Cargando…

Cyber Security

Detalles Bibliográficos
Autor principal: MBE, Helen Wong
Formato: Electrónico eBook
Idioma:Inglés
Publicado: London : Bloomsbury Publishing Plc, 2018.
Acceso en línea:Texto completo

MARC

LEADER 00000cam a22000007 4500
001 EBOOKCENTRAL_on1152056199
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |||||||||||
008 200509s2018 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCQ  |d OCLCL 
019 |a 1262371411 
020 |a 9781526505880 
020 |a 1526505886 
035 |a (OCoLC)1152056199  |z (OCoLC)1262371411 
082 0 4 |a 005.8 
049 |a UAMI 
100 1 |a MBE, Helen Wong. 
245 1 0 |a Cyber Security 
260 |a London :  |b Bloomsbury Publishing Plc,  |c 2018. 
300 |a 1 online resource (787 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Intro -- Preface -- Dedication -- Bibliography -- Table of Statutes -- Table of Statutory Instruments -- Table of Cases -- 1. THREATS -- Cyber criminals -- States and State-sponsored threats -- Terrorists -- Hacktivists -- Script Kiddies -- 2. VULNERABILITIES -- An expanding range of devices -- Poor cyber hygiene and compliance -- Insufficient training and skills -- Legacy and unpatched systems -- Availability of hacking resources -- 3. THE LAW -- Introduction -- International instruments -- Convention 108 -- Council of Europe Convention on Cybercrime 
505 8 |a European and European Union-level instruments -- The Convention for the Protection of Human Rights and Fundamental Freedoms (ECHR) -- European Court of Human Rights (ECtHR) and the application of the ECHR to privacy and data protection -- Case law of the ECtHR (on privacy and security) -- Treaty of Lisbon and the EU Charter of Fundamental Rights and Freedoms -- The EU's General Data Protection Regulation (GDPR) -- E-privacy Directive and Regulation -- Payment Service Directive 2 (PSD2) 
505 8 |a Regulation on electronic identification and trust services for electronic transactions in the internal market (eIDAS) -- The Directive on security of network and information systems (NIS Directive) -- UK's legislation -- The UK's Human Rights Act 1998 (HRA) -- Data Protection Bill (Act) (2018) -- The Privacy and Electronic Communications (EC Directive) Regulations (PECR) -- Regulation of Investigatory Powers Act (RIPA, 2000), Data Retention and Regulation of Investigatory Powers Act (DRIPA, 2014), Investigatory Powers Act (IPA, 2016) -- Computer Misuse Act (CMA) -- CMA in practice 
505 8 |a A focus on The Computer Misuse Act -- Territorial Scope -- Sections 4 and 5 -- 4. HOW TO DEFEND -- Active Cyber Defence -- What is good active cyber defence? -- Building a more secure Internet -- Protecting organisations -- The supply chain, a potential leaky chain in your armour -- Social engineering, your number one threat -- Malware, a sneaky nightware -- Your company website, your continually exposed gateway to the world -- Removable media and optical media, danger comes in small cheap packages -- Passwords and authentication, the primary gatekeeper 
505 8 |a Smartphones, it is in reality a pocket PC -- Cloud security, more secure than on-premise? Well it depends -- Patching and vulnerability management, a never-ending battle -- Governance, risk and compliance, dry but it can work if done properly -- Protecting our critical national infrastructure and other priority sectors -- Changing public and business behaviours -- Managing incidents and understanding the threat -- 5. PRIVACY AND SECURITY IN THE WORKPLACE -- Introduction -- Legal instruments on data protection and security in the workplace -- Role of the employer 
500 |a The definition of an employee and a workplace 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
758 |i has work:  |a Cyber security (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCH34rcrxkGVCBCq4MB7HQ3  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a MBE, Helen Wong.  |t Cyber Security: Law and Guidance.  |d London : Bloomsbury Publishing Plc, ©2018 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=6683657  |z Texto completo 
936 |a BATCHLOAD 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6683657 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6179570 
994 |a 92  |b IZTAP