Abstract
The process of security is destined to fail if it does not protect the process of business. Despite a record investment in security by corporations around the globe, the frequency, variety and financial cost of attacks continues to rise. And while most organizations focus their defenses on external threats from hackers and virus authors, the real security challenge is much closer to home. If security professionals want to avoid falling into the trap of trying to protect everything all the time, they need to refocus their defenses on authorized users and the resources they have access to.
Chapter PDF
Similar content being viewed by others
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer Science+Business Media New York
About this chapter
Cite this chapter
Wattel, B. (2002). Business Process Security. In: Gertz, M., Guldentops, E., Strous, L. (eds) Integrity, Internal Control and Security in Information Systems. IICIS 2001. IFIP — The International Federation for Information Processing, vol 83. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35583-2_10
Download citation
DOI: https://doi.org/10.1007/978-0-387-35583-2_10
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-5537-4
Online ISBN: 978-0-387-35583-2
eBook Packages: Springer Book Archive