The information systems security officer's guide : establishing and managing a cyber security program /
The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face. This entirely updated edition presents practical advice on estab...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Waltham, MA :
Butterworth-Heinemann,
2016.
|
Edición: | Third edition. |
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Front Cover; The Information Systems Security Officer's Guide; Copyright; Dedication; Contents; ABOUT THE AUTHOR; OTHER BOOKS AUTHORED OR COAUTHORED BY DR. GERALD L. KOVACICH; Preface; Acknowledgments; INTRODUCTION; WHAT OTHER CYBER SECURITY PROFESSIONALS HAVE TO SAY; William C. Boni; Ed Halibozek; Dr. Andy Jones; Steve Lutz; I
- The Working Environment of the Cyber Security Officer; 1
- Understanding the Past and Present Cyber-Information World Environment; AH, THE GOOD OL' DAYS!; Understanding Your Information-Driven Environment; GLOBAL INFORMATION INFRASTRUCTURE.
- NATIONAL INFORMATION INFRASTRUCTURE"Future Shock"; Road Map for the Internet; The Internet: No Traffic Controls; What Has Been the Impact of the Internet?; Organizational Impacts; Using the Internet to Share Information; CHANGING CRIMINAL JUSTICE SYSTEMS; THE HUMAN FACTOR; Laws, Regulations, Standards, and Legal Issues; SUMMARY; 2
- Understanding the Past and Present Global Business and Management Environment; THE CHANGING BUSINESS AND GOVERNMENT ENVIRONMENTS; UNDERSTANDING THE BUSINESS ENVIRONMENT; MANAGEMENT RESPONSIBILITIES AND COMMUNICATING WITH MANAGEMENT.
- CREATING A COMPETITIVE ADVANTAGE THROUGH A CYBER SECURITY PROGRAMThe Cyber Security Officer as a Business Manager; SERVICE, SUPPORT, AND A BUSINESS ORIENTATION; BUSINESS MANAGERS AND CYBER SECURITY; WHAT COMPANY MANAGERS SHOULD ASK OF THEIR CYBER SECURITY PROFESSIONALS; WHAT CYBER SECURITY PROFESSIONALS SHOULD DO; QUESTIONS TO CONSIDER; SUMMARY; 3
- An Overview of Related World Views of Cyber Security; EVOLUTION OF LAWS, STANDARDS, POLICIES, AND PROCEDURES; GLOBAL VIA THE UN; THE EU; International Security in Cyberspace; Internet Governance Developments in 2015.
- U.S.-EU Cyber Security-Related CooperationASIA; SOUTH AMERICA; AFRICA; UNITED STATES; CNCI Initiative Details; SUMMARY; 4
- A Glimpse at the History of Technology; WHAT IS TECHNOLOGY?; FROM CAVE MAN TO CYBER SECURITY PROFESSIONAL AND INFORMATION WARRIOR; REVOLUTIONS AND EVOLUTIONS IN HIGH TECHNOLOGY; FROM THE TWENTIETH CENTURY TO TODAY: TECHNOLOGY AND THE ADVENT/ F HIGH TECHNOLOGY; Other Significant Twentieth-Century Technological Developments and Events; High-Tech: A Product, a Process, or Both?; The Trade Association: AEA; The Consulting Group: RFA; Information Provider: One Source.
- The Research Group: BLSThe Microprocessor; Moore's Law; Other Significant Twentieth Century High-Technology/ evelopments and Events; THE INTERNET; THE HIGH-TECHNOLOGY-DRIVEN PHENOMENON; FASTER AND MORE MASSIVE HIGH-TECHNOLOGY-DRIVEN COMMUNICATIONS; THE BENEFICIAL EFFECT OF HACKER TOOLS AND OTHER MALICIOUS SOFTWARE ON/ ETWORK SECURITY WITH DUAL ROLES AS CYBER SECURITY TOOLS; OTHER HIGH-TECHNOLOGY TOOLS IN CYBER SECURITY; WELCOME TO THE TWENTY-FIRST-CENTURY TECHNOLOGY; SUMMARY; 5
- Understanding Today's Threats in the Cyber Vapor-"War Stories" from the Front Lines1.