Verified Document

Internal Control For Information Security: Annotated Bibliography Annotated Bibliography

¶ … Internal Control for Information Security: Annotated Bibliography Making the case for Network Security. (2012, Apr 19). Retrieved from Wikibon Blog:

http://wikibon.org/blog/making-the-case-for-network-security/

This author addresses the central concerns regarding information security in the modern business world using broad strokes to make the importance of network security as a key business operation readily apparent to the reader. As the article is addressed primarily on business managers and other practically interested personnel, the language is a bit too full of professional jargon and other needless complications, however the basic facts that the author lays out and the conclusions drawn from these facts and their relationship are quite straightforward and clear. Though not providing any truly in-depth and concrete data or profound insights, this presents overview information that is directly related to the investigation of network and information security.

Information: Complying with the Safeguards Rule. (n.d.). Retrieved from Bureau of Consumer Protection: http://www.business.ftc.gov/documents/bus54-

After providing this overview definition of different types of institutions that must comply with the safeguard rules, a broad description of the rules themselves and the areas of concern for information security and the protection financial information in networks is also provided, and recommendations and guidelines to help companies ensure compliance (and to inform consumers of their rights in regards to the protection of their financial information) are also supplied. Though not exactly related to the technical how-tos of providing information and network security, this source does provide an understanding of the practical ends and the legislative imperatives applicable to the area of investigation.
Schneider, G.P. (2009). Electronic Commerce Security. In G.P. Schneider,

Electronic Commerce (p. 459). Boston, MA: Cengage Learning.

A chapter in a larger…

Sources used in this document:
A chapter in a larger book dealing with all manner of issues that are related to electronic and especially online commerce, the focus here is particularly on the security needs of online and electronic commerce components and provides an overview of how to fulfill these security needs. The author moves from a very broad overview of certain topics to more specific and concrete examples and explanations, and in this provides a comprehensive understanding of the most commonly relevant areas of security in consumer and commercial transactions. Highly academic in tone, the information remains very accessible and provides a solid foundation on which to build the current investigation. As far as more in-depth and ground-breaking research or conclusions are concerned, however, this source is not especially helpful (nor is it designed to be).

Pervaiz, M., Cardei, M. & Wu, J. (2010). Routing Security in Ad Hoc Wireless Networks. Network Security 117-42.

The authors begin by describing an ad hoc wireless network -- essentially a wireless computer and communications network that uses unplanned and unofficially connected terminals and other devices as a temporary means of networking various individuals, machines, etc. -- and the many ways in which they can be utilized in the modern era. The usefulness of such networks is somewhat confounded by routing security issues, and the authors discuss means of building these networks in such a way that they remain more secure while still serving the malleable and temporary purposes for which they are intended. The authors do an excellent job of presenting technical information in an accessible fashion, and provide clear evidence for their conclusions. At the same time, the information provided is highly specific and thus is not broadly applicable to the research
Cite this Document:
Copy Bibliography Citation

Related Documents

Annotated Bibliography It Auditing
Words: 739 Length: 3 Document Type: Annotated Bibliography

US General Accounting Office & National State Auditors Association. "Management Planning Guide for Information Systems Security Auditing." Issued 10 December 2011. Retrieved from http://www.gao.gov/special.pubs/managementpln.pdf This source is a useful reference that can help determine the history and background of IT security and federal government regulation. This report is the first of its kind and can help provide deep background information on the topic at hand. Spremic, M., Ivanov, M., Jackovic, B.

Risk Identification in Information Security
Words: 5004 Length: 15 Document Type: Thesis

Phishing Spear Phishing and Pharming The following is intended to provide a very brief overview of examples of some the most dangerous and pervasive security risks in the online and networked world. One of the most insidious of identity theft is known as phishing. The term 'phishing' refers to the practice of "fishing for information." This term was originally used to describe "phishing" for credit card numbers and other sensitive information

ERP Systems Bibliography Bendoly, E.,
Words: 2900 Length: 10 Document Type: Annotated Bibliography

Ge, L., & Voss, S.. (2009). ERP application in China: An overview. International Journal of Production Economics, 122(1), 501. Of the many challenges of planning, implementing and using ERP systems in China, the two greatest unmet needs of these systems on a consistent basis is business intelligence and data analytics. This analysis evaluates these two unmet needs from the standpoint of their use in supply chains. Included in the analysis is

Framework for Awarding Audit Contracts by US Government Departments...
Words: 15848 Length: 58 Document Type: Term Paper

awarding audit contracts by U.S. government departments and agencies Audit Management Red Rationale for and Objectives of the project main and secondary Desktop or literature search Rationale for Search Methodology LITERATURE/DESKTOP RESEARCH Authoritative sources Desktop Findings Justification for audits Evolving role of auditors Types of audit contracts Understanding the Audit Process Best practices and benchmarking Terminology Case Studies Audit management is a fundamental element in government accountability, control and performance management. Certainly there is justification within the Federal government to conduct audits of contracts for the

Vose, D. 2008 . Risk Analysis: A Quantitative
Words: 1740 Length: 6 Document Type: Annotated Bibliography

Vose, D. (2008). Risk Analysis: A quantitative guide. (3rd ed.). West Sussex, England: John Wiley & Sons, Ltd. The book is written on risk analysis using quantitative methodologies. The book has two parts and chapters are divided into these two parts. The first part is intended to help managers realize the rationale for conducting risk analysiswhereas the second part explains the modeling techniques of risk analysis. First part describes in detail

Challenges to Public Safety Administration
Words: 3169 Length: 10 Document Type: Annotated Bibliography

Public Safety Administration Challenges; Annotated Bibliography Cook, C. (September 1, 2012). The Challenges and Opportunities for Public Safety Communications: The Adams County Case Study. Silicon Flatirons Center On the 23rd of September in the year 2011, scholars, law professionals and members of public safety communications industry were brought together by the Silicon Flatirons Center to discuss issues that faced the industry in the 21st century, both in terms of benefits and challenges

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now