Cybersecurity for executives : a practical guide /
This guide can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business. It emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues; covers what to do...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Hoboken, New Jersey :
John Wiley & Sons,
[2014]
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn876900980 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 140415s2014 nju ob 001 0 eng | ||
010 | |a 2014015182 | ||
040 | |a DLC |b eng |e rda |e pn |c DLC |d YDX |d N$T |d EBLCP |d DG1 |d E7B |d TEFOD |d CUS |d IDEBK |d YDXCP |d DEBSZ |d COO |d OCLCF |d UMI |d DEBBG |d OCLCO |d TEFOD |d STF |d B24X7 |d OCLCQ |d VT2 |d CSJ |d D6H |d CNNOR |d DG1 |d CCO |d LIP |d PIFBY |d ZCU |d LIV |d MERUC |d OCLCQ |d U3W |d UCO |d OCLCQ |d CEF |d ICG |d INT |d OCLCQ |d G3B |d TKN |d OCLCQ |d UAB |d ORZ |d DKC |d OCLCQ |d BRF |d OCLCO |d OCLCQ |d OCLCO |d INARC |d OCLCL | ||
019 | |a 882610202 |a 893436806 |a 900003714 |a 961588044 |a 962646351 | ||
020 | |a 9781118908808 |q (epub) | ||
020 | |a 1118908805 |q (epub) | ||
020 | |a 9781118908815 |q (pdf) | ||
020 | |a 1118908813 |q (pdf) | ||
020 | |z 9781118888148 |q (cloth) | ||
020 | |z 9781118908785 | ||
020 | |z 1118908783 | ||
020 | |z 1306906458 | ||
020 | |z 9781306906456 | ||
020 | |z 1118888146 | ||
029 | 1 | |a AU@ |b 000052777481 | |
029 | 1 | |a CHBIS |b 010259706 | |
029 | 1 | |a CHBIS |b 010413347 | |
029 | 1 | |a CHNEW |b 000943012 | |
029 | 1 | |a CHVBK |b 33311311X | |
029 | 1 | |a CHVBK |b 480254168 | |
029 | 1 | |a DEBBG |b BV042182837 | |
029 | 1 | |a DEBBG |b BV043396690 | |
029 | 1 | |a DEBBG |b BV043610174 | |
029 | 1 | |a DEBSZ |b 409827983 | |
029 | 1 | |a DEBSZ |b 417235267 | |
029 | 1 | |a DEBSZ |b 420034722 | |
029 | 1 | |a DEBSZ |b 449433226 | |
029 | 1 | |a DEBSZ |b 485047535 | |
029 | 1 | |a NZ1 |b 15592109 | |
029 | 1 | |a NZ1 |b 15906896 | |
035 | |a (OCoLC)876900980 |z (OCoLC)882610202 |z (OCoLC)893436806 |z (OCoLC)900003714 |z (OCoLC)961588044 |z (OCoLC)962646351 | ||
037 | |a E024C110-C148-46F5-8C15-3D328778880C |b OverDrive, Inc. |n http://www.overdrive.com | ||
042 | |a pcc | ||
050 | 0 | 0 | |a TK5105.59 |
072 | 7 | |a BUS |x 082000 |2 bisacsh | |
072 | 7 | |a BUS |x 041000 |2 bisacsh | |
072 | 7 | |a BUS |x 042000 |2 bisacsh | |
072 | 7 | |a BUS |x 085000 |2 bisacsh | |
082 | 0 | 0 | |a 658.4/78 |2 23 |
049 | |a UAMI | ||
100 | 1 | |a Touhill, Gregory J., |e author. | |
245 | 1 | 0 | |a Cybersecurity for executives : |b a practical guide / |c by Gregory J. Touhill and C. Joseph Touhill. |
264 | 1 | |a Hoboken, New Jersey : |b John Wiley & Sons, |c [2014] | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Online resource; title from digital title page (viewed on February 20, 2019). | |
520 | |a This guide can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business. It emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues; covers what to do when you get hacked, including business continuity and disaster recovery planning, public relations, legal and regulatory issues, and notifications and disclosures; provides steps for integrating cybersecurity into strategy, policy and guidelines, change management and personnel management; identifies cybersecurity best practices that executives can and should use both in the office and at home to protect their vital information. -- |c Edited summary from book. | ||
505 | 0 | |a Cybersecurity for Executives: A Practical Guide; Contents ; Foreword ; Preface ; Acknowledgments ; 1.0 INTRODUCTION ; 1.1 DEFINING CYBERSECURITY; 1.2 CYBERSECURITY IS A BUSINESS IMPERATIVE; 1.3 CYBERSECURITY IS AN EXECUTIVE-LEVEL CONCERN; 1.4 QUESTIONS TO ASK; 1.5 VIEWS OF OTHERS; 1.6 CYBERSECURITY IS A FULL-TIME ACTIVITY; 2.0 WHY BE CONCERNED? ; 2.1 A CLASSIC HACK; 2.2 WHO WANTS YOUR FORTUNE?; 2.3 NATION-STATE THREATS; 2.3.1 China; 2.3.2 Don't Think that China is the Only One; 2.4 CYBERCRIME IS BIG BUSINESS; 2.4.1 Mercenary Hackers; 2.4.2 Hacktivists; 2.4.3 The Insider Threat. | |
505 | 8 | |a 2.4.4 Substandard Products and Services; 2.5 SUMMARY; 3.0 MANAGING RISK ; 3.1 WHO OWNS RISK IN YOUR BUSINESS?; 3.2 WHAT ARE YOUR RISKS?; 3.2.1 Threats to Your Intellectual Property and Trade Secrets; 3.2.2 Technical Risks; 3.2.3 Human Risks; 3.3 CALCULATING YOUR RISK; 3.3.1 Quantitative Risk Assessment; 3.3.2 Qualitative Risk Assessment; 3.3.3 Risk Decisions; 3.4 COMMUNICATING RISK; 3.4.1 Communicating Risk Internally; 3.4.2 Regulatory Communications; 3.4.3 Communicating with Shareholders; 3.5 ORGANIZING FOR SUCCESS; 3.5.1 Risk Management Committee; 3.5.2 Chief Risk Officers; 3.6 SUMMARY. | |
505 | 8 | |a 4.0 BUILD YOUR STRATEGY 4.1 HOW MUCH "CYBERSECURITY" DO I NEED?; 4.2 THE MECHANICS OF BUILDING YOUR STRATEGY; 4.2.1 Where are We Now?; 4.2.2 What do We have to Work with?; 4.2.3 Where do We Want to be?; 4.2.4 How do We Get There?; 4.2.5 Goals and Objectives; 4.3 AVOIDING STRATEGY FAILURE; 4.3.1 Poor Plans, Poor Execution; 4.3.2 Lack of Communication; 4.3.3 Resistance to Change; 4.3.4 Lack of Leadership and Oversight; 4.4 WAYS TO INCORPORATE CYBERSECURITY INTO YOUR STRATEGY; 4.4.1 Identify the Information Critical to Your Business; 4.4.2 Make Cybersecurity Part of Your Culture. | |
505 | 8 | |a 4.4.3 Consider Cybersecurity Impacts in Your Decisions; 4.4.4 Measure Your Progress; 4.5 PLAN FOR SUCCESS; 4.6 SUMMARY; 5.0 Plan for Success ; 5.1 TURNING VISION INTO REALITY; 5.1.1 Planning for Excellence; 5.1.2 A Plan of Action; 5.1.3 Doing Things ; 5.2 POLICIES COMPLEMENT PLANS; 5.2.1 Great Cybersecurity Policies for Everyone; 5.2.2 Be Clear about Your Policies and Who Owns Them; 5.3 PROCEDURES IMPLEMENT PLANS; 5.4 EXERCISE YOUR PLANS; 5.5 LEGAL COMPLIANCE CONCERNS; 5.6 AUDITING; 5.7 SUMMARY; 6.0 CHANGE MANAGEMENT ; 6.1 WHY MANAGING CHANGE IS IMPORTANT; 6.2 WHEN TO CHANGE? | |
505 | 8 | |a 6.3 WHAT IS IMPACTED BY CHANGE?6.4 CHANGE MANAGEMENT AND INTERNAL CONTROLS; 6.5 CHANGE MANAGEMENT AS A PROCESS; 6.5.1 The Touhill Change Management Process; 6.5.2 Following the Process; 6.5.3 Have a Plan B, Plan C, and maybe a Plan D; 6.6 BEST PRACTICES IN CHANGE MANAGEMENT; 6.7 SUMMARY; 7.0 PERSONNEL MANAGEMENT ; 7.1 FINDING THE RIGHT FIT; 7.2 CREATING THE TEAM; 7.2.1 Picking the Right Leaders; 7.2.2 Your Cybersecurity Leaders; 7.3 ESTABLISHING PERFORMANCE STANDARDS; 7.4 ORGANIZATIONAL CONSIDERATIONS; 7.5 TRAINING FOR SUCCESS; 7.5.1 Information Every Employee Ought to Know. | |
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
650 | 0 | |a Computer networks |x Security measures. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a BUSINESS & ECONOMICS |x Industrial Management. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Management. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Management Science. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Organizational Behavior. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
700 | 1 | |a Touhill, C. J., |d 1938- |e author. | |
758 | |i has work: |a Cybersecurity for executives (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFXbHVdX8MgcFpM3fHVtDm |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Touhill, Gregory J. |t Cybersecurity for executives. |d Hoboken, New Jersey : Wiley, [2014] |z 9781118888148 |w (DLC) 2014002691 |w (OCoLC)876900683 |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1707094 |z Texto completo |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781118908808/?ar |z Texto completo |
938 | |a Internet Archive |b INAR |n cybersecurityfor0000touh | ||
938 | |a Books 24x7 |b B247 |n bks00072721 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL1707094 | ||
938 | |a ebrary |b EBRY |n ebr10879737 | ||
938 | |a EBSCOhost |b EBSC |n 792115 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis28553940 | ||
938 | |a YBP Library Services |b YANK |n 11605720 | ||
938 | |a YBP Library Services |b YANK |n 12673621 | ||
938 | |a YBP Library Services |b YANK |n 11858484 | ||
994 | |a 92 |b IZTAP |