2015 Information Security for South Africa (ISSA) [electronic resource]
- Corporate Author
- IEEE Staff
- Published
- Piscataway : IEEE Aug. 2015
Access Online
- Restrictions on Access
- License restrictions may limit access.
- Summary
- Annotation Information security has evolved and in the last few years there has been renewed interest in the subject worldwide This is evident from the many standards and certifications now available to guide security strategy The convergence of technologies like the cloud together with advances in wireless communications, has meant new security challenges for the information security fraternity It is this fraternity that organisations, governments and communities in general look to for guidance on best practice in this converging world Identity theft and phishing are on going concerns Security mechanisms have become so good and are generally implemented by companies wanting to adhere to good corporate governance, so attackers are now looking to the weak link in the chain, namely the individual user It is far easier to attack them than attempt to penetrate sophisticated corporate systems Digital forensic investigations and techniques are used in a bid to apprehend the perpetrators
- Genre(s)
- ISBN
- 9781479977567
147997756X (Spiral) - Audience Notes
- Scholarly & Professional IEEE
View MARC record | catkey: 22613878