Notes

Chapter 4

1. EMC (2014).

2. A good article introducing the concept of information mapping in business organizations is Hibberd and Evatt (2004).

Chapter 5

1. For a detailed discussion of data classification methodology, see DOIT Data Classification Methodology Version 1.3. U.S. Department of Information Technology, March 30, 2010.

Chapter 7

1. Verizon (2011).

Chapter 9

1. The author acknowledges the research done by Verizon and the U.S. Secret Service and published in the annual Verizon Data Breach Investigation Reports 2008–2015.

2. Verizon (2015).

3Dictionary.com

4Techtarget.com

5OPM.gov

6. Phishing is the act of sending crafted emails that appear to be from another organization in an attempt to elicit information.

7www.verizonenterprise.com/resources/reports/rp_data-breach-in-vestigation-report-2015_en_xg.pdf ...

Get Building Successful Information Systems now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.