RMIT University
Browse

Security risk management strategy

chapter
posted on 2024-10-30, 20:16 authored by Hamid Jahankhani, Mathews NkhomaMathews Nkhoma, Haralambos Mouratidis
The information and telecommunications services currently in use within local, national and global economies help facilitate the exchange of data at an unprecedented rate. The utility offered through information technologies has improved productivity and performance within for-profit organisations that have availed themselves of networked infrastructures that promote ease of access, remote access to data and enhanced speed and service. However, these assets also entail potentially damaging outcomes through threats to the network. Problems in network security have emerged from the different priorities that stakeholders have in respect to the data management infrastructure. These priorities are highly subjective and range from increased ease of use to increased limitations placed upon access and every point in between. These priorities are the result of two separate criteria that exist for users of a networked system: first, users want to enjoy efficient and pleasant experiences when using a system; second, users recognise specific risks and associate these with computer networks. Risk management is a significant component of network security, especially in respect to how the prerogatives of any network security system are defined.

History

Start page

237

End page

262

Total pages

26

Outlet

Handbook of Electronic Security and Digital Forensics

Editors

Hamid Jahankhani ,David Lilburn Watson,Gianluigi Me and Frank Leonhardt

Publisher

World Scientific Publishing

Place published

United States

Language

English

Copyright

© 2010 World Scientific Publishing Co

Former Identifier

2006038834

Esploro creation date

2020-06-22

Fedora creation date

2013-08-19

Usage metrics

    Scholarly Works

    Keywords

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC