Cyber Security
Autor principal: | |
---|---|
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
London :
Bloomsbury Publishing Plc,
2018.
|
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Intro
- Preface
- Dedication
- Bibliography
- Table of Statutes
- Table of Statutory Instruments
- Table of Cases
- 1. THREATS
- Cyber criminals
- States and State-sponsored threats
- Terrorists
- Hacktivists
- Script Kiddies
- 2. VULNERABILITIES
- An expanding range of devices
- Poor cyber hygiene and compliance
- Insufficient training and skills
- Legacy and unpatched systems
- Availability of hacking resources
- 3. THE LAW
- Introduction
- International instruments
- Convention 108
- Council of Europe Convention on Cybercrime
- European and European Union-level instruments
- The Convention for the Protection of Human Rights and Fundamental Freedoms (ECHR)
- European Court of Human Rights (ECtHR) and the application of the ECHR to privacy and data protection
- Case law of the ECtHR (on privacy and security)
- Treaty of Lisbon and the EU Charter of Fundamental Rights and Freedoms
- The EU's General Data Protection Regulation (GDPR)
- E-privacy Directive and Regulation
- Payment Service Directive 2 (PSD2)
- Regulation on electronic identification and trust services for electronic transactions in the internal market (eIDAS)
- The Directive on security of network and information systems (NIS Directive)
- UK's legislation
- The UK's Human Rights Act 1998 (HRA)
- Data Protection Bill (Act) (2018)
- The Privacy and Electronic Communications (EC Directive) Regulations (PECR)
- Regulation of Investigatory Powers Act (RIPA, 2000), Data Retention and Regulation of Investigatory Powers Act (DRIPA, 2014), Investigatory Powers Act (IPA, 2016)
- Computer Misuse Act (CMA)
- CMA in practice
- A focus on The Computer Misuse Act
- Territorial Scope
- Sections 4 and 5
- 4. HOW TO DEFEND
- Active Cyber Defence
- What is good active cyber defence?
- Building a more secure Internet
- Protecting organisations
- The supply chain, a potential leaky chain in your armour
- Social engineering, your number one threat
- Malware, a sneaky nightware
- Your company website, your continually exposed gateway to the world
- Removable media and optical media, danger comes in small cheap packages
- Passwords and authentication, the primary gatekeeper
- Smartphones, it is in reality a pocket PC
- Cloud security, more secure than on-premise? Well it depends
- Patching and vulnerability management, a never-ending battle
- Governance, risk and compliance, dry but it can work if done properly
- Protecting our critical national infrastructure and other priority sectors
- Changing public and business behaviours
- Managing incidents and understanding the threat
- 5. PRIVACY AND SECURITY IN THE WORKPLACE
- Introduction
- Legal instruments on data protection and security in the workplace
- Role of the employer