Information Technology Security Handbook

Informational and Communication Technologies (ICT) plays a fundamental role for social and economic development. Similarly, it is recognized that there cannot be an effective use of ICT in the absence of a safe and trusted ICT environment. Thus, IT...

Full description

Bibliographic Details
Main Authors: Sadowsky, George, Dempsey, James X., Greenberg, Alan, Mack, Barbara J., Schwartz, Alan
Format: Publication
Language:English
en_US
Published: Washington, DC: World Bank 2013
Subjects:
Online Access:http://documents.worldbank.org/curated/en/2003/01/5155128/information-technology-security-handbook
http://hdl.handle.net/10986/15005
id okr-10986-15005
recordtype oai_dc
spelling okr-10986-150052021-04-23T14:03:12Z Information Technology Security Handbook Sadowsky, George Dempsey, James X. Greenberg, Alan Mack, Barbara J. Schwartz, Alan ADEQUATE SECURITY APPLICATION SOFTWARE ASP BUILDING SECURITY BUSINESS INFORMATION COLLABORATION COMMUNICATION TECHNOLOGIES COMMUNICATIONS TECHNOLOGY COMPUTER CRIME COMPUTER NETWORKS COMPUTER SECURITY COMPUTER SYSTEMS COMPUTER USERS COMPUTERS COPYRIGHT COPYRIGHT PROTECTION COUNSEL CRIMINAL ACTIVITY CRIMINALS DATA SECURITY DEVELOPED COUNTRIES DIGITAL AGE DIGITAL DIVIDE DOCUMENTS E-BUSINESS E-COMMERCE E-GOVERNMENT ENCRYPTION FRAUD ICT INFORMATICS INFORMATION COMMUNICATION TECHNOLOGY INFORMATION PROCESSING INFORMATION SERVICES INFORMATION SHARING INFORMATION SYSTEMS INFORMATION TECHNOLOGY INNOVATION INSTANT MESSAGING INTERNATIONAL COMMUNITY INTERNATIONAL COOPERATION INTERNATIONAL TRADE INTERNET CULTURE INTERNET SECURITY KNOWLEDGE CREATION KNOWLEDGE SHARING KNOWLEDGE TRANSFER LEARNING LIABILITY LOCAL KNOWLEDGE MEDIA NATIONAL INFORMATION INFRASTRUCTURE NETWORK TRAFFIC NETWORKS NEW PRODUCTS ONLINE BANKING OPPORTUNITY COSTS OUTSOURCING PHONES PHYSICAL SECURITY POLICY POLITICAL ISSUES POSTAL SERVICES PRIVACY POLICIES PRODUCTIVITY PROGRAMS PROTOCOLS RISK EVALUATION ROUTERS SCIENCE & TECHNOLOGY SECURITY POLICIES SECURITY RISKS SECURITY THREATS SOCIAL DEVELOPMENT TECHNICAL ASPECTS TECHNICAL GUIDELINES TECHNOLOGY TECHNOLOGY DEVELOPMENT TELECOMMUNICATIONS TELEPHONY TEXT THREATS TRAINING WORKSHOPS UNIVERSITIES WORLD WIDE WEB Informational and Communication Technologies (ICT) plays a fundamental role for social and economic development. Similarly, it is recognized that there cannot be an effective use of ICT in the absence of a safe and trusted ICT environment. Thus, IT security plays a prime role in helping creating the environment needed to set the ground for implementing successful national ICT plans, e-Government or e-Commerce activities, as well as sectoral projects, such as, for example, in the areas of education, health, or finance. IT security is a complex topic and evolves almost as fast as technology does. The authors provide technology-independent best practices, as well as recommendations for particular IT environments. As technology evolves, the accompanying web site (www.infodev-security.net) will provide updates as appropriate, allowing for a constant dissemination of developments in the field of IT security. The book is composed of five parts, each of which can be read independently. After an introduction to general issues of IT security, the book addresses issues relevant specifically to individuals, small and medium organizations, government, and technical administrators. Although most of the research and publications on IT security comes from developed countries, the authors have attempted to provide practical guidance applicable anywhere and to include examples from developing countries. 2013-08-12T16:59:04Z 2013-08-12T16:59:04Z 2003 http://documents.worldbank.org/curated/en/2003/01/5155128/information-technology-security-handbook 0-9747888-0-5 http://hdl.handle.net/10986/15005 English en_US CC BY 3.0 IGO http://creativecommons.org/licenses/by/3.0/igo World Bank Washington, DC: World Bank Publications & Research :: Publication Publications & Research :: Publication
repository_type Digital Repository
institution_category Foreign Institution
institution Digital Repositories
building World Bank Open Knowledge Repository
collection World Bank
language English
en_US
topic ADEQUATE SECURITY
APPLICATION SOFTWARE
ASP
BUILDING SECURITY
BUSINESS INFORMATION
COLLABORATION
COMMUNICATION TECHNOLOGIES
COMMUNICATIONS TECHNOLOGY
COMPUTER CRIME
COMPUTER NETWORKS
COMPUTER SECURITY
COMPUTER SYSTEMS
COMPUTER USERS
COMPUTERS
COPYRIGHT
COPYRIGHT PROTECTION
COUNSEL
CRIMINAL ACTIVITY
CRIMINALS
DATA SECURITY
DEVELOPED COUNTRIES
DIGITAL AGE
DIGITAL DIVIDE
DOCUMENTS
E-BUSINESS
E-COMMERCE
E-GOVERNMENT
ENCRYPTION
FRAUD
ICT
INFORMATICS
INFORMATION COMMUNICATION TECHNOLOGY
INFORMATION PROCESSING
INFORMATION SERVICES
INFORMATION SHARING
INFORMATION SYSTEMS
INFORMATION TECHNOLOGY
INNOVATION
INSTANT MESSAGING
INTERNATIONAL COMMUNITY
INTERNATIONAL COOPERATION
INTERNATIONAL TRADE
INTERNET CULTURE
INTERNET SECURITY
KNOWLEDGE CREATION
KNOWLEDGE SHARING
KNOWLEDGE TRANSFER
LEARNING
LIABILITY
LOCAL KNOWLEDGE
MEDIA
NATIONAL INFORMATION INFRASTRUCTURE
NETWORK TRAFFIC
NETWORKS
NEW PRODUCTS
ONLINE BANKING
OPPORTUNITY COSTS
OUTSOURCING
PHONES
PHYSICAL SECURITY
POLICY
POLITICAL ISSUES
POSTAL SERVICES
PRIVACY POLICIES
PRODUCTIVITY
PROGRAMS
PROTOCOLS
RISK EVALUATION
ROUTERS
SCIENCE & TECHNOLOGY
SECURITY POLICIES
SECURITY RISKS
SECURITY THREATS
SOCIAL DEVELOPMENT
TECHNICAL ASPECTS
TECHNICAL GUIDELINES
TECHNOLOGY
TECHNOLOGY DEVELOPMENT
TELECOMMUNICATIONS
TELEPHONY
TEXT
THREATS
TRAINING WORKSHOPS
UNIVERSITIES
WORLD WIDE WEB
spellingShingle ADEQUATE SECURITY
APPLICATION SOFTWARE
ASP
BUILDING SECURITY
BUSINESS INFORMATION
COLLABORATION
COMMUNICATION TECHNOLOGIES
COMMUNICATIONS TECHNOLOGY
COMPUTER CRIME
COMPUTER NETWORKS
COMPUTER SECURITY
COMPUTER SYSTEMS
COMPUTER USERS
COMPUTERS
COPYRIGHT
COPYRIGHT PROTECTION
COUNSEL
CRIMINAL ACTIVITY
CRIMINALS
DATA SECURITY
DEVELOPED COUNTRIES
DIGITAL AGE
DIGITAL DIVIDE
DOCUMENTS
E-BUSINESS
E-COMMERCE
E-GOVERNMENT
ENCRYPTION
FRAUD
ICT
INFORMATICS
INFORMATION COMMUNICATION TECHNOLOGY
INFORMATION PROCESSING
INFORMATION SERVICES
INFORMATION SHARING
INFORMATION SYSTEMS
INFORMATION TECHNOLOGY
INNOVATION
INSTANT MESSAGING
INTERNATIONAL COMMUNITY
INTERNATIONAL COOPERATION
INTERNATIONAL TRADE
INTERNET CULTURE
INTERNET SECURITY
KNOWLEDGE CREATION
KNOWLEDGE SHARING
KNOWLEDGE TRANSFER
LEARNING
LIABILITY
LOCAL KNOWLEDGE
MEDIA
NATIONAL INFORMATION INFRASTRUCTURE
NETWORK TRAFFIC
NETWORKS
NEW PRODUCTS
ONLINE BANKING
OPPORTUNITY COSTS
OUTSOURCING
PHONES
PHYSICAL SECURITY
POLICY
POLITICAL ISSUES
POSTAL SERVICES
PRIVACY POLICIES
PRODUCTIVITY
PROGRAMS
PROTOCOLS
RISK EVALUATION
ROUTERS
SCIENCE & TECHNOLOGY
SECURITY POLICIES
SECURITY RISKS
SECURITY THREATS
SOCIAL DEVELOPMENT
TECHNICAL ASPECTS
TECHNICAL GUIDELINES
TECHNOLOGY
TECHNOLOGY DEVELOPMENT
TELECOMMUNICATIONS
TELEPHONY
TEXT
THREATS
TRAINING WORKSHOPS
UNIVERSITIES
WORLD WIDE WEB
Sadowsky, George
Dempsey, James X.
Greenberg, Alan
Mack, Barbara J.
Schwartz, Alan
Information Technology Security Handbook
description Informational and Communication Technologies (ICT) plays a fundamental role for social and economic development. Similarly, it is recognized that there cannot be an effective use of ICT in the absence of a safe and trusted ICT environment. Thus, IT security plays a prime role in helping creating the environment needed to set the ground for implementing successful national ICT plans, e-Government or e-Commerce activities, as well as sectoral projects, such as, for example, in the areas of education, health, or finance. IT security is a complex topic and evolves almost as fast as technology does. The authors provide technology-independent best practices, as well as recommendations for particular IT environments. As technology evolves, the accompanying web site (www.infodev-security.net) will provide updates as appropriate, allowing for a constant dissemination of developments in the field of IT security. The book is composed of five parts, each of which can be read independently. After an introduction to general issues of IT security, the book addresses issues relevant specifically to individuals, small and medium organizations, government, and technical administrators. Although most of the research and publications on IT security comes from developed countries, the authors have attempted to provide practical guidance applicable anywhere and to include examples from developing countries.
format Publications & Research :: Publication
author Sadowsky, George
Dempsey, James X.
Greenberg, Alan
Mack, Barbara J.
Schwartz, Alan
author_facet Sadowsky, George
Dempsey, James X.
Greenberg, Alan
Mack, Barbara J.
Schwartz, Alan
author_sort Sadowsky, George
title Information Technology Security Handbook
title_short Information Technology Security Handbook
title_full Information Technology Security Handbook
title_fullStr Information Technology Security Handbook
title_full_unstemmed Information Technology Security Handbook
title_sort information technology security handbook
publisher Washington, DC: World Bank
publishDate 2013
url http://documents.worldbank.org/curated/en/2003/01/5155128/information-technology-security-handbook
http://hdl.handle.net/10986/15005
_version_ 1764426138772307968