1 THE NEED FOR INFORMATION RISK MANAGEMENT

INTRODUCTION

Before we begin to study further the need for information risk management, let us take a look at a few case studies to illustrate instances in which information was accessed or used inappropriately.

images

CASE STUDY 1

The hacker finished his coffee, checked the code one last time, and pressed the ‘execute’ button. As the egg-timer icon appeared on his computer screen, he turned out the light and went to bed. The computer churned away for hours whilst he slept, and finally flashed a ‘completed’ message on the screen.

It had taken him several hours to write the code, but he had finally succeeded. ...

Get Information Risk Management: A practitioner’s guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.