Cargando…

The information systems security officer's guide : establishing and managing a cyber security program /

The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face. This entirely updated edition presents practical advice on estab...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Kovacich, Gerald L. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Butterworth-Heinemann, 2016.
Edición:Third edition.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Front Cover; The Information Systems Security Officer's Guide; Copyright; Dedication; Contents; ABOUT THE AUTHOR; OTHER BOOKS AUTHORED OR COAUTHORED BY DR. GERALD L. KOVACICH; Preface; Acknowledgments; INTRODUCTION; WHAT OTHER CYBER SECURITY PROFESSIONALS HAVE TO SAY; William C. Boni; Ed Halibozek; Dr. Andy Jones; Steve Lutz; I
  • The Working Environment of the Cyber Security Officer; 1
  • Understanding the Past and Present Cyber-Information World Environment; AH, THE GOOD OL' DAYS!; Understanding Your Information-Driven Environment; GLOBAL INFORMATION INFRASTRUCTURE.
  • NATIONAL INFORMATION INFRASTRUCTURE"Future Shock"; Road Map for the Internet; The Internet: No Traffic Controls; What Has Been the Impact of the Internet?; Organizational Impacts; Using the Internet to Share Information; CHANGING CRIMINAL JUSTICE SYSTEMS; THE HUMAN FACTOR; Laws, Regulations, Standards, and Legal Issues; SUMMARY; 2
  • Understanding the Past and Present Global Business and Management Environment; THE CHANGING BUSINESS AND GOVERNMENT ENVIRONMENTS; UNDERSTANDING THE BUSINESS ENVIRONMENT; MANAGEMENT RESPONSIBILITIES AND COMMUNICATING WITH MANAGEMENT.
  • CREATING A COMPETITIVE ADVANTAGE THROUGH A CYBER SECURITY PROGRAMThe Cyber Security Officer as a Business Manager; SERVICE, SUPPORT, AND A BUSINESS ORIENTATION; BUSINESS MANAGERS AND CYBER SECURITY; WHAT COMPANY MANAGERS SHOULD ASK OF THEIR CYBER SECURITY PROFESSIONALS; WHAT CYBER SECURITY PROFESSIONALS SHOULD DO; QUESTIONS TO CONSIDER; SUMMARY; 3
  • An Overview of Related World Views of Cyber Security; EVOLUTION OF LAWS, STANDARDS, POLICIES, AND PROCEDURES; GLOBAL VIA THE UN; THE EU; International Security in Cyberspace; Internet Governance Developments in 2015.
  • U.S.-EU Cyber Security-Related CooperationASIA; SOUTH AMERICA; AFRICA; UNITED STATES; CNCI Initiative Details; SUMMARY; 4
  • A Glimpse at the History of Technology; WHAT IS TECHNOLOGY?; FROM CAVE MAN TO CYBER SECURITY PROFESSIONAL AND INFORMATION WARRIOR; REVOLUTIONS AND EVOLUTIONS IN HIGH TECHNOLOGY; FROM THE TWENTIETH CENTURY TO TODAY: TECHNOLOGY AND THE ADVENT/ F HIGH TECHNOLOGY; Other Significant Twentieth-Century Technological Developments and Events; High-Tech: A Product, a Process, or Both?; The Trade Association: AEA; The Consulting Group: RFA; Information Provider: One Source.
  • The Research Group: BLSThe Microprocessor; Moore's Law; Other Significant Twentieth Century High-Technology/ evelopments and Events; THE INTERNET; THE HIGH-TECHNOLOGY-DRIVEN PHENOMENON; FASTER AND MORE MASSIVE HIGH-TECHNOLOGY-DRIVEN COMMUNICATIONS; THE BENEFICIAL EFFECT OF HACKER TOOLS AND OTHER MALICIOUS SOFTWARE ON/ ETWORK SECURITY WITH DUAL ROLES AS CYBER SECURITY TOOLS; OTHER HIGH-TECHNOLOGY TOOLS IN CYBER SECURITY; WELCOME TO THE TWENTY-FIRST-CENTURY TECHNOLOGY; SUMMARY; 5
  • Understanding Today's Threats in the Cyber Vapor-"War Stories" from the Front Lines1.