|
|
|
|
LEADER |
00000cam a22000007 4500 |
001 |
EBOOKCENTRAL_on1152056199 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
200509s2018 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCQ
|d OCLCL
|
019 |
|
|
|a 1262371411
|
020 |
|
|
|a 9781526505880
|
020 |
|
|
|a 1526505886
|
035 |
|
|
|a (OCoLC)1152056199
|z (OCoLC)1262371411
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a MBE, Helen Wong.
|
245 |
1 |
0 |
|a Cyber Security
|
260 |
|
|
|a London :
|b Bloomsbury Publishing Plc,
|c 2018.
|
300 |
|
|
|a 1 online resource (787 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Intro -- Preface -- Dedication -- Bibliography -- Table of Statutes -- Table of Statutory Instruments -- Table of Cases -- 1. THREATS -- Cyber criminals -- States and State-sponsored threats -- Terrorists -- Hacktivists -- Script Kiddies -- 2. VULNERABILITIES -- An expanding range of devices -- Poor cyber hygiene and compliance -- Insufficient training and skills -- Legacy and unpatched systems -- Availability of hacking resources -- 3. THE LAW -- Introduction -- International instruments -- Convention 108 -- Council of Europe Convention on Cybercrime
|
505 |
8 |
|
|a European and European Union-level instruments -- The Convention for the Protection of Human Rights and Fundamental Freedoms (ECHR) -- European Court of Human Rights (ECtHR) and the application of the ECHR to privacy and data protection -- Case law of the ECtHR (on privacy and security) -- Treaty of Lisbon and the EU Charter of Fundamental Rights and Freedoms -- The EU's General Data Protection Regulation (GDPR) -- E-privacy Directive and Regulation -- Payment Service Directive 2 (PSD2)
|
505 |
8 |
|
|a Regulation on electronic identification and trust services for electronic transactions in the internal market (eIDAS) -- The Directive on security of network and information systems (NIS Directive) -- UK's legislation -- The UK's Human Rights Act 1998 (HRA) -- Data Protection Bill (Act) (2018) -- The Privacy and Electronic Communications (EC Directive) Regulations (PECR) -- Regulation of Investigatory Powers Act (RIPA, 2000), Data Retention and Regulation of Investigatory Powers Act (DRIPA, 2014), Investigatory Powers Act (IPA, 2016) -- Computer Misuse Act (CMA) -- CMA in practice
|
505 |
8 |
|
|a A focus on The Computer Misuse Act -- Territorial Scope -- Sections 4 and 5 -- 4. HOW TO DEFEND -- Active Cyber Defence -- What is good active cyber defence? -- Building a more secure Internet -- Protecting organisations -- The supply chain, a potential leaky chain in your armour -- Social engineering, your number one threat -- Malware, a sneaky nightware -- Your company website, your continually exposed gateway to the world -- Removable media and optical media, danger comes in small cheap packages -- Passwords and authentication, the primary gatekeeper
|
505 |
8 |
|
|a Smartphones, it is in reality a pocket PC -- Cloud security, more secure than on-premise? Well it depends -- Patching and vulnerability management, a never-ending battle -- Governance, risk and compliance, dry but it can work if done properly -- Protecting our critical national infrastructure and other priority sectors -- Changing public and business behaviours -- Managing incidents and understanding the threat -- 5. PRIVACY AND SECURITY IN THE WORKPLACE -- Introduction -- Legal instruments on data protection and security in the workplace -- Role of the employer
|
500 |
|
|
|a The definition of an employee and a workplace
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
758 |
|
|
|i has work:
|a Cyber security (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCH34rcrxkGVCBCq4MB7HQ3
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a MBE, Helen Wong.
|t Cyber Security: Law and Guidance.
|d London : Bloomsbury Publishing Plc, ©2018
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=6683657
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6683657
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6179570
|
994 |
|
|
|a 92
|b IZTAP
|