서지주요정보
Cybersecurity program development for business : the essential planning guide / [electronic resource]
서명 / 저자 Cybersecurity program development for business : [electronic resource] : the essential planning guide / Chris Moschovitis.
발행사항 Hoboken, New Jersey : Wiley, [2018]
Online Access https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018URL

서지기타정보

서지기타정보
청구기호 HD30.2 .M674 2018eb
형태사항 1 online resource (xvi, 206 pages)
언어 English
서지주기 Includes bibliographical references and index.
내용 Intro; TITLE PAGE; TABLE OF CONTENTS; FOREWORD; PREFACE; Something Completely Different; ABOUT THE AUTHOR; ACKNOWLEDGMENTS; CHAPTER 1: Understanding Risk; How Much Is It Worth to You?; Risk! Not Just a Board Game; CHAPTER 2: Everything You Always Wanted to Know About Tech (But Were Afraid to Ask Your Kids); In the Beginning ... ; Key Definitions; Note; CHAPTER 3: A Cybersecurity Primer; Cybersecurity Defined; The Meaning of Security; Measuring Cybersecurity's Success; Deter, Identify, Protect, Detect, Respond; Cybersecurity Controls and Defense in Depth; Defense in Depth; The Threats. Threat Agents; Key Trends Influencing Threat Agents; The Nature of Hackers; Attack Process; Types of Attacks; A Brief Cyberglossary of Terms; CHAPTER 4: Management, Governance, and Alignment; Why Governance Matters; Strategy, Steering, and Standards; Critical Success Factors; CHAPTER 5: Your Cybersecurity Program: A High-Level Overview; Vision and Mission Statements; Culture and Strategy; Off to See the Wizard; What's at Risk?; Threat Assessment; At the Club House Turn!; Mitigating Risk; Incident-Response Planning; CHAPTER 6: Assets; Asset Classification; Asset Metadata. Business-Impact Analysis; One Spreadsheet to Rule Them All; CHAPTER 7: Threats; Types of Threats; Threat Rankings; Threat Intelligence; Threat Modeling; CHAPTER 8: Vulnerabilities; Who Is Who in Vulnerabilities Tracking; Zero-Day Exploits; Vulnerabilities Mapping; Vulnerability Testing; Prioritizing Vulnerability Remediation; CHAPTER 9: Environments; On-Premises (Onsite) Computing Environments; Private-Cloud Computing Environments; Public-Cloud Computing Environments; Hybrid-Cloud Computing Environments; The Internet of Things (IoT); Distributed Workforces; CHAPTER 10: Controls. Preventative Controls; Detective Controls; Corrective Controls; Compensatory Controls; Defense in Depth; People, Technology, and Operations; Communications; Policies, Standards, Procedures, and Guidelines; Regulatory Compliance: The European Example; Pulling It All Together; CHAPTER 11: Incident-Response Planning; Incident-Response Planning: Not Just a Good Idea-It's the Law!; Incident-Response Plan Phases; Preparing Your Incident-Response Plan; Identifying Incidents; Containing Incidents; Treating Incidents; Incident Recovery; Post-Incident Review; Do It All Over Again!; CHAPTER 12: People. What's in It for Me?; Attitude Adjustment!; The Right Message, Delivered the Right Way; Cybersecurity-Awareness Training; CHAPTER 13: Living Cybersecure!; General Data Protection Regulation (GDPR), Privacy, and Regulators; Artificial Intelligence and Machine Learning; Blockchain; Quantum Computing; BIBLIOGRAPHY; APPENDIX: Clear and Present Danger; INDEX; END USER LICENSE AGREEMENT.
주제 Information technology --Management.
Business enterprises --Computer programs.
Computer networks --Security measures.
Computer industry.
BUSINESS & ECONOMICS --Industries --Computer Industry. --bisacsh
BUSINESS & ECONOMICS --Industrial Management. --bisacsh
BUSINESS & ECONOMICS --Management. --bisacsh
BUSINESS & ECONOMICS --Management Science. --bisacsh
BUSINESS & ECONOMICS --Organizational Behavior. --bisacsh
Computer industry. --fast --(OCoLC)fst00872154
Computer networks --Security measures. --fast --(OCoLC)fst00872341
Information technology --Management. --fast --(OCoLC)fst00973112
LCCN 2018015364
ISBN 9781119430001q(electronic bk.) 1119430003q(electronic bk.) 9781119430018q(electronic bk.) 1119430011q(electronic bk.) 9781119430056 1119430054
QR CODE

책소개

전체보기

목차

전체보기

이 주제의 인기대출도서