|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_on1152052205 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m d |
007 |
cr ||||||||||| |
008 |
200502s2020 xx o ||| 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|c EBLCP
|d TEU
|d OCLCF
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
020 |
|
|
|a 9781119720379
|
020 |
|
|
|a 1119720370
|
035 |
|
|
|a (OCoLC)1152052205
|
050 |
|
4 |
|a PL4464.3
|b .D447 2020eb
|
082 |
0 |
4 |
|a 495.932
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a De éminville, Marie.
|
245 |
1 |
0 |
|a Cybersecurity and Decision Makers
|h [electronic resource] :
|b Data Security and Digital Trust.
|
260 |
|
|
|a Newark :
|b John Wiley & Sons, Incorporated,
|c 2020.
|
300 |
|
|
|a 1 online resource (225 p.)
|
500 |
|
|
|a Description based upon print version of record.
|
505 |
0 |
|
|a Cover -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- Foreword -- Preface -- Introduction: Financial and Cyber Performance -- 1. An Increasingly Vulnerable World -- 1.1. The context -- 1.1.1. Technological disruptions and globalization -- 1.1.2. Data at the heart of industrial productivity -- 1.1.3. Cyberspace, an area without boundaries -- 1.1.4. IT resources -- 1.2. Cybercrime -- 1.2.1. The concept of cybercrime -- 1.2.2. Five types of threats -- 1.2.3. Five types of attackers -- 1.3. The cybersecurity market -- 1.3.1. The size of the market and its evolution
|
505 |
8 |
|
|a 1.3.2. The market by sector of activity -- 1.3.3. Types of purchases and investments -- 1.3.4. Geographical distribution -- 1.4. Cyber incidents -- 1.4.1. The facts -- 1.4.2. Testimonials versus silence -- 1.4.3. Trends -- 1.4.4. Examples -- 1.5. Examples of particularly exposed sectors of activity -- 1.5.1. Cinema -- 1.5.2. Banks -- 1.5.3. Health -- 1.5.4. Tourism and business hotels -- 1.5.5. Critical national infrastructure -- 1.6. Responsibilities of officers and directors -- 2. Corporate Governance and Digital Responsibility -- 2.1. Corporate governance and stakeholders
|
505 |
8 |
|
|a 2.2. The shareholders -- 2.2.1. Valuation of the company -- 2.2.2. Cyber rating agencies -- 2.2.3. Insider trading -- 2.2.4. Activist shareholders -- 2.2.5. The stock exchange authorities -- 2.2.6. The annual report -- 2.3. The board of directors -- 2.3.1. The facts -- 2.3.2. The four missions of the board of directors -- 2.3.3. Civil and criminal liability -- 2.3.4. The board of directors and cybersecurity -- 2.3.5. The board of directors and data protection -- 2.3.6. The statutory auditors -- 2.3.7. The numerical responsibility of the board of directors -- 2.4. Customers and suppliers
|
505 |
8 |
|
|a 2.5. Operational management -- 2.5.1. The impacts of digital transformation -- 2.5.2. The digital strategy -- 2.5.3. The consequences of poor digital performance -- 2.5.4. Cybersecurity -- 2.5.5. Merger and acquisition transactions -- 2.5.6. Governance and data protection, cybersecurity -- 3. Risk Mapping -- 3.1. Cyber-risks -- 3.2. The context -- 3.3. Vulnerabilities -- 3.3.1. Fraud against the president -- 3.3.2. Supplier fraud -- 3.3.3. Other economic impacts -- 3.4. Legal risks -- 3.4.1. Class actions -- 3.4.2. Sanctions by the CNIL and the ICO -- 3.5. The objectives of risk mapping
|
505 |
8 |
|
|a 3.6. The different methods of risk analysis -- 3.7. Risk assessment (identify) -- 3.7.1. The main actors -- 3.7.2. The steps -- 3.8. Protecting -- 3.9. Detecting -- 3.10. Reacting -- 3.11. Restoring -- 3.12. Decentralized mapping -- 3.12.1. The internal threat -- 3.12.2. Industrial risks -- 3.12.3. Suppliers, subcontractors and service providers -- 3.12.4. Connected objects -- 3.13. Insurance -- 3.14. Non-compliance risks and ethics -- 4. Regulations -- 4.1. The context -- 4.1.1. Complaints filed with the CNIL -- 4.1.2. Vectaury -- 4.1.3. Optical Center -- 4.1.4. Dailymotion
|
500 |
|
|
|a 4.2. The different international regulations (data protection)
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Business enterprises
|x Security measures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Entreprises
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Business enterprises
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
758 |
|
|
|i has work:
|a Cybersecurity and decision makers (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGghMQQWFMyjJyPxBmtMyd
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a De éminville, Marie
|t Cybersecurity and Decision Makers : Data Security and Digital Trust
|d Newark : John Wiley & Sons, Incorporated,c2020
|z 9781786305190
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=6173684
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6173684
|
994 |
|
|
|a 92
|b IZTAP
|