITY POLICY POLITICAL ISSUES POSTAL SERVICES PRIVACY POLICIES PRODUCTIVITY PROGRAMS PROTOCOLS RISK EVALUATION ROUTERS SCIENCE & TECHNOLOGY SECURITY POLICIES SECURITY RISKS SECURITY THREATS SOCIAL DEVELOPMENT TECHNICAL ASPECTS TECHNICAL GUIDELINES TECHNOLOGY TECHNOLOGY DEVELOPMENT TELECOMMUNICATIONS TELEPHONY TEXT THREATS TRAINING WORKSHOPS UNIVERSITIES WORLD WIDE WEB Informational and Communication Technologies (ICT) plays a fundamental role for social and economic development. Similarly, it is recognized that there cannot be an effective use of ICT in the absence of a safe and trusted ICT environment. Thus, IT security plays a prime role in helping creating the environment needed to set the ground for implementing successful national ICT plans, e-Government or e-Commerce activities, as well as sectoral projects, such as, for example, in the areas of education, health, or finance. IT security is a complex topic and evolves almost as fast as technology does. The authors provide technology-independent best practices, as well as recommendations for particular IT environments. As technology evolves, the accompanying web site (www.infodev-security.net) will provide updates as appropriate, allowing for a constant dissemination of developments in the field of IT security. The book is composed of five parts, each of which can be read independently. After an introduction to general issues of IT security, the book addresses issues relevant specifically to individuals, small and medium organizations, government, and technical administrators. Although most of the research and publications on IT security comes from developed countries, the authors have attempted to provide practical guidance applicable anywhere and to include examples from developing countries. 2013-08-12T16:59:04Z 2013-08-12T16:59:04Z 2003 http://documents.worldbank.org/curated/en/2003/01/5155128/information-technology-security-handbook 0-9747888-0-5 http://hdl.handle.net/10986/15005 English en_US CC BY 3.0 IGO http://creativecommons.org/licenses/by/3.0/igo World Bank Washington, DC: World Bank Publications & Research :: Publication Publications & Research :: Publication |
repository_type |
Digital Repository |
institution_category |
Foreign Institution |
institution |
Digital Repositories |
building |
World Bank Open Knowledge Repository |
collection |
World Bank |
language |
English en_US |
topic |
ADEQUATE SECURITY APPLICATION SOFTWARE ASP BUILDING SECURITY BUSINESS INFORMATION COLLABORATION COMMUNICATION TECHNOLOGIES COMMUNICATIONS TECHNOLOGY COMPUTER CRIME COMPUTER NETWORKS COMPUTER SECURITY COMPUTER SYSTEMS COMPUTER USERS COMPUTERS COPYRIGHT COPYRIGHT PROTECTION COUNSEL CRIMINAL ACTIVITY CRIMINALS DATA SECURITY DEVELOPED COUNTRIES DIGITAL AGE DIGITAL DIVIDE DOCUMENTS E-BUSINESS E-COMMERCE E-GOVERNMENT ENCRYPTION FRAUD ICT INFORMATICS INFORMATION COMMUNICATION TECHNOLOGY INFORMATION PROCESSING INFORMATION SERVICES INFORMATION SHARING INFORMATION SYSTEMS INFORMATION TECHNOLOGY INNOVATION INSTANT MESSAGING INTERNATIONAL COMMUNITY INTERNATIONAL COOPERATION INTERNATIONAL TRADE INTERNET CULTURE INTERNET SECURITY KNOWLEDGE CREATION KNOWLEDGE SHARING KNOWLEDGE TRANSFER LEARNING LIABILITY LOCAL KNOWLEDGE MEDIA NATIONAL INFORMATION INFRASTRUCTURE NETWORK TRAFFIC NETWORKS NEW PRODUCTS ONLINE BANKING OPPORTUNITY COSTS OUTSOURCING PHONES PHYSICAL SECURITY POLICY POLITICAL ISSUES POSTAL SERVICES PRIVACY POLICIES PRODUCTIVITY PROGRAMS PROTOCOLS RISK EVALUATION ROUTERS SCIENCE & TECHNOLOGY SECURITY POLICIES SECURITY RISKS SECURITY THREATS SOCIAL DEVELOPMENT TECHNICAL ASPECTS TECHNICAL GUIDELINES TECHNOLOGY TECHNOLOGY DEVELOPMENT TELECOMMUNICATIONS TELEPHONY TEXT THREATS TRAINING WORKSHOPS UNIVERSITIES WORLD WIDE WEB |
spellingShingle |
ADEQUATE SECURITY APPLICATION SOFTWARE ASP BUILDING SECURITY BUSINESS INFORMATION COLLABORATION COMMUNICATION TECHNOLOGIES COMMUNICATIONS TECHNOLOGY COMPUTER CRIME COMPUTER NETWORKS COMPUTER SECURITY COMPUTER SYSTEMS COMPUTER USERS COMPUTERS COPYRIGHT COPYRIGHT PROTECTION COUNSEL CRIMINAL ACTIVITY CRIMINALS DATA SECURITY DEVELOPED COUNTRIES DIGITAL AGE DIGITAL DIVIDE DOCUMENTS E-BUSINESS E-COMMERCE E-GOVERNMENT ENCRYPTION FRAUD ICT INFORMATICS INFORMATION COMMUNICATION TECHNOLOGY INFORMATION PROCESSING INFORMATION SERVICES INFORMATION SHARING INFORMATION SYSTEMS INFORMATION TECHNOLOGY INNOVATION INSTANT MESSAGING INTERNATIONAL COMMUNITY INTERNATIONAL COOPERATION INTERNATIONAL TRADE INTERNET CULTURE INTERNET SECURITY KNOWLEDGE CREATION KNOWLEDGE SHARING KNOWLEDGE TRANSFER LEARNING LIABILITY LOCAL KNOWLEDGE MEDIA NATIONAL INFORMATION INFRASTRUCTURE NETWORK TRAFFIC NETWORKS NEW PRODUCTS ONLINE BANKING OPPORTUNITY COSTS OUTSOURCING PHONES PHYSICAL SECURITY POLICY POLITICAL ISSUES POSTAL SERVICES PRIVACY POLICIES PRODUCTIVITY PROGRAMS PROTOCOLS RISK EVALUATION ROUTERS SCIENCE & TECHNOLOGY SECURITY POLICIES SECURITY RISKS SECURITY THREATS SOCIAL DEVELOPMENT TECHNICAL ASPECTS TECHNICAL GUIDELINES TECHNOLOGY TECHNOLOGY DEVELOPMENT TELECOMMUNICATIONS TELEPHONY TEXT THREATS TRAINING WORKSHOPS UNIVERSITIES WORLD WIDE WEB Sadowsky, George Dempsey, James X. Greenberg, Alan Mack, Barbara J. Schwartz, Alan Information Technology Security Handbook |
description |
Informational and Communication
Technologies (ICT) plays a fundamental role for social and
economic development. Similarly, it is recognized that there
cannot be an effective use of ICT in the absence of a safe
and trusted ICT environment. Thus, IT security plays a prime
role in helping creating the environment needed to set the
ground for implementing successful national ICT plans,
e-Government or e-Commerce activities, as well as sectoral
projects, such as, for example, in the areas of education,
health, or finance. IT security is a complex topic and
evolves almost as fast as technology does. The authors
provide technology-independent best practices, as well as
recommendations for particular IT environments. As
technology evolves, the accompanying web site
(www.infodev-security.net) will provide updates as
appropriate, allowing for a constant dissemination of
developments in the field of IT security. The book is
composed of five parts, each of which can be read
independently. After an introduction to general issues of IT
security, the book addresses issues relevant specifically to
individuals, small and medium organizations, government, and
technical administrators. Although most of the research and
publications on IT security comes from developed countries,
the authors have attempted to provide practical guidance
applicable anywhere and to include examples from developing countries. |
format |
Publications & Research :: Publication |
author |
Sadowsky, George Dempsey, James X. Greenberg, Alan Mack, Barbara J. Schwartz, Alan |
author_facet |
Sadowsky, George Dempsey, James X. Greenberg, Alan Mack, Barbara J. Schwartz, Alan |
author_sort |
Sadowsky, George |
title |
Information Technology Security Handbook |
title_short |
Information Technology Security Handbook |
title_full |
Information Technology Security Handbook |
title_fullStr |
Information Technology Security Handbook |
title_full_unstemmed |
Information Technology Security Handbook |
title_sort |
information technology security handbook |
publisher |
Washington, DC: World Bank |
publishDate |
2013 |
url |
http://documents.worldbank.org/curated/en/2003/01/5155128/information-technology-security-handbook http://hdl.handle.net/10986/15005 |
_version_ |
1764426138772307968 |