Cargando…

Rewired : the Past, Present, and Future of Cybersecurity.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Ellis, Ryan
Otros Autores: Mohan, Vivek
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Somerset : John Wiley & Sons, Incorporated, 2019.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_on1099983084
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 190504s2019 xx o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCQ  |d AJB  |d OCLCQ  |d OCLCO  |d OCLCL 
020 |a 9781119085201 
020 |a 1119085209 
029 1 |a AU@  |b 000065307424 
035 |a (OCoLC)1099983084 
050 0 0 |a QA76.9.A25  |b RA36 2019 
082 0 4 |a 005.8  |q OCoLC  |2 23/eng/20230216 
049 |a UAMI 
100 1 |a Ellis, Ryan. 
245 1 0 |a Rewired :  |b the Past, Present, and Future of Cybersecurity. 
260 |a Somerset :  |b John Wiley & Sons, Incorporated,  |c 2019. 
300 |a 1 online resource (354 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Intro; Title Page; Copyright Page; Contents; Notes on Contributors: Introduction; Acknowledgments; Introduction; Chapter 1 Cybersecurity Information-Sharing Governance Structures: An Ecosystem of Diversity, Trust, and Trade-offs; 1.1 Introduction; 1.2 Taxonomy of Information-sharing Governance Structures and Policies; 1.2.1 Government-centric Sharing Models; 1.2.2 Government-Prompted, Industry-Centric Sharing Models; 1.2.3 Corporate-initiated, Peer-based Groups; 1.2.4 Small, Highly Vetted, Individual-based Groups; 1.2.5 Open Communities and Platforms 
505 8 |a 1.2.6 Proprietary Products and Commercialized Services1.3 Discussion and Conclusions; 1.3.1 Trust and the Trade-offs; 1.3.2 The Ecosystem and the Role of the Federal Government; Acknowledgments; Notes; Chapter 2 Cybersecurity Governance in the GCC; 2.1 Introduction; 2.2 Why the GCC?; 2.3 Key Cybersecurity Incidents; 2.4 Government Organizations; 2.5 Strategies, Laws, and Standards; 2.6 The Cybersecurity Industry; 2.7 Conclusion; Acknowlegments; Notes; Chapter 3 The United Kingdom's Emerging Internet of Things (IoT) Policy Landscape; 3.1 Introduction; 3.2 The IoT's Risks and Uncertainties 
505 8 |a 3.3 Adaptive Policymaking in the Context of IoT3.4 The UK Policy Landscape; 3.5 The IoT and its Governance Challenges; 3.6 Conclusion; Notes; Chapter 4 Birds of a Feather: Strategies for Collective Cybersecurity in the Aviation Ecosystem; 4.1 Introduction: The Challenge of Ecosystem Risk; 4.1.1 Aviation Is a National and Global Target; 4.1.1.1 The Cyber Harm; 4.1.1.2 Economic Harm; 4.1.1.3 Political/Governmental Harm; 4.1.1.4 Reputational Harm; 4.1.1.5 Physical Harm; 4.1.1.6 Psychological and Emotional Harm; 4.1.2 Domestic and International Challenges of Aviation Governance 
505 8 |a 4.2 Progress So Far4.2.1 The AIAA's Decision Paper, "The Connectivity Challenge: Protecting Critical Assets in a Networked World" (August 2013); 4.2.2 The Aviation Information Sharing and Analysis Center (A-ISAC) (September 2014); 4.2.3 The Civil Aviation Cybersecurity Action Plan (December 2014); 4.2.4 Connecting the Dots on Connectivity (2015); 4.2.5 Hackers Allege Aircraft Vulnerabilities (2015); 4.2.6 United Airlines Opens Bug Bounty Program (2015); 4.2.7 Aviation Security World Conference (2015); 4.2.8 Conferences and Organizations Mature (2015 and Beyond) 
505 8 |a 4.2.9 Industry Takes the Lead (2017)4.3 Aviation's Tools for Cyber Risk Governance; 4.4 The Path Forward; 4.4.1 Collective Third-Party Risk Management; 4.4.2 Secure Design; 4.4.3 Information Sharing, "Plus"; 4.4.4 International Norms and Standards; 4.5 Conclusion; Notes; Chapter 5 An Incident-Based Conceptualization of Cybersecurity Governance; 5.1 Introduction; 5.2 Conceptualizing Cybersecurity Governance; 5.3 Case Studies; 5.3.1 RUAG; 5.3.1.1 Background; 5.3.1.2 Events; 5.3.1.3 Learnings; 5.3.2 The Conficker Working Group; 5.3.2.1 Background; 5.3.2.2 Events; 5.3.2.3 Learnings 
500 |a 5.3.3 Symantec's Cybersecurity Practices 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Security measures  |2 fast 
700 1 |a Mohan, Vivek. 
758 |i has work:  |a Rewired (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCYWYdqRGwwmHBFBpGpYkQm  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Ellis, Ryan.  |t Rewired : The Past, Present, and Future of Cybersecurity.  |d Somerset : John Wiley & Sons, Incorporated, ©2019  |z 9781118888216 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5761058  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5761058 
994 |a 92  |b IZTAP