Cargando…

Enterprise cybersecurity study guide : how to build a successful cyberdefense program against advanced threats /

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Donaldson, Scott E. (Autor), Siegel, Stanley G. (Autor), Williams, Chris K. (Autor), Aslam, Abdul (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Apress, [2018]
Colección:Expert's voice in cybersecurity.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Part I: The Cybersecurity Challenge
  • Chapter 1: Defining the Cybersecurity Challenge
  • Chapter 2: Meeting the Cybersecurity Challenge
  • Part II: A New Enterprise Cybersecurity Architecture
  • Chapter 3: Enterprise Cybersecurity Architecture
  • Chapter 4: Implementing Enterprise Cybersecurity
  • Chapter 5: Operating Enterprise Cybersecurity
  • Chapter 6: Enterprise Cybersecurity and the Cloud
  • Chapter 7: Enterprise Cybersecurity for Mobile and BYOD
  • Part III: The Art of Cyber Defense
  • Chapter 8: Building an Effective Defense
  • Chapter 9: Responding to Incidents
  • Chapter 10: Managing a Cybersecurity Crisis
  • Part IV: Enterprise Cyber Defense Assessment
  • Chapter 11: Assessing Enterprise Cybersecurity
  • Chapter 12: Measuring a Cybersecurity Program
  • Chapter 13: Mapping Against Cybersecurity Frameworks
  • Part V: Enterprise Cybersecurity Program
  • Chapter 14: Managing an Enterprise Cybersecurity Program
  • Chapter 15: Looking to the Future
  • Part VI: Appendices
  • Appendix A: Sample Cybersecurity Policy
  • Appendix B: Cybersecurity Operational Processes
  • Appendix C: Object Measurement
  • Appendix D: Cybersecurity Sample Assessment
  • Appendix E: Cybersecurity Capability Value Scales.