Cargando…

Cybersecurity and privacy law handbook a beginner's guide to dealing with privacy and security while keeping hackers at bay /

Get to grips with cybersecurity and privacy laws to protect your company's data and comply with international privacy standards Key Features Comply with cybersecurity standards and protect your data from hackers Find the gaps in your company's security posture with gap analysis and busines...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Rocchi, Walter (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2022.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007a 4500
001 OR_on1353939154
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 221210s2022 enka o 000 0 eng d
040 |a YDX  |b eng  |c YDX  |d ORMDA  |d EBLCP  |d DEBBG  |d N$T  |d OCLCF  |d IEEEE 
019 |a 1354208071 
020 |a 9781803243719  |q (electronic bk.) 
020 |a 1803243716  |q (electronic bk.) 
020 |z 1803242418 
020 |z 9781803242415 
029 1 |a AU@  |b 000073289759 
035 |a (OCoLC)1353939154  |z (OCoLC)1354208071 
037 |a 9781803242415  |b O'Reilly Media 
037 |a 10162226  |b IEEE 
050 4 |a K564.C6 
082 0 4 |a 343.0999  |2 23/eng/20230106 
049 |a UAMI 
100 1 |a Rocchi, Walter,  |e author. 
245 1 0 |a Cybersecurity and privacy law handbook  |h [electronic resource] :  |b a beginner's guide to dealing with privacy and security while keeping hackers at bay /  |c Walter Rocchi. 
260 |a Birmingham :  |b Packt Publishing,  |c 2022. 
300 |a 1 online resource :  |b color illustrations 
520 |a Get to grips with cybersecurity and privacy laws to protect your company's data and comply with international privacy standards Key Features Comply with cybersecurity standards and protect your data from hackers Find the gaps in your company's security posture with gap analysis and business impact analysis Understand what you need to do with security and privacy without needing to pay consultants Book Description Cybercriminals are incessantly coming up with new ways to compromise online systems and wreak havoc, creating an ever-growing need for cybersecurity practitioners in every organization across the globe who understand international security standards, such as the ISO27k family of standards. If you're looking to ensure that your company's data conforms to these standards, Cybersecurity and Privacy Law Handbook has got you covered. It'll not only equip you with the rudiments of cybersecurity but also guide you through privacy laws and explain how you can ensure compliance to protect yourself from cybercrime and avoid the hefty fines imposed for non-compliance with standards. Assuming that you're new to the field, this book starts by introducing cybersecurity frameworks and concepts used throughout the chapters. You'll understand why privacy is paramount and how to find the security gaps in your company's systems. There's a practical element to the book as well--you'll prepare policies and procedures to prevent your company from being breached. You'll complete your learning journey by exploring cloud security and the complex nature of privacy laws in the US. By the end of this cybersecurity book, you'll be well-placed to protect your company's data and comply with the relevant standards. What you will learn Strengthen the cybersecurity posture throughout your organization Use both ISO27001 and NIST to make a better security framework Understand privacy laws such as GDPR, PCI CSS, HIPAA, and FTC Discover how to implement training to raise cybersecurity awareness Find out how to comply with cloud privacy regulations Examine the complex privacy laws in the US Who this book is for If you're a seasoned pro with IT security and / or cybersecurity, this book isn't for you. This book is aimed at novices, freshers, students, experts in other fields, and managers, that, are willing to learn, understand, and manage how a security function is working, especially if you need to be. Although the reader will be able, by reading this book, to build and manage a security function on their own, it is highly recommended to supervise a team devoted to implementing cybersecurity and privacy practices in an organization. 
505 0 |a Cover -- Title Page -- Copyright and Credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Start From the Basics -- Chapter 1: ISO27001 -- Definitions and Security Concepts -- The 27k family of standards -- Confidentiality, integrity, and availability -- Information security concepts and definitions -- Governance, policies, and incident management -- Governance -- Policies and procedures -- Incident management -- Differences between ISO 27001 and NIST -- What's NIST? -- Summary -- Part 2: Into the Wild -- Chapter 2: Mandatory Requirements 
505 8 |a ISMS, controls, commitment, context, scope policy, and objectives -- iSMS -- Statement of applicability, risk treatment plan, and action plan -- Controls -- Commitment and project management -- Identify, Protect, Detect, Respond, and Recover -- Identify -- Protect -- Detect -- Respond -- Recover -- Can ISO 27001 and NIST coexist? -- Summary -- Chapter 3: Data Protection -- What is privacy (and why do we desperately need it)? -- GDPR and his brothers -- Territorial scope -- The GDPR, CCPA, and LGPD each define personal data differently 
505 8 |a The importance of anonymous, pseudonymous, de-identified, and aggregated information -- Legal bases for data processing -- Data access privileges -- Fines and penalties -- Why deal with data protection? -- The six principles of the GDPR -- Summary -- Chapter 4: Data Processing -- The data controller -- The data processor -- Accountability -- Recommended documents -- The privacy dashboard -- Training materials -- Mandatory documents -- Data protection -- the last warning -- EU-US Privacy Shield -- Brief summary -- Schrems II ruling -- The frequently asked questions issued by the EDPB 
505 8 |a What occurs next? Vade mecum for entities -- Conclusions -- Summary -- Chapter 5: Security Planning and Risk Management -- Security threats and challenges -- What are the different types of security threats? -- What is risk and what is a threat? -- Implementing a risk management program -- Why is risk management so important? -- Traditional risk management versus enterprise risk management -- What are the steps involved in risk management for information security? -- From the top-down to the bottom-up -- Benefits and challenges of risk management 
505 8 |a Building and implementing a risk management plan -- Qualitative risk analysis -- Quantitative risk analysis -- Difference between qualitative and quantitative risk analysis -- When to perform a qualitative and quantitative risk analysis -- Summary -- Part 3: Escape from Chaos -- Chapter 6: Define ISO 27001 Mandatory Requirements -- ISO 27001 operations -- The ISO 27001 standard -- what it is and what requirements it establishes -- How to structure an iSMS -- ISO 27001 support requirements (or Clause 7) -- 7.1 -- Resources required to establish and operate an iSMS -- 7.2 -- Competency 
505 8 |a 7.3 -- Awareness 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security  |x Law and legislation. 
650 0 |a Privacy, Right of. 
650 7 |a Computer security  |x Law and legislation.  |2 fast  |0 (OCoLC)fst00872492 
650 7 |a Privacy, Right of.  |2 fast  |0 (OCoLC)fst01077444 
776 0 8 |i Print version:  |z 1803242418  |z 9781803242415  |w (OCoLC)1346950018 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781803242415/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a YBP Library Services  |b YANK  |n 303343231 
938 |a YBP Library Services  |b YANK  |n 303343231 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL30285001 
938 |a EBSCOhost  |b EBSC  |n 3486707 
994 |a 92  |b IZTAP