Cyberwar, Cyberterror, Cybercrime & Cyberactivism
IT Governance Publishing (Verlag)
9781849285711 (ISBN)
The intentions of the cyberterrorist, the cybercriminal, the cyberactivist and the state-sponsored hacker are not the same. They can all cause serious problems for your organisation, however, including information theft, disruption of normal operations and undermining your reputation or credibility.
Many books on cybersecurity focus on technical responses to these threats. As important as this is, human fallibility and other known vulnerabilities will allow hackers to easily break into a system that has not taken account of these factors.
This book encourages cybersecurity professionals to take a wider view of what cybersecurity means, and to exploit international standards and best practice to create a culture of cybersecurity awareness within their organization that supplements technology-based defenses.
This second edition takes account of the changing threats in the cyber landscape, and includes an updated body of knowledge that describes how to acquire, develop, and sustain a secure information environment that goes beyond technology. This enables you to move towards a cyber aware organizational culture that is more robust and better able to deal with a wider range of threats. Related references and recommendations for additional reading are included at the end of each chapter, making this a valuable resource for trainers and researchers, as well as cybersecurity practitioners.
Dr Julie Mehan is the Founder and President of JEMStone Strategies and a Principal in a strategic consulting firm in the State of Virginia. She has delivered cyber security and related privacy services to senior commercial, US Department of Defense, and government clients in Italy, Australia, Canada, Belgium, and the United States. Dr Mehan is an Associate Professor at the University of Maryland University College.
1: Technology Is a Double-Edged Sword
2: Cyber attack: It's A Dangerous World for Information Systems
3: The Human Factor: The Underrated Threat
4: Transition from an Environment of "FUD" to a Standards-Based Environment
5: Establishing a Culture of Cyber Security
6: Increasing Internationalism: Governance, Laws, and Ethics
7: Standards: What are They and Why Should We Care
8: From Reaction to Proaction: Applying Standards in an Environment of Change and Danger
9: Conclusion: Where Do We Go From Here?
Appendix 1: Gap Analysis Areas of Interest
Appendix 2: Standards Crosswalk
| Erscheint lt. Verlag | 8.5.2014 |
|---|---|
| Verlagsort | Ely |
| Sprache | englisch |
| Maße | 140 x 216 mm |
| Gewicht | 640 g |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Wirtschaft ► Betriebswirtschaft / Management ► Unternehmensführung / Management | |
| ISBN-13 | 9781849285711 / 9781849285711 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich