|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn910159354 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
150527s2015 caua ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d GW5XE
|d N$T
|d OCLCO
|d IDEBK
|d YDXCP
|d CDX
|d E7B
|d COO
|d UMI
|d DEBBG
|d VLB
|d B24X7
|d OCLCF
|d OCLCO
|d EBLCP
|d DEBSZ
|d OCLCQ
|d OCLCO
|d VT2
|d UAB
|d Z5A
|d LIV
|d OCLCQ
|d MERUC
|d ESU
|d IOG
|d OCLCA
|d U3W
|d OCLCQ
|d CEF
|d DEHBZ
|d OCLCQ
|d INT
|d REB
|d UKMGB
|d OCLCQ
|d WYU
|d OCLCQ
|d UKAHL
|d OCLCQ
|d DCT
|d ERF
|d OCLCQ
|d SFB
|d WURST
|d BRF
|d OCLCO
|d OCLCQ
|
016 |
7 |
|
|a 019090959
|2 Uk
|
019 |
|
|
|a 911430840
|a 972035877
|a 985060201
|a 1005749484
|a 1008952661
|a 1021260686
|a 1026466036
|a 1066477410
|a 1066644633
|a 1086463909
|a 1110887567
|a 1112537831
|a 1126469680
|a 1129333934
|a 1136296001
|a 1152982549
|
020 |
|
|
|a 9781430260837
|q (electronic bk.)
|
020 |
|
|
|a 1430260831
|q (electronic bk.)
|
020 |
|
|
|a 1430260823
|q (print)
|
020 |
|
|
|a 9781430260820
|q (print)
|
020 |
|
|
|z 9781430260820
|
024 |
7 |
|
|a 10.1007/978-1-4302-6083-7
|2 doi
|
029 |
1 |
|
|a AU@
|b 000054975717
|
029 |
1 |
|
|a DEBBG
|b BV042683768
|
029 |
1 |
|
|a DEBBG
|b BV043625010
|
029 |
1 |
|
|a DEBSZ
|b 446589772
|
029 |
1 |
|
|a DEBSZ
|b 453681883
|
029 |
1 |
|
|a GBVCP
|b 829920676
|
029 |
1 |
|
|a NLGGC
|b 393497763
|
029 |
1 |
|
|a NZ1
|b 16092333
|
029 |
1 |
|
|a UKMGB
|b 019090959
|
029 |
1 |
|
|a AU@
|b 000067093362
|
029 |
1 |
|
|a AU@
|b 000068982819
|
035 |
|
|
|a (OCoLC)910159354
|z (OCoLC)911430840
|z (OCoLC)972035877
|z (OCoLC)985060201
|z (OCoLC)1005749484
|z (OCoLC)1008952661
|z (OCoLC)1021260686
|z (OCoLC)1026466036
|z (OCoLC)1066477410
|z (OCoLC)1066644633
|z (OCoLC)1086463909
|z (OCoLC)1110887567
|z (OCoLC)1112537831
|z (OCoLC)1126469680
|z (OCoLC)1129333934
|z (OCoLC)1136296001
|z (OCoLC)1152982549
|
037 |
|
|
|a CL0500000606
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.875.I57
|b D65 2015eb
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a URY
|2 bicssc
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Donaldson, Scott E.,
|e author.
|
245 |
1 |
0 |
|a Enterprise cybersecurity :
|b how to build a successful cyberdefense program against advanced threats /
|c Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam.
|
264 |
|
1 |
|a [Berkeley, CA] :
|b Apress,
|c [2015]
|
264 |
|
4 |
|c ©2015
|
300 |
|
|
|a 1 online resource :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a The expert's voice in cybersecurity
|
588 |
0 |
|
|a Online resource; title from PDF title page (EBSCO, viewed May 28, 2015).
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment. Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker can eventually defeat defensive measures protecting an enterprise?s computer systems and IT networks. To prevail, an enterprise cybersecurity program must manage risk by detecting attacks early enough and delaying them long enough that the defenders have time to respond effectively. Enterprise Cybersecurity shows players at all levels of responsibility how to unify their organization?s people, budgets, technologies, and processes into a cost-efficient cybersecurity program capable of countering advanced cyberattacks and containing damage in the event of a breach. The authors of Enterprise Cybersecurity explain at both strategic and tactical levels how to accomplish the mission of leading, designing, deploying, operating, managing, and supporting cybersecurity capabilities in an enterprise environment. The authors are recognized experts and thought leaders in this rapidly evolving field, drawing on decades of collective experience in cybersecurity and IT. In capacities ranging from executive strategist to systems architect to cybercombatant, Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam have fought on the front lines of cybersecurity against advanced persistent threats to government, military, and business entities.
|
505 |
0 |
0 |
|g Machine generated contents note:
|g ch. 1
|t Defining the Cybersecurity Challenge --
|t Cyberattacks of Today --
|t Sony Pictures Entertainment Breach of 2014 --
|t Advanced Persistent Threats --
|t Waves of Malware --
|t Types of Cyberattackers --
|t Commodity Threats --
|t Hacktivists --
|t Organized Crime --
|t Espionage --
|t Cyberwar --
|t Types of Cyberattacks --
|t Confidentiality: Steal Data --
|t Integrity: Modify Data (Steal Money) --
|t Availability: Deny Access --
|t Steps of a Cyberintrusion --
|t Attack Trees and Attack Graphs --
|t Lockheed Martin Kill Chain --
|t Mandiant Attack Life Cycle --
|t Enterprise Cybersecurity Attack Sequence --
|t Why Cyberintrusions Succeed --
|t Explosion in Connectivity --
|t Consolidation of Enterprise IT --
|t Defeat of Preventive Controls --
|t Failure of Detective Controls --
|t Compliance over Capability --
|t Gap in Cybersecurity Effectiveness --
|t New Cybersecurity Mindset --
|t Effective Enterprise Cybersecurity Program --
|g ch. 2
|t Meeting the Cybersecurity Challenge --
|t Cybersecurity Frameworks --
|t Cybersecurity Process --
|t Cybersecurity Challenges --
|t Risk Management Process --
|t Considering Vulnerabilities, Threats, and Risks --
|t Risk Analysis and Mitigation --
|t Cybersecurity Controls --
|t Cybersecurity Capabilities --
|t Cybersecurity and Enterprise IT --
|t Emplacing Cyberdefenses --
|t How Cyberdefenses Interconnect --
|t Enterprise Cybersecurity Architecture --
|g ch. 3
|t Enterprise Cybersecurity Architecture --
|t Systems Administration --
|t Systems Administration: Goal and Objectives --
|t Systems Administration: Threat Vectors --
|t Systems Administration: Capabilities --
|t Network Security --
|t Network Security: Goal and Objectives --
|t Network Security: Threat Vectors --
|t Network Security: Capabilities --
|t Application Security --
|t Application Security: Goal and Objectives --
|t Application Security: Threat Vectors --
|t Application Security: Capabilities --
|t Endpoint, Server, and Device Security --
|t Endpoint, Server, and Device Security: Goal and Objectives --
|t Endpoint, Server, and Device Security: Threat Vectors --
|t Endpoint, Server, and Device Security: Capabilities --
|t Identity, Authentication, and Access Management --
|t Identity, Authentication, and Access Management: Goal and Objectives --
|t Identity, Authentication, and Access Management: Threat Vectors --
|t Identity, Authentication, and Access Management: Capabilities --
|t Data Protection and Cryptography --
|t Data Protection and Cryptography: Goal and Objectives --
|t Data Protection and Cryptography: Threat Vectors --
|t Data Protection and Cryptography: Capabilities --
|t Monitoring, Vulnerability, and Patch Management --
|t Monitoring, Vulnerability, and Patch Management: Goal and Objectives --
|t Monitoring, Vulnerability, and Patch Management: Threat Vectors --
|t Monitoring, Vulnerability, and Patch Management: Capabilities --
|t High Availability, Disaster Recovery, and Physical Protection --
|t High Availability, Disaster Recovery, and Physical Protection: Goal and Objectives --
|t High Availability, Disaster Recovery, and Physical Protection: Threat Vectors --
|t High Availability, Disaster Recovery, and Physical Protection: Capabilities --
|t Incident Response --
|t Incident Response: Goal and Objectives --
|t Incident Response: Threat Vectors --
|t Incident Response: Capabilities --
|t Asset Management and Supply Chain --
|t Asset Management and Supply Chain: Goal and Objectives --
|t Asset Management and Supply Chain: Threat Vectors --
|t Asset Management and Supply Chain: Capabilities --
|t Policy, Audit, E-Discovery, and Training --
|t Policy, Audit, E-Discovery, and Training: Goal and Objectives --
|t Policy, Audit, E-Discovery, and Training: Threat Vectors --
|t Policy, Audit, E-Discovery, and Training: Capabilities --
|g ch. 4
|t Implementing Enterprise Cybersecurity --
|t IT Organization --
|t IT System Life Cycle --
|t Defining Security Policies --
|t Defining Security Scopes --
|t Eight Types of Security Scopes --
|t Considerations in Selecting Security Scopes --
|t Identifying Security Scopes --
|t Security Scopes for the Typical Enterprise --
|t Considerations in Selecting Security Scopes --
|t Selecting Security Controls --
|t Selecting Security Capabilities --
|t Selecting Security Technologies --
|t Considering Security Effectiveness --
|g ch. 5
|t Operating Enterprise Cybersecurity --
|t Operational Responsibilities --
|t Business (CIO, customers) --
|t Security (Cybersecurity) --
|t (IT) Strategy/Architecture --
|t (IT) Engineering --
|t (IT) Operations --
|t High-Level IT and Cybersecurity Processes --
|t IT Operational Process --
|t Risk Management Process --
|t Vulnerability Management and Incident Response Process --
|t Auditing and Deficiency Tracking Process --
|t Operational Processes and Information Systems --
|t Cybersecurity Operational Processes --
|t Supporting Information Systems --
|t Functional Area Operational Objectives --
|t Systems Administration --
|t Network Security --
|t Application Security --
|t Endpoint, Server, and Device Security --
|t Identity, Authentication, and Access Management --
|t Data Protection and Cryptography --
|t Monitoring, Vulnerability, and Patch Management --
|t High Availability, Disaster Recovery, and Physical Protection --
|t Incident Response --
|t Asset Management and Supply Chain --
|t Policy, Audit, E-Discovery, and Training --
|g ch. 6
|t Enterprise Cybersecurity and the Cloud --
|t Introducing the Cloud --
|t Cloud Protection Challenges --
|t Developer Operations (DevOps) and Developer Security Operations (DevSecOps) --
|t Scopes and Account Management --
|t Authentication --
|t Data Protection and Key Management --
|t Logging, Monitoring, and Investigations --
|t Reliability and Disaster Recovery --
|t Scale and Reliability --
|t Contracts and Agreements --
|t Planning Enterprise Cybersecurity for the Cloud --
|t Systems Administration --
|t Network Security --
|t Application Security --
|t Endpoint, Server, and Device Security --
|t Identity, Authentication, and Access Management --
|t Data Protection and Cryptography --
|t Monitoring, Vulnerability, and Patch Management --
|t High Availability, Disaster Recovery, and Physical Protection --
|t Incident Response --
|t Asset Management and Supply Chain --
|t Policy, Audit, E-Discovery, and Training --
|g ch. 7
|t Enterprise Cybersecurity for Mobile and BYOD --
|t Introducing Mobile and BYOD --
|t Challenges with Mobile and BYOD --
|t Legal Agreements for Data Protection --
|t Personal Use and Personal Data --
|t Mobile Platform --
|t Sensors and Location Awareness --
|t Always-On and Always-Connected --
|t Multi-Factor Authentication --
|t Mobile Device Management --
|t Enterprise Cybersecurity for Mobile and BYOD --
|t Systems Administration --
|t Network Security --
|t Application Security --
|t Endpoint, Server, and Device Security --
|t Identity, Authentication, and Access Management --
|t Data Protection and Cryptography --
|t Monitoring, Vulnerability, and Patch Management --
|t High Availability, Disaster Recovery, and Physical Protection --
|t Incident Response --
|t Asset Management and Supply Chain --
|t Policy, Audit, E-Discovery, and Training --
|g ch. 8
|t Building an Effective Defense --
|t Attacks Are as Easy as 1, 2, 3! --
|t Enterprise Attack Sequence in Detail --
|t Attack Sequence Step 1 Establish Foothold --
|t Attack Sequence Step 2 Command and Control --
|t Attack Sequence Step 3 Escalate Privileges --
|t Attack Sequence Step 4 Move Laterally --
|t Attack Sequence Step 5 Complete the Mission --
|t Why Security Fails Against Advanced Attacks --
|t Failure of Endpoint Security --
|t "Inevitability of 'the Click" Challenge --
|t Systems Administration Hierarchy --
|t Escalating Attacks and Defenses --
|t Business Challenges to Security --
|t Tension between Security and Productivity --
|t Maximum Allowable Risk --
|t Security Effectiveness over Time --
|t Security Total Cost of Ownership --
|t Philosophy of Effective Defense --
|t Mazes Versus Minefields --
|t Disrupt, Detect, Delay, Defeat --
|t Cybercastles --
|t Nested Defenses --
|t Elements of an Effective Cyberdefense --
|t Network Segmentation --
|t Strong Authentication --
|t Detection --
|t Incident Response --
|t Resiliency --
|g ch.
|
505 |
0 |
0 |
|t 9
|t Responding to Incidents --
|t Incident Response Process --
|t Incident Response Step 1 Identify the Incident --
|t Incident Response Step 2 Investigate the Incident --
|t Incident Response Step 3 Collect Evidence --
|t Incident Response Step 4 Report the Results --
|t Incident Response Step 5 Contain the Incident --
|t Incident Response Step 6 Repair Gaps or Malfunctions --
|t Incident Response Step 7 Remediate Compromised Accounts, Computers, and Networks --
|t Incident Response Step 8 Validate Remediation and Strengthen Security Controls --
|t Incident Response Step 9 Report the Conclusion of the Incident --
|t Incident Response Step 10 Resume Normal IT Operations --
|t Supporting the Incident Response Process --
|g ch. 10
|t Managing a Cybersecurity Crisis --
|t Devastating Cyberattacks and "Falling Off the Cliff" --
|t Snowballing Incident --
|t Falling Off the Cliff --
|t Reporting to Senior Enterprise Leadership --
|t Calling for Help --
|t Keeping Calm and Carrying On --
|t Playing Baseball in a Hailstorm --
|t Communications Overload --
|t Decision-Making under Stress --
|t Asks Versus Needs: Eliciting Accurate Requirements and Guidance --
|t Observe Orient Decide Act (00DA) Loop --
|t Establishing an Operational Tempo --
|t Operating in Crisis Mode --
|t Managing the Recovery Process --
|t Cyber Hand-to-Hand Combat --
|t "Throwing Money at Problems" --
|t Identifying Resources and Resource Constraints --
|t Building a Resource-Driven Project Plan --
|t Maximizing Parallelism in Execution --
|t Taking Care of People --
|t Recovering Cybersecurity and IT Capabilities --
|t Building the Bridge While You Cross It --
|t Preparing to Rebuild and Restore --
|t Closing Critical Cybersecurity Gaps --
|t Establishing Interim IT Capabilities --
|t Conducting Prioritized IT Recovery and Cybersecurity Improvements.
|
505 |
0 |
0 |
|g Note continued:
|t Establishing Full Operating Capabilities for IT and Cybersecurity --
|t Cybersecurity Versus IT Restoration --
|t Maximum Allowable Risk --
|t Ending the Crisis --
|t Resolving the Crisis --
|t Declaring the Crisis Remediated and Over --
|t After Action Review and Lessons Learned --
|t Establishing a "New Normal" Culture --
|t Being Prepared for the Future --
|g ch. 11
|t Assessing Enterprise Cybersecurity --
|t Cybersecurity Auditing Methodology --
|t Challenge of Proving Negatives --
|t Cybersecurity Audit Objectives --
|t Cybersecurity Audit Plans --
|t Audit Evidence Collection --
|t Audit Artifacts --
|t Audit Results --
|t Deficiency Tracking --
|t Reporting and Records Retention --
|t Cybersecurity Audit Types --
|t "Audit First" Design Methodology --
|t Threat Analysis --
|t Audit Controls --
|t Forensic Controls --
|t Detective Controls --
|t Preventive Controls --
|t Letting Audits Drive Control Design --
|t Enterprise Cybersecurity Assessments --
|t Level 1 Assessment: Focus on Risk Mitigations --
|t Level 2 Assessment: Focus on Functional Areas --
|t Level 3 Assessment: Focus on Security Capabilities --
|t Level 4 Assessment: Focus on Controls, Technologies, and Processes --
|t Audit Deficiency Management --
|g ch. 12
|t Measuring a Cybersecurity Program --
|t Cybersecurity Measurement --
|t Cybersecurity Program Measurement --
|t OM Step 1 Define the Question(s) to Be Answered --
|t OM Step 2 Select Appropriate Objects to Measure --
|t OM Step 3 For Each Object, Define the Object Characteristics to Measure --
|t OM Step 4 For Each Characteristic, Create a Value Scale --
|t OM Step 5 Measure Each Characteristic Using the Value Scale --
|t OM Step 6 Calculate the Overall Cybersecurity Program Assessment Index Using Object Measurement --
|t Visualizing Cybersecurity Assessment Scores --
|t Cybersecurity Measurement Summary --
|g ch. 13
|t Mapping Against Cybersecurity Frameworks --
|t Looking at Control Frameworks --
|t Clearly Defining "Controls" --
|t Mapping Against External Frameworks --
|t Assessment Audit and Security Scopes --
|t IT Systems and Security Controls --
|t Balancing Prevention with Detection and Response --
|t Security Capabilities, Technologies, and Processes --
|t Validation Audit and Reporting --
|t One Audit, Many Results --
|t Audit Report Mapping --
|t Deficiency Tracking and Management --
|g ch. 14
|t Managing an Enterprise Cybersecurity Program --
|t Enterprise Cybersecurity Program Management --
|t Cybersecurity Program Step 1 Assess Assets, Threats, and Risks --
|t Cybersecurity Program Step 2 Identify Security Scopes --
|t Cybersecurity Program Step 3 Assess Risk Mitigations, Capabilities by Functional Area, and Security Operations --
|t Cybersecurity Program Step 4 Identify Target Security Levels --
|t Cybersecurity Program Step 5 Identify Deficient Areas --
|t Cybersecurity Program Step 6 Prioritize Remediation and Improvements --
|t Cybersecurity Program Step 7 Resource and Execute Improvements --
|t Cybersecurity Program Step 8 Collect Operational Metrics --
|t Cybersecurity Program Step 9 Return to Step 1 --
|t Assessing Security Status --
|t Cybersecurity Program Step 3 Assess Risk Mitigations, Capabilities, and Security Operations --
|t Cybersecurity Program Step 4 Identify Target Security Levels --
|t Cybersecurity Program Step 5 Identify Deficient Areas --
|t Cybersecurity Program Step 6 Prioritize Remediation and Improvements --
|t Analyzing Enterprise Cybersecurity Improvements --
|t Considering Types of Improvements --
|t Considering Threat Scenarios --
|t Examining Cybersecurity Assessment Scores across Multiple Scopes --
|t Considering Improvement Opportunities across Multiple Scopes --
|t Considering "Bang for the Buck" --
|t Prioritizing Improvement Projects --
|t Immediate: Executing --
|t This Year: Preparing --
|t Next Year: Resourcing --
|t Future: Prioritizing --
|t Updating Priority Lists --
|t Tracking Cybersecurity Project Results --
|t Visualizing Cybersecurity Program Assessment Scores --
|t Measuring Cybersecurity Program Assessment Scores over Time --
|g ch.
|
505 |
0 |
0 |
|t 15
|t Looking to the Future --
|t Power of Enterprise Cybersecurity Architecture --
|t Evolution of Cyberattack and Defense --
|t Before the Internet --
|t Generation 1 Hardening the Host --
|t Generation 2 Protecting the Network --
|t Generation 3 Layered Defense and Active Response --
|t Generation 4 Automated Response --
|t Generation 5 Biological Defense --
|t Cybergenerations Moving Down Market --
|t Future Cybersecurity Evolution --
|t Evolving Enterprise Cybersecurity over Time --
|t Enterprise Cybersecurity Implementation Considerations --
|t Tailoring Cybersecurity Assessments --
|t Evolution of Enterprise Cybersecurity Capabilities --
|t Evolution of Enterprise Cybersecurity Functional Areas --
|t Final Thoughts --
|t Appendix A: Common Cyberattacks --
|g 1.
|t Phishing/Spearphishing --
|g 2.
|t Drive-By/Watering Hole/Malvertising --
|g 3.
|t Code Injection/Webshell --
|g 4.
|t Keylogging/Session Hijacking --
|g 5.
|t Pass-the-Hash and Pass-the-Ticket --
|g 6.
|t Credential Harvesting --
|g 7.
|t Gate-Crashing --
|g 8.
|t Malware/Botnet --
|g 9.
|t Distributed Denial-of-Service (DDoS) --
|g 10.
|t Identity Theft --
|g 11.
|t Industrial Espionage --
|g 12.
|t Pickpocket --
|g 13.
|t Bank Heist --
|g 14.
|t Ransomware --
|g 15.
|t Webnapping --
|g 16.
|t Hijacking --
|g 17.
|t Decapitation --
|g 18.
|t Sabotage --
|g 19.
|t Sniper/Laser/Smart Bomb --
|g 20.
|t Smokeout/Lockout --
|g 21.
|t Infestation/Whack-a-Mole --
|g 22.
|t Burndown --
|g 23.
|t Meltdown --
|g 24.
|t Defamation --
|g 25.
|t Graffiti --
|g 26.
|t Smokescreen/Diversion --
|g 27.
|t Fizzle --
|t Appendix B: Cybersecurity Frameworks --
|t (ISC)2 Common Body of Knowledge (CBK) --
|t ISO 27001/27002 Version 2013 --
|t ISO 27001/27002 Version 2005 --
|t NIST SP800-53 Revisions 3 and 4 --
|t NIST Cybersecurity Framework (2014) --
|t DHS Cyber Resilience Review (CRR) --
|t Council on CyberSecurity Critical Security Controls --
|t Australian DSD Strategies to Mitigate Targeted Cyberintrusions --
|t PCI DSS Version 3.0 --
|t HIPAA Security Rule --
|t HITRUST Common Security Framework (CSF) --
|t NERC CIP Cyber Security Version 5 --
|t NERC CIP Cyber Security Version 3 --
|t Appendix C: Enterprise Cybersecurity Capabilities --
|t Systems Administration (SA) --
|t Network Security (NS) --
|t Application Security (AS) --
|t Endpoint, Server, and Device Security (ESDS) --
|t Identity, Authentication, and Access Management (IAAM) --
|t Data Protection and Cryptography (DPC) --
|t Monitoring, Vulnerability, and Patch Management (MVPM) --
|t High Availability, Disaster Recovery, and Physical Protection (HADRPP) --
|t Incident Response (IR) --
|t Asset Management and Supply Chain (AMSC) --
|t Policy, Audit, E-Discovery, and Training (PAET) --
|t References --
|t Appendix D: Sample Cybersecurity Policy --
|t Policy --
|t Appendix E: Cybersecurity Operational Processes --
|t Supporting Information Systems --
|g 1.
|t Policies and Policy Exception Management --
|g 2.
|t Project and Change Security Reviews --
|g 3.
|t Risk Management --
|g 4.
|t Control Management --
|g 5.
|t Auditing and Deficiency Tracking --
|g 6.
|t Asset Inventory and Audit --
|g 7.
|t Change Control --
|g 8.
|t Configuration Management Database Re-certification --
|g 9.
|t Supplier Reviews and Risk Assessments --
|g 10.
|t Cyberintrusion Response --
|g 11.
|t All-Hazards Emergency Preparedness Exercises --
|g 12.
|t Vulnerability Scanning, Tracking, and Management --
|g 13.
|t Patch Management and Deployment --
|g 14.
|t Security Monitoring --
|g 15.
|t Password and Key Management --
|g 16.
|t Account and Access Periodic Re-certification --
|g 17.
|t Privileged Account Activity Audit --
|t Appendix F: Object Measurement --
|t OM Index Equation --
|t OM Steps --
|t OM Value Scales --
|t Expert Judgment OM Example --
|t Observed Data OM Example --
|t OM Measurement Map --
|t Other Cybersecurity-Related Measurements --
|t Appendix G: Cybersecurity Capability Value Scales --
|t Systems Administration (SA) --
|t Network Security (NS) --
|t Application Security (AS) --
|t Endpoint, Server, and Device Security (ESDS) --
|t Identity, Authentication, and Access Management (IAAM) --
|t Data Protection and Cryptography (DPC) --
|t Monitoring, Vulnerability, and Patch Management (MVPM) --
|t High Availability, Disaster Recovery, and Physical Protection (HADRPP) --
|t Incident Response (IR) --
|t Asset Management and Supply Chain (AMSC) --
|t Policy, Audit, E-Discovery, and Training (PAET) --
|t Appendix H: Cybersecurity Sample Assessment --
|t Sample Assessment Scope and Methodology --
|t Level 1 Assessment: Focus on Risk Mitigations --
|t Level 2 Assessment: Focus on Functional Areas --
|t Level 3 Assessment: Focus on Capabilities --
|t Appendix I: Network Segmentation --
|t Legacy Network --
|t Protecting the Security Infrastructure --
|t Watertight Compartments --
|t Systems Administration --
|t Applications --
|t Web Traffic --
|t Network Segmentation Summary.
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Data encryption.
|2 bicssc
|
650 |
|
7 |
|a Computer security.
|2 bicssc
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Internet
|x Security measures.
|2 fast
|0 (OCoLC)fst01751426
|
653 |
0 |
0 |
|a computerwetenschappen
|
653 |
0 |
0 |
|a computer sciences
|
653 |
0 |
0 |
|a gegevensbeheer
|
653 |
0 |
0 |
|a data management
|
653 |
1 |
0 |
|a Information and Communication Technology (General)
|
653 |
1 |
0 |
|a Informatie- en communicatietechnologie (algemeen)
|
700 |
1 |
|
|a Siegel, Stanley G.,
|e author.
|
700 |
1 |
|
|a Williams, Chris K.,
|e author.
|
700 |
1 |
|
|a Aslam, Abdul,
|e author.
|
776 |
0 |
8 |
|i Printed edition:
|z 9781430260820
|
830 |
|
0 |
|a Expert's voice in cybersecurity.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781430260837/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH31716213
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00090755
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 31652456
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL3566513
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr11060650
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 996857
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis31652456
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12452418
|
994 |
|
|
|a 92
|b IZTAP
|