{"title":"Building an Effective and Winning","authors":"Lynda L. McGhie","doi":"10.1201/9781439833032.ch49","DOIUrl":"https://doi.org/10.1201/9781439833032.ch49","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123633881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring ROI on Security","authors":"Carl F. Endorf","doi":"10.1201/9781439833032.ch12","DOIUrl":"https://doi.org/10.1201/9781439833032.ch12","url":null,"abstract":"Carl F. Endorf 12.1 Understanding ROI 133 12.2 Asset Identification and Valuation 134 12.3 Threat and Vulnerability Exposure Factor 134 12.4 Determine the Single Loss Expectancy 135 12.5 Annualized Rate of Occurrence 135 12.6 Annual Loss Expectancy 135 12.7 Survey Controls 135 12.8 Calculate Your ROSI 135 ROSI Example † Arguments against ROSI","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123532366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Guide to Evaluating Tokens","authors":"J. Hootman","doi":"10.1201/9781439833032.ch63","DOIUrl":"https://doi.org/10.1201/9781439833032.ch63","url":null,"abstract":"Fixed passwords are no longer appropriate for controlling computer access. Effective access control calls for the use of dynamic passwords, which are generated by tokens, a calculator-type device. Many such devices have now been introduced into the marketplace, but no one is necessarily appropriate for all situations. This article discusses the use of dynamic passwords and describes the characteristics of currently available password generators and their advantages and disadvantages in particular situations. A chart comparing the features of a selected group of tokens is included.","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133895209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Role of Information Security in the Enterprise Risk Management Structure","authors":"C. Jackson, M. Carey","doi":"10.1201/9781439833032.ch25","DOIUrl":"https://doi.org/10.1201/9781439833032.ch25","url":null,"abstract":"The purpose of this chapter is to discuss the role of information security business processes in supporting an enterprise view of risk management and to highlight how, working in harmony, the ERM and information security organizational components can provide measurable value to the enterprise people, technologies, processes, and mission. This chapter also briefly focuses on additional continuity process improvement techniques. If not already considered a part of the organization’s overall enterprise risk management (ERM) program, why should business information security professionals seriously pursue aligning their information security programs with ERM initiatives?","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131028884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}