Cargando…

Business Continuity in a Cyber World : Surviving Cyberattacks.

Until recently, if it has been considered at all in the context of business continuity, cybersecurity may have been thought of in terms of disaster recovery and little else. Recent events have shown that cyberattacks are now an everyday occurrence, and it is becoming clear that the impact of these c...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Sutton, David
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : Business Expert Press, 2018.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_on1042322253
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 180630s2018 nyu o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d YDX  |d MERUC  |d TEFOD  |d CHVBK  |d IDB  |d OCLCO  |d UAB  |d OCLCQ  |d UKAHL  |d N$T  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 1042353481  |a 1043219934 
020 |a 9781947441477  |q (electronic bk.) 
020 |a 1947441477  |q (electronic bk.) 
020 |z 1947441469 
020 |z 9781947441460 
029 1 |a CHNEW  |b 001016660 
029 1 |a CHVBK  |b 523136595 
029 1 |a AU@  |b 000067961596 
035 |a (OCoLC)1042322253  |z (OCoLC)1042353481  |z (OCoLC)1043219934 
037 |a 449F2787-E514-43E6-AE90-51D81D77543B  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a KF27  |b .S888 2018 
082 0 4 |a 005.82  |2 23 
049 |a UAMI 
100 1 |a Sutton, David. 
245 1 0 |a Business Continuity in a Cyber World :  |b Surviving Cyberattacks. 
260 |a New York :  |b Business Expert Press,  |c 2018. 
300 |a 1 online resource (205 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Cover; Business Continuity in a Cyber World: Surviving Cyber-Attacks; Contents; Acknowledgments; Introduction; CHAPTER 1: The Practice of Business Continuity Management; CHAPTER 2: A Brief Overview of the Risk Management Process; CHAPTER 3: The Main Cybersecurity Issues; CHAPTER 4: Information Assets and Impacts; CHAPTER 5: Vulnerabilities and Threats; CHAPTER 6: Selecting Strategic, Tactical, and Operational Solutions; CHAPTER 7: Business Continuity Activities and Solutions; CHAPTER 8: Testing, Exercising, and Maintaining Plans; CHAPTER 9: Embedding Cybersecurity and Business Continuity. 
505 8 |a APPENDIX A: Information on Cybersecurity ControlsAPPENDIX B: Standards and Good Practice Guidelines; Glossary and Definitions; Bibliography; About the Author; Index; Ad Page; Back Cover. 
520 3 |a Until recently, if it has been considered at all in the context of business continuity, cybersecurity may have been thought of in terms of disaster recovery and little else. Recent events have shown that cyberattacks are now an everyday occurrence, and it is becoming clear that the impact of these can have devastating effects on organizations whether large and small, and whether in the public or the private sector. Cybersecurity is one aspect of information security, since the impacts or consequences of a cyberattack will inevitably damage one or more of the three pillars of information security: the confidentiality, integrity, or availability of an organization's information assets. The main difference between information security and cybersecurity is that while information security deals with all types of information assets, cybersecurity deals purely with those that are accessible by means of interconnected electronic networks, including the Internet. Many responsible organizations now have robust information security, business continuity, and disaster recovery programs in place, and it is not the intention of this book to rewrite those, but to inform organizations about the kind of precautions they should take to stave off successful cyberattacks and how they should deal with them when they arise in order to protect their day-to-day business. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Cyberspace  |x Security measures. 
650 7 |a Computer crimes  |x Investigation  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Information technology  |x Management  |2 fast 
650 7 |a Technology  |x Risk assessment  |2 fast 
758 |i has work:  |a Business continuity in a cyber world (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGGqJC8Cm3mFhFmCKBRX8d  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Sutton, David.  |t Business Continuity in a Cyber World : Surviving Cyberattacks.  |d New York : Business Expert Press, ©2018  |z 9781947441460 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5435587  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH35231759 
938 |a EBL - Ebook Library  |b EBLB  |n EBL5435587 
938 |a EBSCOhost  |b EBSC  |n 1839072 
938 |a YBP Library Services  |b YANK  |n 15569942 
994 |a 92  |b IZTAP