|
|
|
|
LEADER |
00000cam a22000007i 4500 |
001 |
OR_on1377287780 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
230425s2023 enka o 001 0 eng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d EBLCP
|d OCLCF
|d OCLCQ
|d IEEEE
|
019 |
|
|
|a 1373983696
|
020 |
|
|
|a 9781803234144
|
020 |
|
|
|a 1803234148
|
020 |
|
|
|z 9781803246512
|
035 |
|
|
|a (OCoLC)1377287780
|z (OCoLC)1373983696
|
037 |
|
|
|a 9781803246512
|b O'Reilly Media
|
037 |
|
|
|a 10251135
|b IEEE
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23/eng/20230425
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Kumar, Ashish
|c (Data scientist),
|e author.
|
245 |
1 |
0 |
|a Managing risks in digital transformation :
|b navigate the modern landscape of digital threats with the help of real-world examples and use cases /
|c Ashish Kumar, Shashank Kumar, Abbas Kudrati ; foreword by Sarah Armstrong- Smith.
|
250 |
|
|
|a 1st edition.
|
264 |
|
1 |
|a Birmingham, UK :
|b Packt Publishing Ltd.,
|c 2023.
|
300 |
|
|
|a 1 online resource (242 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Includes index.
|
520 |
|
|
|a With the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual operations carried out by unaware or targeted workers can lead your organization to a regulatory or business risk, which can impact your organization's reputation and balance sheet. This book is your guide to identifying the topmost risks relevant to your business with a clear roadmap of when to start the risk mitigation process and what your next steps should be. With a focus on the new and emerging risks that remote-working companies are experiencing across diverse industries, you'll learn how to manage risks by taking advantage of zero trust network architecture and the steps to be taken when smart devices are compromised. Toward the end, you'll explore various types of AI-powered machines and be ready to make your business future-proof. In a nutshell, this book will direct you on how to identify and mitigate risks that the ever- advancing digital technology has unleashed.
|
505 |
0 |
|
|a Cover -- Title Page -- Copyright and Credit -- Dedicated -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Invisible Digitization Tsunami -- Chapter 1: Invisible Digitization Tsunami -- Digital transformation -- An invisible hand -- Summary -- Chapter 2: Going Digital -- Hello Alexa, Siri, Google, Cortana, and more -- The role of digital calendars -- Digital and physical socialization -- Cameras everywhere -- Digital wearables -- oh, my heart -- Advanced features in wearables -- What is real? -- Summary -- Chapter 3: Visible and Invisible Risks -- Risks in digital life
|
505 |
8 |
|
|a Visible risks -- Invisible risks -- When does risk become visible? -- Hit by password phishing -- Use of your credit cards -- Ransomware -- Invading privacy and extortion/phone spying -- Summary -- Chapter 4: Remote Working and the Element of Trust -- Remote working -- not new for everyone -- Pandemic and remote working -- View of remote working for various industries -- Risks to organizations -- Summary -- Chapter 5: The Emergence of Zero Trust and Risk Equation -- Zero Trust in real life -- Zero Trust is a new digital transformation -- Lesson learned from a global pandemic
|
505 |
8 |
|
|a Modern principles of Zero Trust -- The NIST approach to Zero Trust architecture -- The Sunburst attack example -- Zero Trust across the digital estate -- Example of controlling access with intelligent policies and continuous risk assessment -- Zero Trust makes compliance easier -- Isolation -- Monitoring and visibility -- Summary -- Part 2: Risk Redefined at Work -- Chapter 6: The Human Risk at the Workplace -- Innocent intent -- Start of day -- During the day -- Wrapping up -- A quick relook at the risks -- Good worker -- Start of the day -- During the day -- Wrapping up -- Self-obsessed
|
505 |
8 |
|
|a Rebel intent -- Malicious intent -- Summary -- Chapter 7: Modern Collaboration and Risk Amplification -- Evolving to the new workspace, where the flow of information is versatile -- Versatile collaboration -- some questions -- Challenges of a hybrid setup -- Future devices and their risk profile -- Polarization of opinions and its possible impact on modern collaboration -- Summary -- Chapter 8: Insider Risk and Impact -- Case study -- insider risk at Roposo Ltd -- Context -- Actor and the plot -- The crime -- The aftermath -- The lessons -- Understanding the impact of insider risk
|
505 |
8 |
|
|a Primary costs of insider risk -- A summarized view of the impact of insider risk -- Summary -- Chapter 9: Real Examples and Scenarios -- Insider risk -- definition and threat vectors -- Insider risk -- behaviors and technical trends to look out for -- Behavioral indicators -- Technical indicators -- Using the MITRE ATT&CK framework to detect insider threat and behavior -- Case study 1 -- exploits in the life sciences sector -- Solution and outcome -- Case study 2 -- a victim of a phishing attack -- Solution and outcome -- Case study 3 -- working from home -- Solution and outcome
|
505 |
8 |
|
|a Case study 4 -- AT&T
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
700 |
1 |
|
|a Kumar, Shashank,
|e author.
|
700 |
1 |
|
|a Kudrati, Abbas,
|e author.
|
700 |
1 |
|
|a Smith, Sarah Armstrong-
|e writer of foreword.
|
776 |
0 |
8 |
|i Print version:
|a Kumar, Ashish
|t Managing Risks in Digital Transformation
|d Birmingham : Packt Publishing, Limited,c2023
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781803246512/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL30448971
|
994 |
|
|
|a 92
|b IZTAP
|