Cyberwar, cyberterror, cybercrime and cyberactivism : an in-depth guide to the role of standards in cybersecurity environment /

This book encourages cybersecurity professionals to take a wider view of what cybersecurity means, and to make the most of international standards and best practice to create a culture of cybersecurity awareness that complements technology-based defenses. This second edition analyzes the changing th...

Full description

Saved in:
Bibliographic Details
Main Author: Mehan, Julie E. (Author)
Format: Electronic eBook
Language:English
Published: Ely, Cambridge, UK : IT Governance Pub., 2014.
Edition:2nd ed.
Subjects:
Online Access: Full text (Wentworth users only)
Local Note:ProQuest Ebook Central

MARC

LEADER 00000cam a2200000 a 4500
001 in00000232105
006 m o d
007 cr unu||||||||
008 140820s2014 enka ob 001 0 eng d
005 20240806152436.1
019 |a 890529932  |a 907519119 
020 |a 9781849285728  |q (electronic bk.) 
020 |a 1849285721  |q (electronic bk.) 
020 |z 1849285713 
020 |z 9781849285711 
035 |a (OCoLC)888035950  |z (OCoLC)890529932  |z (OCoLC)907519119 
035 |a (OCoLC)ocn888035950 
037 |a CL0500000466  |b Safari Books Online 
037 |a 22573/ctt7z4f4c  |b JSTOR 
037 |a F64A6000-ECF8-4944-9F65-EF5E8314D43F  |b OverDrive, Inc.  |n http://www.overdrive.com 
040 |a UMI  |b eng  |e pn  |c UMI  |d CAUOI  |d B24X7  |d DEBBG  |d DEBSZ  |d JSTOR  |d COO  |d YDXCP  |d N$T  |d OCLCF  |d EBLCP  |d IDEBK  |d OCLCQ  |d TEFOD  |d OCLCQ  |d AGLDB  |d CUS  |d CUI  |d JBG  |d MERUC  |d OCLCQ  |d IOG  |d OCLCA  |d VTS  |d CEF  |d WAU  |d OCLCQ  |d LVT  |d STF  |d M8D  |d OCLCQ  |d AJS  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
050 4 |a HV6773 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.802/18  |2 22 
100 1 |a Mehan, Julie E.,  |e author. 
245 1 0 |a Cyberwar, cyberterror, cybercrime and cyberactivism :  |b an in-depth guide to the role of standards in cybersecurity environment /  |c Julie E. Mehan. 
250 |a 2nd ed. 
260 |a Ely, Cambridge, UK :  |b IT Governance Pub.,  |c 2014. 
300 |a 1 online resource (348 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a Cover; Title; Copyright; Preface; About the Author; Contents; Introduction; Chapter 1: Technology Is a Double-Edged Sword; From the printing press to the information age; The ''dark side of high tech''; Chapter 2: Cyber Attack: It''s A Dangerous World for Information Systems; Cyberwar; Cyberterror; Cybercrime; CyberEspionage (and Information Exfiltration) -- It''s midnight; do you know where your data is?; Social Media -- an opportunity and a challenge; Supply Chain (In- ) security; The blended threat; The asymmetric effects of cyber attacks; Porous perimeters, compromisable software -- or both? 
505 8 |a If we know about the vulnerabilities, why are exploits still successful?Chapter 3: The Human Factor: The Underrated Threat; Are people the problem?; Who are the attackers?; Most likely forms of attack; Sometimes it''s just human error; People can also be the solution!; Chapter 4: Transition from an Environment of ''FUD'' to a Standards-Based Environment; Chapter 5: Establishing a Culture of Cybersecurity; Chapter 6: Increasing Internationalism: Governance, Laws, and Ethics; Information globalism equals increased exposure; Following the lead of good governance; The proliferation of laws. 
505 8 |a Ethics in an information society and a minimum standard of due care in cybersecurityCybersecurity and privacy; Chapter 7: Standards: What Are They and Why Should We Care?; What are standards?; How and by whom are standards developed?; The importance of terminology; Standards-based process improvement; Focus on consensus-based cybersecurity; Standards provide a level playing-field for co-ordination and co-operation; If standards are so good, then why is it so hard?; Chapter 8: From Reaction to Proaction: Applying Standards in an Environment of Change and Danger. 
505 8 |a Moving beyond compliance and reactionA quick look at relevant standards; Take four steps forward; The future is ''ROSI''; Making the case for cybersecurity assurance; Chapter 9: Conclusion: Where Do We Go From Here?; Cybersecurity program roadmap; Appendix 1: Gap Analysis Areas of Interest; Appendix 2: Standards Crosswalk; Definitions; Acronyms; Index; A; B; C; D; E; F; G; H; I; J; K; L; M; N; O; P; Q; R; S; T; U; V; W; X; Y; ITG Resources. 
520 |a This book encourages cybersecurity professionals to take a wider view of what cybersecurity means, and to make the most of international standards and best practice to create a culture of cybersecurity awareness that complements technology-based defenses. This second edition analyzes the changing threats in the cyber landscape, and includes an updated body of knowledge that describes how to acquire, develop, and sustain a secure information environment that goes beyond technology and how to create a cyber-aware organizational culture that is more robust and better able to deal with a wider range of threats. --  |c Edited summary from book. 
588 0 |a Online resource; title from title page (Safari, viewed August 7, 2014). 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer security. 
650 0 |a Hacking. 
650 0 |a Electronics in military engineering. 
650 2 |a Computer Security 
758 |i has work:  |a Cyberwar, cyberterror, cybercrime and cyberactivism (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGmQ9PVJDJBT43bBTprYrq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Mehan, Julie.  |t Cyberwar, Cyberterror, Cybercrime & Cyberactivism (2nd Edition) : An in-depth guide to the role of standards in the cybersecurity environment.  |d Ely : IT Governance Ltd, ©2014 
852 |b Ebooks  |h ProQuest 
856 4 0 |u https://ebookcentral.proquest.com/lib/wit/detail.action?docID=1778762  |z Full text (Wentworth users only)  |t 0 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis28005361 
947 |a FLO  |x pq-ebc-base 
999 f f |s 247c7f7d-bb9c-420f-8537-1ef50346dace  |i 3ece5e2c-1b1a-4727-83fe-b3b9f2654676  |t 0 
952 f f |a Wentworth Institute of Technology  |b Main Campus  |c Wentworth Library  |d Ebooks  |t 0  |e ProQuest  |h Other scheme 
856 4 0 |t 0  |u https://ebookcentral.proquest.com/lib/wit/detail.action?docID=1778762  |y Full text (Wentworth users only)