Cargando…

Cyberwar, cyberterror, cybercrime and cyberactivism : an in-depth guide to the role of standards in cybersecurity environment /

This book encourages cybersecurity professionals to take a wider view of what cybersecurity means, and to make the most of international standards and best practice to create a culture of cybersecurity awareness that complements technology-based defenses. This second edition analyzes the changing th...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Mehan, Julie E. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Ely, Cambridge, UK : IT Governance Pub., 2014.
Edición:2nd ed.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 JSTOR_ocn888035950
003 OCoLC
005 20231005004200.0
006 m o d
007 cr unu||||||||
008 140820s2014 enka ob 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d CAUOI  |d B24X7  |d DEBBG  |d DEBSZ  |d JSTOR  |d COO  |d YDXCP  |d N$T  |d OCLCF  |d EBLCP  |d IDEBK  |d OCLCQ  |d TEFOD  |d OCLCQ  |d AGLDB  |d CUS  |d CUI  |d JBG  |d MERUC  |d OCLCQ  |d IOG  |d OCLCA  |d VTS  |d CEF  |d WAU  |d OCLCQ  |d LVT  |d STF  |d M8D  |d OCLCQ  |d AJS  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 890529932  |a 907519119 
020 |a 9781849285728  |q (electronic bk.) 
020 |a 1849285721  |q (electronic bk.) 
020 |z 1849285713 
020 |z 9781849285711 
029 1 |a AU@  |b 000056008057 
029 1 |a AU@  |b 000067040230 
029 1 |a CHNEW  |b 000888590 
029 1 |a CHVBK  |b 374475067 
029 1 |a DEBBG  |b BV042182348 
029 1 |a DEBSZ  |b 415542944 
029 1 |a DEBSZ  |b 417230273 
029 1 |a DEBSZ  |b 472838954 
029 1 |a GBVCP  |b 804971714 
035 |a (OCoLC)888035950  |z (OCoLC)890529932  |z (OCoLC)907519119 
037 |a CL0500000466  |b Safari Books Online 
037 |a 22573/ctt7z4f4c  |b JSTOR 
037 |a F64A6000-ECF8-4944-9F65-EF5E8314D43F  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a HV6773 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.802/18  |2 22 
049 |a UAMI 
100 1 |a Mehan, Julie E.,  |e author. 
245 1 0 |a Cyberwar, cyberterror, cybercrime and cyberactivism :  |b an in-depth guide to the role of standards in cybersecurity environment /  |c Julie E. Mehan. 
250 |a 2nd ed. 
260 |a Ely, Cambridge, UK :  |b IT Governance Pub.,  |c 2014. 
300 |a 1 online resource (348 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title page (Safari, viewed August 7, 2014). 
520 |a This book encourages cybersecurity professionals to take a wider view of what cybersecurity means, and to make the most of international standards and best practice to create a culture of cybersecurity awareness that complements technology-based defenses. This second edition analyzes the changing threats in the cyber landscape, and includes an updated body of knowledge that describes how to acquire, develop, and sustain a secure information environment that goes beyond technology and how to create a cyber-aware organizational culture that is more robust and better able to deal with a wider range of threats. --  |c Edited summary from book. 
504 |a Includes bibliographical references and index. 
505 0 |a Cover; Title; Copyright; Preface; About the Author; Contents; Introduction; Chapter 1: Technology Is a Double-Edged Sword; From the printing press to the information age; The ''dark side of high tech''; Chapter 2: Cyber Attack: It''s A Dangerous World for Information Systems; Cyberwar; Cyberterror; Cybercrime; CyberEspionage (and Information Exfiltration) -- It''s midnight; do you know where your data is?; Social Media -- an opportunity and a challenge; Supply Chain (In- ) security; The blended threat; The asymmetric effects of cyber attacks; Porous perimeters, compromisable software -- or both? 
505 8 |a If we know about the vulnerabilities, why are exploits still successful?Chapter 3: The Human Factor: The Underrated Threat; Are people the problem?; Who are the attackers?; Most likely forms of attack; Sometimes it''s just human error; People can also be the solution!; Chapter 4: Transition from an Environment of ''FUD'' to a Standards-Based Environment; Chapter 5: Establishing a Culture of Cybersecurity; Chapter 6: Increasing Internationalism: Governance, Laws, and Ethics; Information globalism equals increased exposure; Following the lead of good governance; The proliferation of laws. 
505 8 |a Ethics in an information society and a minimum standard of due care in cybersecurityCybersecurity and privacy; Chapter 7: Standards: What Are They and Why Should We Care?; What are standards?; How and by whom are standards developed?; The importance of terminology; Standards-based process improvement; Focus on consensus-based cybersecurity; Standards provide a level playing-field for co-ordination and co-operation; If standards are so good, then why is it so hard?; Chapter 8: From Reaction to Proaction: Applying Standards in an Environment of Change and Danger. 
505 8 |a Moving beyond compliance and reactionA quick look at relevant standards; Take four steps forward; The future is ''ROSI''; Making the case for cybersecurity assurance; Chapter 9: Conclusion: Where Do We Go From Here?; Cybersecurity program roadmap; Appendix 1: Gap Analysis Areas of Interest; Appendix 2: Standards Crosswalk; Definitions; Acronyms; Index; A; B; C; D; E; F; G; H; I; J; K; L; M; N; O; P; Q; R; S; T; U; V; W; X; Y; ITG Resources. 
590 |a JSTOR  |b Books at JSTOR All Purchased 
590 |a JSTOR  |b Books at JSTOR Evidence Based Acquisitions 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
650 0 |a Computer security. 
650 0 |a Hacking. 
650 0 |a Electronics in military engineering. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Piratage informatique. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security  |2 fast 
650 7 |a Electronics in military engineering  |2 fast 
650 7 |a Hacking  |2 fast 
776 0 8 |i Print version:  |a Mehan, Julie.  |t Cyberwar, Cyberterror, Cybercrime & Cyberactivism (2nd Edition) : An in-depth guide to the role of standards in the cybersecurity environment.  |d Ely : IT Governance Ltd, ©2014 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.2307/j.ctt7zsxqq  |z Texto completo 
938 |a Books 24x7  |b B247  |n bks00069065 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1778762 
938 |a EBSCOhost  |b EBSC  |n 838730 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis28005361 
938 |a YBP Library Services  |b YANK  |n 12069029 
994 |a 92  |b IZTAP