Cyberwar, cyberterror, cybercrime and cyberactivism : an in-depth guide to the role of standards in cybersecurity environment /
This book encourages cybersecurity professionals to take a wider view of what cybersecurity means, and to make the most of international standards and best practice to create a culture of cybersecurity awareness that complements technology-based defenses. This second edition analyzes the changing th...
Saved in:
Main Author: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Ely, Cambridge, UK :
IT Governance Pub.,
2014.
|
Edition: | 2nd ed. |
Subjects: | |
Online Access: |
Full text (Wentworth users only) |
Local Note: | ProQuest Ebook Central |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | in00000232105 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 140820s2014 enka ob 001 0 eng d | ||
005 | 20240806152436.1 | ||
019 | |a 890529932 |a 907519119 | ||
020 | |a 9781849285728 |q (electronic bk.) | ||
020 | |a 1849285721 |q (electronic bk.) | ||
020 | |z 1849285713 | ||
020 | |z 9781849285711 | ||
035 | |a (OCoLC)888035950 |z (OCoLC)890529932 |z (OCoLC)907519119 | ||
035 | |a (OCoLC)ocn888035950 | ||
037 | |a CL0500000466 |b Safari Books Online | ||
037 | |a 22573/ctt7z4f4c |b JSTOR | ||
037 | |a F64A6000-ECF8-4944-9F65-EF5E8314D43F |b OverDrive, Inc. |n http://www.overdrive.com | ||
040 | |a UMI |b eng |e pn |c UMI |d CAUOI |d B24X7 |d DEBBG |d DEBSZ |d JSTOR |d COO |d YDXCP |d N$T |d OCLCF |d EBLCP |d IDEBK |d OCLCQ |d TEFOD |d OCLCQ |d AGLDB |d CUS |d CUI |d JBG |d MERUC |d OCLCQ |d IOG |d OCLCA |d VTS |d CEF |d WAU |d OCLCQ |d LVT |d STF |d M8D |d OCLCQ |d AJS |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
050 | 4 | |a HV6773 | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.802/18 |2 22 |
100 | 1 | |a Mehan, Julie E., |e author. | |
245 | 1 | 0 | |a Cyberwar, cyberterror, cybercrime and cyberactivism : |b an in-depth guide to the role of standards in cybersecurity environment / |c Julie E. Mehan. |
250 | |a 2nd ed. | ||
260 | |a Ely, Cambridge, UK : |b IT Governance Pub., |c 2014. | ||
300 | |a 1 online resource (348 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Cover; Title; Copyright; Preface; About the Author; Contents; Introduction; Chapter 1: Technology Is a Double-Edged Sword; From the printing press to the information age; The ''dark side of high tech''; Chapter 2: Cyber Attack: It''s A Dangerous World for Information Systems; Cyberwar; Cyberterror; Cybercrime; CyberEspionage (and Information Exfiltration) -- It''s midnight; do you know where your data is?; Social Media -- an opportunity and a challenge; Supply Chain (In- ) security; The blended threat; The asymmetric effects of cyber attacks; Porous perimeters, compromisable software -- or both? | |
505 | 8 | |a If we know about the vulnerabilities, why are exploits still successful?Chapter 3: The Human Factor: The Underrated Threat; Are people the problem?; Who are the attackers?; Most likely forms of attack; Sometimes it''s just human error; People can also be the solution!; Chapter 4: Transition from an Environment of ''FUD'' to a Standards-Based Environment; Chapter 5: Establishing a Culture of Cybersecurity; Chapter 6: Increasing Internationalism: Governance, Laws, and Ethics; Information globalism equals increased exposure; Following the lead of good governance; The proliferation of laws. | |
505 | 8 | |a Ethics in an information society and a minimum standard of due care in cybersecurityCybersecurity and privacy; Chapter 7: Standards: What Are They and Why Should We Care?; What are standards?; How and by whom are standards developed?; The importance of terminology; Standards-based process improvement; Focus on consensus-based cybersecurity; Standards provide a level playing-field for co-ordination and co-operation; If standards are so good, then why is it so hard?; Chapter 8: From Reaction to Proaction: Applying Standards in an Environment of Change and Danger. | |
505 | 8 | |a Moving beyond compliance and reactionA quick look at relevant standards; Take four steps forward; The future is ''ROSI''; Making the case for cybersecurity assurance; Chapter 9: Conclusion: Where Do We Go From Here?; Cybersecurity program roadmap; Appendix 1: Gap Analysis Areas of Interest; Appendix 2: Standards Crosswalk; Definitions; Acronyms; Index; A; B; C; D; E; F; G; H; I; J; K; L; M; N; O; P; Q; R; S; T; U; V; W; X; Y; ITG Resources. | |
520 | |a This book encourages cybersecurity professionals to take a wider view of what cybersecurity means, and to make the most of international standards and best practice to create a culture of cybersecurity awareness that complements technology-based defenses. This second edition analyzes the changing threats in the cyber landscape, and includes an updated body of knowledge that describes how to acquire, develop, and sustain a secure information environment that goes beyond technology and how to create a cyber-aware organizational culture that is more robust and better able to deal with a wider range of threats. -- |c Edited summary from book. | ||
588 | 0 | |a Online resource; title from title page (Safari, viewed August 7, 2014). | |
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Hacking. | |
650 | 0 | |a Electronics in military engineering. | |
650 | 2 | |a Computer Security | |
758 | |i has work: |a Cyberwar, cyberterror, cybercrime and cyberactivism (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGmQ9PVJDJBT43bBTprYrq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Mehan, Julie. |t Cyberwar, Cyberterror, Cybercrime & Cyberactivism (2nd Edition) : An in-depth guide to the role of standards in the cybersecurity environment. |d Ely : IT Governance Ltd, ©2014 |
852 | |b Ebooks |h ProQuest | ||
856 | 4 | 0 | |u https://ebookcentral.proquest.com/lib/wit/detail.action?docID=1778762 |z Full text (Wentworth users only) |t 0 |
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis28005361 | ||
947 | |a FLO |x pq-ebc-base | ||
999 | f | f | |s 247c7f7d-bb9c-420f-8537-1ef50346dace |i 3ece5e2c-1b1a-4727-83fe-b3b9f2654676 |t 0 |
952 | f | f | |a Wentworth Institute of Technology |b Main Campus |c Wentworth Library |d Ebooks |t 0 |e ProQuest |h Other scheme |
856 | 4 | 0 | |t 0 |u https://ebookcentral.proquest.com/lib/wit/detail.action?docID=1778762 |y Full text (Wentworth users only) |