Human Resources Security
Human resources (HR) managers take more managed‐level practices (such as managing performance, training, communication, and coordination) within the cybersecurity and enterprise functions. At these HR maturity levels, there is no excuse for not meeting appropriate standards and training for HR cyber...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buchkapitel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 374 |
---|---|
container_issue | |
container_start_page | 369 |
container_title | |
container_volume | |
creator | Antonucci, Domenic |
description | Human resources (HR) managers take more managed‐level practices (such as managing performance, training, communication, and coordination) within the cybersecurity and enterprise functions. At these HR maturity levels, there is no excuse for not meeting appropriate standards and training for HR cybersecurity even if the standards are not necessarily certifiable. The ISO 27000 family of standards help organizations keep information assets secure. The overall objective of HR security is to ensure that all employees (including contractors and any users of sensitive data) are screened and qualified and understand their job duties prior to and during employment. They also must ensure that access is removed once employment is terminated. At higher HR maturity levels, there is there an increasing array of more sophisticated tools, techniques, and solutions for advanced cybersecurity. These include certified professional and academic programs. |
doi_str_mv | 10.1002/9781119309741.ch26 |
format | Book Chapter |
fullrecord | <record><control><sourceid>proquest_wiley</sourceid><recordid>TN_cdi_wiley_ebooks_10_1002_9781119309741_ch26_ch26</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC4837509_432_407</sourcerecordid><originalsourceid>FETCH-LOGICAL-p198f-27bcaec0647fb0db2ee1404b84d87a0dc6668db678ff72f58481937a6b968d1c3</originalsourceid><addsrcrecordid>eNptj01LAzEQhiOiWOvexVP_wNbJRzPJUYpaoSD4cQ5JNqGrtbtudpH66926KhS8zMDL-wzzEHJBYUoB2KVGRSnVHDQKOvUrJg_I6W_C8JBkfw2lYHZMRlpRTRkgnpAspRcAoIppgWxEzhfdm91MHkKqusaHNHkMvmvKdntGjqJdp5D97DF5vrl-mi_y5f3t3fxqmddUq5gzdN4GD1JgdFA4FgIVIJwShUILhZdSqsJJVDEiizMl-l84Wul0n1PPx4QPdz_Kddia4KrqNRkKZudq9lzNzvV79NT0H2q__VnWA1EXsQfEANRN9d6F1A6MD5u2sWu_snUbmmSE4jgDbQRnRgDyL-8xZU4</addsrcrecordid><sourcetype>Enrichment Source</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype><pqid>EBC4837509_432_407</pqid></control><display><type>book_chapter</type><title>Human Resources Security</title><source>O'Reilly Online Learning: Academic/Public Library Edition</source><creator>Antonucci, Domenic</creator><contributor>Antonucci, Domenic</contributor><creatorcontrib>Antonucci, Domenic ; Antonucci, Domenic</creatorcontrib><description>Human resources (HR) managers take more managed‐level practices (such as managing performance, training, communication, and coordination) within the cybersecurity and enterprise functions. At these HR maturity levels, there is no excuse for not meeting appropriate standards and training for HR cybersecurity even if the standards are not necessarily certifiable. The ISO 27000 family of standards help organizations keep information assets secure. The overall objective of HR security is to ensure that all employees (including contractors and any users of sensitive data) are screened and qualified and understand their job duties prior to and during employment. They also must ensure that access is removed once employment is terminated. At higher HR maturity levels, there is there an increasing array of more sophisticated tools, techniques, and solutions for advanced cybersecurity. These include certified professional and academic programs.</description><identifier>ISBN: 9781119308805</identifier><identifier>ISBN: 1119308801</identifier><identifier>EISBN: 1119309727</identifier><identifier>EISBN: 9781119309727</identifier><identifier>EISBN: 1119309743</identifier><identifier>EISBN: 9781119309741</identifier><identifier>DOI: 10.1002/9781119309741.ch26</identifier><identifier>OCLC: 981912077</identifier><identifier>LCCallNum: HV6773.A586 2017</identifier><language>eng</language><publisher>United States: John Wiley & Sons, Incorporated</publisher><subject>cybersecurity ; human resources (HR) ; Insurance ; ISO 27000 ; screening ; security risk management ; termination ; training</subject><ispartof>The Cyber Risk Handbook, 2017, p.369-374</ispartof><rights>Copyright © 2017 John Wiley & Sons, Inc. All rights reserved.</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://ebookcentral.proquest.com/covers/4837509-l.jpg</thumbnail><link.rule.ids>779,780,784,793,27924</link.rule.ids></links><search><contributor>Antonucci, Domenic</contributor><creatorcontrib>Antonucci, Domenic</creatorcontrib><title>Human Resources Security</title><title>The Cyber Risk Handbook</title><description>Human resources (HR) managers take more managed‐level practices (such as managing performance, training, communication, and coordination) within the cybersecurity and enterprise functions. At these HR maturity levels, there is no excuse for not meeting appropriate standards and training for HR cybersecurity even if the standards are not necessarily certifiable. The ISO 27000 family of standards help organizations keep information assets secure. The overall objective of HR security is to ensure that all employees (including contractors and any users of sensitive data) are screened and qualified and understand their job duties prior to and during employment. They also must ensure that access is removed once employment is terminated. At higher HR maturity levels, there is there an increasing array of more sophisticated tools, techniques, and solutions for advanced cybersecurity. These include certified professional and academic programs.</description><subject>cybersecurity</subject><subject>human resources (HR)</subject><subject>Insurance</subject><subject>ISO 27000</subject><subject>screening</subject><subject>security risk management</subject><subject>termination</subject><subject>training</subject><isbn>9781119308805</isbn><isbn>1119308801</isbn><isbn>1119309727</isbn><isbn>9781119309727</isbn><isbn>1119309743</isbn><isbn>9781119309741</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2017</creationdate><recordtype>book_chapter</recordtype><recordid>eNptj01LAzEQhiOiWOvexVP_wNbJRzPJUYpaoSD4cQ5JNqGrtbtudpH66926KhS8zMDL-wzzEHJBYUoB2KVGRSnVHDQKOvUrJg_I6W_C8JBkfw2lYHZMRlpRTRkgnpAspRcAoIppgWxEzhfdm91MHkKqusaHNHkMvmvKdntGjqJdp5D97DF5vrl-mi_y5f3t3fxqmddUq5gzdN4GD1JgdFA4FgIVIJwShUILhZdSqsJJVDEiizMl-l84Wul0n1PPx4QPdz_Kddia4KrqNRkKZudq9lzNzvV79NT0H2q__VnWA1EXsQfEANRN9d6F1A6MD5u2sWu_snUbmmSE4jgDbQRnRgDyL-8xZU4</recordid><startdate>2017</startdate><enddate>2017</enddate><creator>Antonucci, Domenic</creator><general>John Wiley & Sons, Incorporated</general><general>John Wiley & Sons, Inc</general><scope>FFUUA</scope></search><sort><creationdate>2017</creationdate><title>Human Resources Security</title><author>Antonucci, Domenic</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p198f-27bcaec0647fb0db2ee1404b84d87a0dc6668db678ff72f58481937a6b968d1c3</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2017</creationdate><topic>cybersecurity</topic><topic>human resources (HR)</topic><topic>Insurance</topic><topic>ISO 27000</topic><topic>screening</topic><topic>security risk management</topic><topic>termination</topic><topic>training</topic><toplevel>online_resources</toplevel><creatorcontrib>Antonucci, Domenic</creatorcontrib><collection>ProQuest Ebook Central - Book Chapters - Demo use only</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Antonucci, Domenic</au><au>Antonucci, Domenic</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>Human Resources Security</atitle><btitle>The Cyber Risk Handbook</btitle><date>2017</date><risdate>2017</risdate><spage>369</spage><epage>374</epage><pages>369-374</pages><isbn>9781119308805</isbn><isbn>1119308801</isbn><eisbn>1119309727</eisbn><eisbn>9781119309727</eisbn><eisbn>1119309743</eisbn><eisbn>9781119309741</eisbn><abstract>Human resources (HR) managers take more managed‐level practices (such as managing performance, training, communication, and coordination) within the cybersecurity and enterprise functions. At these HR maturity levels, there is no excuse for not meeting appropriate standards and training for HR cybersecurity even if the standards are not necessarily certifiable. The ISO 27000 family of standards help organizations keep information assets secure. The overall objective of HR security is to ensure that all employees (including contractors and any users of sensitive data) are screened and qualified and understand their job duties prior to and during employment. They also must ensure that access is removed once employment is terminated. At higher HR maturity levels, there is there an increasing array of more sophisticated tools, techniques, and solutions for advanced cybersecurity. These include certified professional and academic programs.</abstract><cop>United States</cop><pub>John Wiley & Sons, Incorporated</pub><doi>10.1002/9781119309741.ch26</doi><oclcid>981912077</oclcid><tpages>6</tpages></addata></record> |
fulltext | fulltext |
identifier | ISBN: 9781119308805 |
ispartof | The Cyber Risk Handbook, 2017, p.369-374 |
issn | |
language | eng |
recordid | cdi_wiley_ebooks_10_1002_9781119309741_ch26_ch26 |
source | O'Reilly Online Learning: Academic/Public Library Edition |
subjects | cybersecurity human resources (HR) Insurance ISO 27000 screening security risk management termination training |
title | Human Resources Security |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T08%3A35%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_wiley&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=Human%20Resources%20Security&rft.btitle=The%20Cyber%20Risk%20Handbook&rft.au=Antonucci,%20Domenic&rft.date=2017&rft.spage=369&rft.epage=374&rft.pages=369-374&rft.isbn=9781119308805&rft.isbn_list=1119308801&rft_id=info:doi/10.1002/9781119309741.ch26&rft_dat=%3Cproquest_wiley%3EEBC4837509_432_407%3C/proquest_wiley%3E%3Curl%3E%3C/url%3E&rft.eisbn=1119309727&rft.eisbn_list=9781119309727&rft.eisbn_list=1119309743&rft.eisbn_list=9781119309741&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC4837509_432_407&rft_id=info:pmid/&rfr_iscdi=true |