Better Securing an Infrastructure for Telework

Better Securing an Infrastructure for Telework

Loreen Marie Butcher-Powell
ISBN13: 9781599049373|ISBN10: 1599049376|EISBN13: 9781599049380
DOI: 10.4018/978-1-59904-937-3.ch137
Cite Chapter Cite Chapter

MLA

Butcher-Powell, Loreen Marie. "Better Securing an Infrastructure for Telework." Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, IGI Global, 2008, pp. 2044-2058. https://doi.org/10.4018/978-1-59904-937-3.ch137

APA

Butcher-Powell, L. M. (2008). Better Securing an Infrastructure for Telework. In H. Nemati (Ed.), Information Security and Ethics: Concepts, Methodologies, Tools, and Applications (pp. 2044-2058). IGI Global. https://doi.org/10.4018/978-1-59904-937-3.ch137

Chicago

Butcher-Powell, Loreen Marie. "Better Securing an Infrastructure for Telework." In Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, 2044-2058. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-937-3.ch137

Export Reference

Mendeley
Favorite

Abstract

The XYZ Hardware Company, Inc. infrastructure features high volumes of sensitive and confi- dential corporate data relevant to internal and external transactions. From 1999 to the middle of 2004, XYZ has utilized the Operationally Critical Threat, Asset, and Vulnerability EvaluationSM (OCTAVESM) Model version 1e to protect its network. The OCTAVESM Model has proven to be helpful for XYZ by identifying over 198 potential security breaches. However, in 2004, when XYZ began to enhance its existing network infrastructure to include telework, 210 security breaches occurred. These breaches cost the company over $350,000 in lost profits between July and December of 2004. To safeguard their network, upper management wanted to invest the money in a series of generalized training including working ethics, virus scanning, and backing up files. However, instead, XYZ’S chief information officer (CIO) invested over $100,000 in research in order to modify their existing protection strategy, to better safeguard their new telework infrastructure by identifying its specific strengths and weakness in an effort to create more concentrated and specialized training at the root of the problem.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.