Skip to main content
Log in

Guest Editorial: Secur(e/ity) Management: Two Sides of the Same Coin

  • Editorial Introduction
  • Published:
Journal of Network and Systems Management Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

REFERENCES

  1. C. Burns, Internet Security, Network World Fusion Newsletter, August 25, 2003. http://www.nwfusion.com/techinsider/2003/0825techinsider.html

  2. One in 145 messages contains viruses, Via Net.works U.K. , February 24, 2003. http://www.infosecnews.com/sgold/news/2003/02/17_04.htm

  3. G. Hulme, Businesses cut security losses, Information Week, May 29, 2003. http://informationweek.com/story/showArticle.jhtml?articleID=10100501

  4. Gartner Group survey of 200 business and government agencies reported in advanced program for Gartner IT Security Summit 2003, June 2003. http://www.gartner.com/us/itsecurity

  5. Enterprise Security Product Revenues Soaring, SC Infosecurity Newswire, August 12, 2003. http://www.infosecnews.com/sgold/news/2003/08/13_05.htm

  6. Statistics concerning risks, security incidents, breeches, costs of breeches, recovery from breeches and so on reported herein come from various sources such as Network Work Newsletters (http://www.nwwsubscribe.com/): NW Virus and Bug Patch Alert, NW Security Newsletter, NW Fusion; Government Computer News (GCN) Newsletters (http://www.gcn.com/): GCN Weekly Update, GNC Security Update; CIO Security and Privacy Update; 101Communications Newsletters (http://101com.com/): Federal Computer Week, Federal Computer Week Security News, Security Strategies, and Security Watch; Information Security News; SC Infosecurity Opinionwire (http://www.westcoast.com/); Network Computing (http://www.networkcomputing.com); SANS Institute NewsBites (http://www.sans.org/); and Information Week. Since such statistics change over time, the reader is encouraged to consult these sources for up to date numbers.

  7. Metrics: 2003 Security Incident Tally, CIO Security and Privacy Update service, August 5, 2003. http://www2.cio.com/metrics/2003/metric584.html

  8. D. Legard, Study: Internet fraud and attacks rise in tandem, IDG News Service, October 14, 2003. http://www.nwfusion.com/news/2003/1014studyinter.html

  9. J. Wilson, Security devices don't always save companies from hackers, SC Infosecurity Opionwire, July 30, 2003. http://www.infosecnews.com/opinion/2003/07/30_03.htm

  10. D. Dubie, Symantec CEO warns of new threats, Network World Fusion Newsletter, November 19, 2003. http://www.nwfusion.com/news/2003/1119symceo.html

  11. 50% of systems still vulnerable 30 days after patch release, SANS Institute NewsBites Vol. 5 No. 31, August 6, 2003. http://news.com.com/2102–1009_35058058.html?tag=ni_print. http://www.securityfocus.com/news/6568

  12. J. Leyden, Managed Security Sales Grow Like Topsy, The Register Newsletter (reporting on a Forrester Research study), June 26, 2003. http://www.theregister.co.uk/content/55/31399.html

  13. J. Krane, Electrical Grid Vulnerable to Hackers, CRN, CMP Media LLC, September 11, 2003. http://www.crn.com/sections/BreakingNews/dailyarchives.asp?ArticleID=44445

  14. E. Messmer, Worm Outbreaks Saturate Networks, Network World, August 25, 2003. http://www.nwfusion.com/news/2003/0825worms.html

  15. E. Messmer, Welcome to the Cyberfront, Network World Fusion, August 25, 2003. http://www.nwfusion.com/weblogs/security/003354.html

Download references

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hale, J., Brusil, P.J. Guest Editorial: Secur(e/ity) Management: Two Sides of the Same Coin. Journal of Network and Systems Management 12, 1–8 (2004). https://doi.org/10.1023/B:JONS.0000015933.75374.77

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/B:JONS.0000015933.75374.77

Navigation