LEADER 03789nam 22006135 450 001 9910337640203321 005 20200703105323.0 010 $a3-030-02360-5 024 7 $a10.1007/978-3-030-02360-7 035 $a(CKB)4100000007598566 035 $a(DE-He213)978-3-030-02360-7 035 $a(MiAaPQ)EBC5927526 035 $a(PPN)23380188X 035 $a(EXLCZ)994100000007598566 100 $a20190124d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 14$aThe NICE Cyber Security Framework $eCyber Security Intelligence and Analytics /$fby Izzat Alsmadi 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XX, 354 p. 192 illus., 153 illus. in color.) 311 $a3-030-02359-1 320 $aIncludes bibliographical references and index. 327 $aIntroduction -- Acquisition Management -- Continuity Planning and Disaster Recovery -- Cyber Defense Analysis and Support -- Cyber Intelligence -- Cyber Intelligence Analysis -- Cyber Operational Planning -- Cyber Policy and Strategy Management -- Cyber Threat Analysis -- Cybersecurity Management -- Forensics Analysis -- Identity Management -- Incident Response. 330 $aThis textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) KSAs work roles and framework, that adopt the Competency-Based Education (CBE) method. The book follows the CBT (KSA) general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for Skills and Abilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into seven parts: Securely Provision; Operate and Maintain; Oversee and Govern; Protect and Defend; Analysis; Operate and Collect; Investigate. All classroom materials (in the book an ancillary) adhere to the NICE framework. Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE) Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training Includes content and ancillaries that provide skill-based instruction on compliance laws, information security standards, risk response and recovery, and more. 606 $aElectrical engineering 606 $aComputer security 606 $aSystem safety 606 $aComputers 606 $aCommunications Engineering, Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/T24035 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aSecurity Science and Technology$3https://scigraph.springernature.com/ontologies/product-market-codes/P31080 606 $aInformation Systems and Communication Service$3https://scigraph.springernature.com/ontologies/product-market-codes/I18008 615 0$aElectrical engineering. 615 0$aComputer security. 615 0$aSystem safety. 615 0$aComputers. 615 14$aCommunications Engineering, Networks. 615 24$aSystems and Data Security. 615 24$aSecurity Science and Technology. 615 24$aInformation Systems and Communication Service. 676 $a005.8 676 $a005.8 700 $aAlsmadi$b Izzat$4aut$4http://id.loc.gov/vocabulary/relators/aut$0875246 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910337640203321 996 $aThe NICE Cyber Security Framework$91954033 997 $aUNINA