Cybersecurity Program Development for Businesses : The Essential Planning Guide
Intro -- TITLE PAGE -- TABLE OF CONTENTS -- FOREWORD -- PREFACE -- Something Completely Different -- ABOUT THE AUTHOR -- ACKNOWLEDGMENTS -- CHAPTER 1: Understanding Risk -- How Much Is It Worth to You? -- Risk! Not Just a Board Game -- CHAPTER 2: Everything You Always Wanted to Know About Tech (But Were Afraid to Ask Your Kids) -- In the Beginning… -- Key Definitions -- Note -- CHAPTER 3: A Cybersecurity Primer -- Cybersecurity Defined -- The Meaning of Security -- Measuring Cybersecurity's Success -- Deter, Identify, Protect, Detect, Respond -- Cybersecurity Controls and Defense in Depth -- Defense in Depth -- The Threats -- Threat Agents -- Key Trends Influencing Threat Agents -- The Nature of Hackers -- Attack Process -- Types of Attacks -- A Brief Cyberglossary of Terms -- CHAPTER 4: Management, Governance, and Alignment -- Why Governance Matters -- Strategy, Steering, and Standards -- Critical Success Factors -- CHAPTER 5: Your Cybersecurity Program: A High‐Level Overview -- Vision and Mission Statements -- Culture and Strategy -- Off to See the Wizard -- What's at Risk? -- Threat Assessment -- At the Club House Turn! -- Mitigating Risk -- Incident‐Response Planning -- CHAPTER 6: Assets -- Asset Classification -- Asset Metadata -- Business‐Impact Analysis -- One Spreadsheet to Rule Them All -- CHAPTER 7: Threats -- Types of Threats -- Threat Rankings -- Threat Intelligence -- Threat Modeling -- CHAPTER 8: Vulnerabilities -- Who Is Who in Vulnerabilities Tracking -- Zero‐Day Exploits -- Vulnerabilities Mapping -- Vulnerability Testing -- Prioritizing Vulnerability Remediation -- CHAPTER 9: Environments -- On‐Premises (Onsite) Computing Environments -- Private‐Cloud Computing Environments -- Public‐Cloud Computing Environments -- Hybrid‐Cloud Computing Environments -- The Internet of Things (IoT) -- Distributed Workforces
Year of publication: |
2018
|
---|---|
Authors: | Moschovitis, Chris |
Publisher: |
Newark : John Wiley & Sons, Incorporated |
Subject: | Unternehmen | Computersicherheit |
Description of contents: | Table of Contents [gbv.de] ; Description [swbplus.bsz-bw.de] |
Saved in:
Online Resource
Extent: | 1 online resource (225 pages) |
---|---|
Type of publication: | Book / Working Paper |
Language: | English |
Notes: | Description based on publisher supplied metadata and other sources. |
ISBN: | 978-1-119-43000-1 ; 978-1-119-42951-7 ; 978-1-119-42951-7 |
Source: | ECONIS - Online Catalogue of the ZBW |
Persistent link: https://www.econbiz.de/10011842831
Saved in favorites
Similar items by subject
-
Risikomanagement für Informationssysteme
Theil, Michael, (1995)
-
Informationssicherheit als unternehmerische Aufgabe
Stockar, Daniel Marc von, (1995)
-
Neuber, Susanne, (2006)
- More ...