Chapter 13: Information Security: Barbarians at the Gateway (and Just About Everywhere Else)

13.1 Introduction
13.2 Why Is This Happening? Who Is Doing It? And What’s Their Motivation?
13.3 Where Are Vulnerabilities? Understanding the Weaknesses
13.4 Taking Action

This is a derivative of Information Systems: A Manager's Guide to Harnessing Technology by a publisher who has requested that they and the original author not receive attribution, originally released and is used under CC BY-NC-SA. This work, unless otherwise expressly stated, is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.