Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Title
Copyright
Foreword
Preface
About The Author
Acknowledgements
Contents
CHAPTER 1: INTRODUCTION TO INFORMATION SECURITY
CHAPTER 2: RISK MANAGEMENT
CHAPTER 3: THE COMPLEXITY OF RISK MANAGEMENT
CHAPTER 4: STAKEHOLDERS AND COMMUNICATION
CHAPTER 5: INFORMATION SECURITY GOVERNANCE
CHAPTER 6: PROBLEMS WITH POLICIES
CHAPTER 7: HOW SECURITY MANAGERS MAKE DECISIONS
CHAPTER 8: HOW USERS MAKE DECISIONS
There is no clear reason to comply
The cost of compliance is too high
There is an inability to comply
CHAPTER 9: SECURITY AND USABILITY
CHAPTER 10: SECURITY CULTURE
CHAPTER 11: THE PSYCHOLOGY OF COMPLIANCE
CHAPTER 12: CONCLUSION - CHANGING THE APPROACH TO SECURITY
Design
Culture
Supervision and sanctioning
APPENDIX: ANALOGIES
Analogy 1: Cake and Security
Analogy 2: Poker and Security
SOURCES
ITG RESOURCES
← Prev
Back
Next →
← Prev
Back
Next →