O'Reilly logo

Information Risk Management: A practitioner’s guide by Sutton, David

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

1 THE NEED FOR INFORMATION RISK MANAGEMENT

INTRODUCTION

Before we begin to study further the need for information risk management, let us take a look at a few case studies to illustrate instances in which information was accessed or used inappropriately.

images

CASE STUDY 1

The hacker finished his coffee, checked the code one last time, and pressed the ‘execute’ button. As the egg-timer icon appeared on his computer screen, he turned out the light and went to bed. The computer churned away for hours whilst he slept, and finally flashed a ‘completed’ message on the screen.

It had taken him several hours to write the code, but he had finally succeeded. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required