Table of Contents:
  • PART I : CRISIS IN INFORMATION SECURITY: Cybercrime and escalating risks
  • Despite the alarming trends, data breaches are preventable
  • The aftermath of data breaches : potential liability and damages
  • The underground world of online identity theft : an overview
  • PART II : ANATOMY OF THE MAJOR DATA BREACHES: Encrypted records : failed security
  • PART III : LAW: Ambiguities in state security breach notification statutes
  • State data breach notification laws and the duty to provide information security
  • HITECH : the first federal data breach notification law
  • Breach notification and encryption : a global perspective
  • PART IV : TECHNOLOGY: Encryption : the basics
  • Encryption best practices
  • Circumventing data encryption : password vulnerabilities
  • Managing cryptographic keys
  • The self-encrypting drive
  • Encryption technologies : a practical assessment
  • PART V : RESPONSE: Security best practices : the watchword is prioritize!
  • Responding to data breaches
  • Technology to prevent data leaks
  • Insurance protection for security breaches
  • Appendices.