Cargando…

The Cyber Security Handbook - Prepare for, Respond to and Recover from Cyber Attacks

This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape. Start your cyber se...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Calder, Alan
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Ely : IT Governance Ltd, 2020.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 KNOVEL_on1227385018
003 OCoLC
005 20231027140348.0
006 m o d
007 cr |||||||||||
008 201219s2020 xx o ||| 0 eng d
040 |a EBLCP  |b eng  |c EBLCP  |d YDX  |d JSTOR  |d OCLCO  |d EBLCP  |d OCLCF  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 1227086037 
020 |a 9781787782624  |q (electronic bk.) 
020 |a 178778262X  |q (electronic bk.) 
020 |a 1787782611  |q (electronic bk.) 
020 |a 9781787782617  |q (electronic bk.) 
029 1 |a AU@  |b 000068654628 
029 1 |a AU@  |b 000068857312 
035 |a (OCoLC)1227385018  |z (OCoLC)1227086037 
037 |a 22573/ctv19s9pfx  |b JSTOR 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Calder, Alan. 
245 1 4 |a The Cyber Security Handbook - Prepare for, Respond to and Recover from Cyber Attacks  |h [electronic resource]. 
260 |a Ely :  |b IT Governance Ltd,  |c 2020. 
300 |a 1 online resource (361 p.) 
500 |a Description based upon print version of record. 
505 0 |a Cover -- Title -- Copyright -- About the Author -- Contents -- Part 1: Introduction -- Chapter 1: The threat landscape -- Chapter 2: Information and cyber security -- Chapter 3: Cyber resilience -- Chapter 4: Regulatory and contractual requirements -- 4.1 International data privacy laws -- 4.2 Cyber security requirements for critical infrastructure -- 4.3 Contractual requirements -- Chapter 5: Implementing cyber security -- 5.1 Making trade-offs -- 5.2 Three security pillars -- 5.3 The IT Governance Cyber Resilience Framework (CRF) -- 5.4 Structure of the book 
505 8 |a Part 2: Threats and vulnerabilities -- Chapter 6: The anatomy of threats -- Chapter 7: Technical threats -- 7.1 The attackers -- 7.2 Malware -- 7.3 Technical threat example: TalkTalk data breach -- Chapter 8: Human threats -- 8.1 Staff awareness -- 8.2 Social engineering -- 8.3 Remote working -- 8.4 Human threat example: WannaCry -- Chapter 9: Physical threats -- 9.1 Physical entry threats -- 9.2 Physical security and mobile devices -- 9.3 Environmental threats -- 9.4 Physical threat example: KVM attacks -- Chapter 10: Third-party threats -- 10.1 Supply chain threats 
505 8 |a 10.2 Third-party threat example: Target data breach -- Part 3: The CRF processes -- Chapter 11: An overview of the CRF processes -- Chapter 12: Manage and protect -- 12.1 Asset management -- 12.2 Information security policies -- 12.3 Physical and environmental security -- 12.4 Identity and access control -- 12.5 Malware protection -- 12.6 Configuration and patch management -- 12.7 Encryption -- 12.8 System security -- 12.9 Network and communications security -- 12.10 Security competence and training -- 12.11 Staff awareness training -- 12.12 Comprehensive risk management programme 
505 8 |a 12.13 Supply chain risk management -- Chapter 13: Identify and detect -- 13.1 Threat and vulnerability intelligence -- 13.2 Security monitoring -- Chapter 14: Respond and recover -- 14.1 Incident response management -- 14.2 ICT continuity management -- 14.3 Business continuity management -- Chapter 15: Govern and assure -- 15.1 Formal information security management programme -- 15.2 Continual improvement process -- 15.3 Board-level commitment and involvement -- 15.4 Governance structure and processes -- 15.5 Internal audit -- 15.6 External certification/validation -- Chapter 16: Maturity levels 
505 8 |a 16.1 Determining the level of maturity to aim for -- Part 4: Eight steps to implementing cyber security -- Chapter 17: Introducing the IT Governance eight-step approach -- Chapter 18: Step 1 -- Start the project -- 18.1 Project mandate -- 18.2 Project team -- 18.3 Project leadership -- Chapter 19: Step 2 -- Determine requirements and objectives -- 19.1 Project vs cyber security objectives -- Chapter 20: Step 3 -- Determine the scope -- Chapter 21: Step 4 -- Define current and ideal target states -- Using the CRF -- Gap analysis -- Chapter 22: Step 5 -- Establish a continual improvement model 
505 8 |a Chapter 23: Step 6 -- Conduct a risk assessment 
520 |a This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape. Start your cyber security journey and buy this book today! 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
590 |a JSTOR  |b Books at JSTOR Evidence Based Acquisitions 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
590 |a Knovel  |b ACADEMIC - General Engineering & Project Administration 
590 |a Knovel  |b ACADEMIC - Software Engineering 
650 0 |a Computer security  |v Handbooks, manuals, etc. 
650 6 |a Sécurité informatique  |v Guides, manuels, etc. 
650 7 |a Computer security  |2 fast 
655 7 |a Handbooks and manuals  |2 fast 
776 0 8 |i Print version:  |a Calder, Alan  |t The Cyber Security Handbook - Prepare for, Respond to and Recover from Cyber Attacks  |d Ely : IT Governance Ltd,c2020 
856 4 0 |u https://appknovel.uam.elogim.com/kn/resources/kpCSHPRRC4/toc  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6424985 
938 |a YBP Library Services  |b YANK  |n 17155783 
994 |a 92  |b IZTAP