The Enemy at the Gates II: The Enemy Within

The Enemy at the Gates II: The Enemy Within
The Enemy at the Gates II: The Enemy Within
File Size:
210.15 kB
Author:
Michael E. Whitman, Herbert J. Mattord
Date:
01 July 2011
Downloads:
2417 x

The effort to secure cyberspace continues unabated. Yet, losses continue to mount. If we are to gain ground in this effort, we must understand our adversaries and the mechanisms they use to inflict losses. When we know the threats facing our information assets and the potential losses the assets face, we can begin to build more effective defenses using well defined risk management methodologies. This paper examines top computer executives’ perspectives on current threats to information security, and compares those threats to a previous study from 2002.

 
 
Powered by Phoca Download