Have data? Will travel [IT security threat]

Access Full Text

Have data? Will travel [IT security threat]

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Engineering & Technology — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

This paper deals with IT security threats. Just when organizations felt they were gaining the upper hand in their defence against external IT security threats, comes a rise in problems caused by internal risk factors. Often termed the 'enemy within', malicious hacks on the enterprise system launched from the system itself remain in the minority compared to instances of data leakage-the unintentional and/or illicit loss of secure information into an insecure environment. Organization's that bother to check are finding that considerable quantities of data are trotting out through the staff entrance. Trend's Corporate end user study 2008, which surveyed 1,600 corporate end-users, found that the loss of proprietary company data and information was ranked as the second most serious threat at work, following viruses. Respondent considered this to be 'more serious than most other threats such as spam, spy ware, and phishing. IT departments could do much to reduce data leakage by shoring-up internal IT security procedures with the practice standards of ISACA's COBIT IT governance standards, as well as those of ITIL IT service management documentation. Implementing these tools would go a long way to staunching data leakage.

Inspec keywords: security of data; DP management

Other keywords: IT service management documentation; malicious hack; enterprise system; internal risk factor; IT governance standard; IT security threat; data leakage

Subjects: Computer installation management; Computing/EDP management; Data security

http://iet.metastore.ingenta.com/content/journals/10.1049/et_20081510
Loading

Related content

content/journals/10.1049/et_20081510
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading