Data Protection: Governance, Risk Management, and Compliance
暫譯: 數據保護:治理、風險管理與合規性
David G. Hill
- 出版商: CRC
- 出版日期: 2009-08-10
- 售價: $3,950
- 貴賓價: 9.5 折 $3,753
- 語言: 英文
- 頁數: 330
- 裝訂: Hardcover
- ISBN: 1439806926
- ISBN-13: 9781439806920
已過版
相關主題
商品描述
Failure to appreciate the full dimensions of data protection can lead to poor data protection management, costly resource allocation issues, and exposure to unnecessary risks. Data Protection: Governance, Risk Management, and Compliance explains how to gain a handle on the vital aspects of data protection.
The author begins by building the foundation of data protection from a risk management perspective. He then introduces the two other pillars in the governance, risk management, and compliance (GRC) framework. After exploring data retention and data security in depth, the book focuses on data protection technologies primarily from a risk management viewpoint. It also discusses the special technology requirements for compliance, governance, and data security; the importance of eDiscovery for civil litigation; the impact of third-party services in conjunction with data protection; and data processing facets, such as the role of tiering and server and storage virtualization. The final chapter describes a model to help businesses get started in the planning process to improve their data protection.
By examining the relationships among the pieces of the data protection puzzle, this book offers a solid understanding of how data protection fits into various organizations. It allows readers to assess their overall strategy, identify security gaps, determine their unique requirements, and decide what technologies and tactics can best meet those requirements.
商品描述(中文翻譯)
未能充分理解資料保護的各個面向可能導致資料保護管理不善、資源配置問題以及面臨不必要的風險。《資料保護:治理、風險管理與合規性》解釋了如何掌握資料保護的關鍵方面。
作者首先從風險管理的角度建立資料保護的基礎。接著,他介紹了治理、風險管理與合規性(GRC)框架中的另外兩個支柱。在深入探討資料保留和資料安全之後,本書主要從風險管理的角度聚焦於資料保護技術。它還討論了合規性、治理和資料安全的特殊技術需求;電子發現(eDiscovery)在民事訴訟中的重要性;第三方服務與資料保護的影響;以及資料處理的各個面向,例如分層和伺服器及儲存虛擬化的角色。最後一章描述了一個模型,幫助企業開始規劃過程,以改善其資料保護。
通過檢視資料保護拼圖各部分之間的關係,本書提供了對資料保護如何融入各種組織的深入理解。它使讀者能夠評估其整體策略、識別安全漏洞、確定其獨特需求,並決定哪些技術和策略最能滿足這些需求。