LEADER 05967nam 2200817 a 450 001 9910825352603321 005 20230912155313.0 010 $a9781299189324 010 $a1299189326 010 $a9781118241325 010 $a1118241320 010 $a9781118241530 010 $a1118241533 010 $a9781118241486 010 $a1118241487 035 $a(CKB)2670000000166885 035 $a(EBL)818205 035 $a(SSID)ssj0000633925 035 $a(PQKBManifestationID)11386595 035 $a(PQKBTitleCode)TC0000633925 035 $a(PQKBWorkID)10623475 035 $a(PQKB)11069962 035 $a(Au-PeEL)EBL818205 035 $a(CaPaEBR)ebr10630610 035 $a(CaONFJC)MIL450182 035 $a(CaSebORM)9781118241325 035 $a(MiAaPQ)EBC818205 035 $a(OCoLC)793103968 035 $a(MiAaPQ)EBC4471045 035 $a(OCoLC)876046653 035 $a(OCoLC)ocn876046653 035 $a(Perlego)1003787 035 $a(EXLCZ)992670000000166885 100 $a20110824d2012 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aCyber security policy guidebook /$fJennifer L. Bayuk ... [et al.] 205 $aFirst edition 210 $aHoboken, N.J. $cWiley$dc2012 215 $a1 online resource (xvi, 270 pages) $cillustrations 300 $aDescription based upon print version of record. 311 08$a9781118027806 311 08$a1118027809 320 $aIncludes bibliographical references (p. 255-265) and index. 327 $aCyber Security Policy Guidebook; Contents; Foreword; Preface; Acknowledgments; 1: Introduction; 1.1 What Is Cyber Security?; 1.2 What Is Cyber Security Policy?; 1.3 Domains of Cyber Security Policy; 1.3.1 Laws and Regulations; 1.3.2 Enterprise Policy; 1.3.3 Technology Operations; 1.3.4 Technology Configuration; 1.4 Strategy versus Policy; 2: Cyber Security Evolution; 2.1 Productivity; 2.2 Internet; 2.3 e-Commerce; 2.4 Countermeasures; 2.5 Challenges; 3: Cyber Security Objectives; 3.1 Cyber Security Metrics; 3.2 Security Management Goals; 3.3 Counting Vulnerabilities; 3.4 Security Frameworks 327 $a3.4.1 e-Commerce Systems3.4.2 Industrial Control Systems; 3.4.3 Personal Mobile Devices; 3.5 Security Policy Objectives; 4: Guidance for Decision Makers; 4.1 Tone at the Top; 4.2 Policy as a Project; 4.3 Cyber Security Management; 4.3.1 Arriving at Goals; 4.3.2 Cyber Security Documentation; 4.4 Using the Catalog; 5: The Catalog Approach; 5.1 Catalog Format; 5.2 Cyber Security Policy Taxonomy; 6: Cyber Security Policy Catalog; 6.1 Cyber Governance Issues; 6.1.1 Net Neutrality; 6.1.2 Internet Names and Numbers; 6.1.3 Copyrights and Trademarks; 6.1.4 Email and Messaging; 6.2 Cyber User Issues 327 $a6.2.1 Malvertising6.2.2 Impersonation; 6.2.3 Appropriate Use; 6.2.4 Cyber Crime; 6.2.5 Geolocation; 6.2.6 Privacy; 6.3 Cyber Conflict Issues; 6.3.1 Intellectual Property Theft; 6.3.2 Cyber Espionage; 6.3.3 Cyber Sabotage; 6.3.4 Cyber Warfare; 6.4 Cyber Management Issues; 6.4.1 Fiduciary Responsibility; 6.4.2 Risk Management; 6.4.3 Professional Certification; 6.4.4 Supply Chain; 6.4.5 Security Principles; 6.4.6 Research and Development; 6.5 Cyber Infrastructure Issues; 6.5.1 Banking and Finance; 6.5.2 Health Care; 6.5.3 Industrial Control Systems 327 $a7: One Government's Approach to Cyber Security Policy7.1 U.S. Federal Cyber Security Strategy; 7.2 A Brief History of Cyber Security Public Policy Development in the U.S. Federal Government; 7.2.1 The Bombing of New York's World Trade Center on February 26, 1993; 7.2.2 Cyber Attacks against the United States Air Force, March-May 1994: Targeting the Pentagon; 7.2.3 The Citibank Caper, June-October, 1994: How to Catch a Hacker; 7.2.4 Murrah Federal Building, Oklahoma City-April 19, 1995: Major Terrorism Events and Their U.S. Outcomes 327 $a7.2.5 President's Commission on Critical Infrastructure Protection-19967.2.6 Presidential Decision Directive 63-1998; 7.2.7 National Infrastructure Protection Center (NIPC) and ISACs-1998; 7.2.8 Eligible Receiver-1997; 7.2.9 Solar Sunrise-1998; 7.2.10 Joint Task Force-Computer Network Defense (JTF-CND)-1998; 7.2.11 Terrorist Attacks against the United States-September 11, 2001 Effects of Catastrophic Events on Transportation System Management and Operations; 7.2.12 U.S. Government Response to the September 11, 2001 Terrorist Attacks; 7.2.13 Homeland Security Presidential Directives 327 $a7.2.14 National Strategies 330 $a"Drawing upon a wealth of experience from academia, industry, and government service, this book details and dissects current organizational cybersecurity policy issues on a global scale. Using simple language, it includes a thorough description of each issue, lists pros and cons, documents policy alternatives for the sake of clarity with respect to policy alone, and dives into organizational implementation issues. It also equips the reader with descriptions of the impact of specific policy choices, both positive and negative. This book gives students, scholars, and technical decision-makers the necessary knowledge of cybersecurity policy in order to make more informed decisions"--Provided by publisher. 410 0$aWiley UBCM ebooks. 606 $aInformation technology$xGovernment policy 606 $aComputer security$xGovernment policy 606 $aData protection$xGovernment policy 615 0$aInformation technology$xGovernment policy. 615 0$aComputer security$xGovernment policy. 615 0$aData protection$xGovernment policy. 676 $a005.8 686 $aCOM053000$2bisacsh 701 $aBayuk$b Jennifer L$01625658 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910825352603321 996 $aCyber security policy guidebook$93961270 997 $aUNINA