Cargando…

Cyber Security

Detalles Bibliográficos
Autor principal: MBE, Helen Wong
Formato: Electrónico eBook
Idioma:Inglés
Publicado: London : Bloomsbury Publishing Plc, 2018.
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Intro
  • Preface
  • Dedication
  • Bibliography
  • Table of Statutes
  • Table of Statutory Instruments
  • Table of Cases
  • 1. THREATS
  • Cyber criminals
  • States and State-sponsored threats
  • Terrorists
  • Hacktivists
  • Script Kiddies
  • 2. VULNERABILITIES
  • An expanding range of devices
  • Poor cyber hygiene and compliance
  • Insufficient training and skills
  • Legacy and unpatched systems
  • Availability of hacking resources
  • 3. THE LAW
  • Introduction
  • International instruments
  • Convention 108
  • Council of Europe Convention on Cybercrime
  • European and European Union-level instruments
  • The Convention for the Protection of Human Rights and Fundamental Freedoms (ECHR)
  • European Court of Human Rights (ECtHR) and the application of the ECHR to privacy and data protection
  • Case law of the ECtHR (on privacy and security)
  • Treaty of Lisbon and the EU Charter of Fundamental Rights and Freedoms
  • The EU's General Data Protection Regulation (GDPR)
  • E-privacy Directive and Regulation
  • Payment Service Directive 2 (PSD2)
  • Regulation on electronic identification and trust services for electronic transactions in the internal market (eIDAS)
  • The Directive on security of network and information systems (NIS Directive)
  • UK's legislation
  • The UK's Human Rights Act 1998 (HRA)
  • Data Protection Bill (Act) (2018)
  • The Privacy and Electronic Communications (EC Directive) Regulations (PECR)
  • Regulation of Investigatory Powers Act (RIPA, 2000), Data Retention and Regulation of Investigatory Powers Act (DRIPA, 2014), Investigatory Powers Act (IPA, 2016)
  • Computer Misuse Act (CMA)
  • CMA in practice
  • A focus on The Computer Misuse Act
  • Territorial Scope
  • Sections 4 and 5
  • 4. HOW TO DEFEND
  • Active Cyber Defence
  • What is good active cyber defence?
  • Building a more secure Internet
  • Protecting organisations
  • The supply chain, a potential leaky chain in your armour
  • Social engineering, your number one threat
  • Malware, a sneaky nightware
  • Your company website, your continually exposed gateway to the world
  • Removable media and optical media, danger comes in small cheap packages
  • Passwords and authentication, the primary gatekeeper
  • Smartphones, it is in reality a pocket PC
  • Cloud security, more secure than on-premise? Well it depends
  • Patching and vulnerability management, a never-ending battle
  • Governance, risk and compliance, dry but it can work if done properly
  • Protecting our critical national infrastructure and other priority sectors
  • Changing public and business behaviours
  • Managing incidents and understanding the threat
  • 5. PRIVACY AND SECURITY IN THE WORKPLACE
  • Introduction
  • Legal instruments on data protection and security in the workplace
  • Role of the employer