Cyberwar, cyberterror, cybercrime and cyberactivism : an in-depth guide to the role of standards in cybersecurity environment /
This book encourages cybersecurity professionals to take a wider view of what cybersecurity means, and to make the most of international standards and best practice to create a culture of cybersecurity awareness that complements technology-based defenses. This second edition analyzes the changing th...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Ely, Cambridge, UK :
IT Governance Pub.,
2014.
|
Edición: | 2nd ed. |
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn888035950 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 140820s2014 enka ob 001 0 eng d | ||
040 | |a UMI |b eng |e pn |c UMI |d CAUOI |d B24X7 |d DEBBG |d DEBSZ |d JSTOR |d COO |d YDXCP |d N$T |d OCLCF |d EBLCP |d IDEBK |d OCLCQ |d TEFOD |d OCLCQ |d AGLDB |d CUS |d CUI |d JBG |d MERUC |d OCLCQ |d IOG |d OCLCA |d VTS |d CEF |d WAU |d OCLCQ |d LVT |d STF |d M8D |d OCLCQ |d AJS |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 890529932 |a 907519119 | ||
020 | |a 9781849285728 |q (electronic bk.) | ||
020 | |a 1849285721 |q (electronic bk.) | ||
020 | |z 1849285713 | ||
020 | |z 9781849285711 | ||
029 | 1 | |a AU@ |b 000056008057 | |
029 | 1 | |a AU@ |b 000067040230 | |
029 | 1 | |a CHNEW |b 000888590 | |
029 | 1 | |a CHVBK |b 374475067 | |
029 | 1 | |a DEBBG |b BV042182348 | |
029 | 1 | |a DEBSZ |b 415542944 | |
029 | 1 | |a DEBSZ |b 417230273 | |
029 | 1 | |a DEBSZ |b 472838954 | |
029 | 1 | |a GBVCP |b 804971714 | |
035 | |a (OCoLC)888035950 |z (OCoLC)890529932 |z (OCoLC)907519119 | ||
037 | |a CL0500000466 |b Safari Books Online | ||
037 | |a 22573/ctt7z4f4c |b JSTOR | ||
037 | |a F64A6000-ECF8-4944-9F65-EF5E8314D43F |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a HV6773 | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.802/18 |2 22 |
049 | |a UAMI | ||
100 | 1 | |a Mehan, Julie E., |e author. | |
245 | 1 | 0 | |a Cyberwar, cyberterror, cybercrime and cyberactivism : |b an in-depth guide to the role of standards in cybersecurity environment / |c Julie E. Mehan. |
250 | |a 2nd ed. | ||
260 | |a Ely, Cambridge, UK : |b IT Governance Pub., |c 2014. | ||
300 | |a 1 online resource (348 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Online resource; title from title page (Safari, viewed August 7, 2014). | |
520 | |a This book encourages cybersecurity professionals to take a wider view of what cybersecurity means, and to make the most of international standards and best practice to create a culture of cybersecurity awareness that complements technology-based defenses. This second edition analyzes the changing threats in the cyber landscape, and includes an updated body of knowledge that describes how to acquire, develop, and sustain a secure information environment that goes beyond technology and how to create a cyber-aware organizational culture that is more robust and better able to deal with a wider range of threats. -- |c Edited summary from book. | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Cover; Title; Copyright; Preface; About the Author; Contents; Introduction; Chapter 1: Technology Is a Double-Edged Sword; From the printing press to the information age; The ''dark side of high tech''; Chapter 2: Cyber Attack: It''s A Dangerous World for Information Systems; Cyberwar; Cyberterror; Cybercrime; CyberEspionage (and Information Exfiltration) -- It''s midnight; do you know where your data is?; Social Media -- an opportunity and a challenge; Supply Chain (In- ) security; The blended threat; The asymmetric effects of cyber attacks; Porous perimeters, compromisable software -- or both? | |
505 | 8 | |a If we know about the vulnerabilities, why are exploits still successful?Chapter 3: The Human Factor: The Underrated Threat; Are people the problem?; Who are the attackers?; Most likely forms of attack; Sometimes it''s just human error; People can also be the solution!; Chapter 4: Transition from an Environment of ''FUD'' to a Standards-Based Environment; Chapter 5: Establishing a Culture of Cybersecurity; Chapter 6: Increasing Internationalism: Governance, Laws, and Ethics; Information globalism equals increased exposure; Following the lead of good governance; The proliferation of laws. | |
505 | 8 | |a Ethics in an information society and a minimum standard of due care in cybersecurityCybersecurity and privacy; Chapter 7: Standards: What Are They and Why Should We Care?; What are standards?; How and by whom are standards developed?; The importance of terminology; Standards-based process improvement; Focus on consensus-based cybersecurity; Standards provide a level playing-field for co-ordination and co-operation; If standards are so good, then why is it so hard?; Chapter 8: From Reaction to Proaction: Applying Standards in an Environment of Change and Danger. | |
505 | 8 | |a Moving beyond compliance and reactionA quick look at relevant standards; Take four steps forward; The future is ''ROSI''; Making the case for cybersecurity assurance; Chapter 9: Conclusion: Where Do We Go From Here?; Cybersecurity program roadmap; Appendix 1: Gap Analysis Areas of Interest; Appendix 2: Standards Crosswalk; Definitions; Acronyms; Index; A; B; C; D; E; F; G; H; I; J; K; L; M; N; O; P; Q; R; S; T; U; V; W; X; Y; ITG Resources. | |
590 | |a eBooks on EBSCOhost |b EBSCO eBook Subscription Academic Collection - Worldwide | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a JSTOR |b Books at JSTOR Demand Driven Acquisitions (DDA) | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Hacking. | |
650 | 0 | |a Electronics in military engineering. | |
650 | 2 | |a Computer Security | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Piratage informatique. | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Electronics in military engineering |2 fast | |
650 | 7 | |a Hacking |2 fast | |
758 | |i has work: |a Cyberwar, cyberterror, cybercrime and cyberactivism (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGmQ9PVJDJBT43bBTprYrq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Mehan, Julie. |t Cyberwar, Cyberterror, Cybercrime & Cyberactivism (2nd Edition) : An in-depth guide to the role of standards in the cybersecurity environment. |d Ely : IT Governance Ltd, ©2014 |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781849285728/?ar |z Texto completo |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1778762 |z Texto completo |
938 | |a Books 24x7 |b B247 |n bks00069065 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL1778762 | ||
938 | |a EBSCOhost |b EBSC |n 838730 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis28005361 | ||
938 | |a YBP Library Services |b YANK |n 12069029 | ||
994 | |a 92 |b IZTAP |