top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity environment / / Dr. Julie E. Mehan
CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity environment / / Dr. Julie E. Mehan
Autore Mehan Julie E.
Edizione [2nd ed.]
Pubbl/distr/stampa [Cambridge, England] : , : IT Governance Publishing, , 2014
Descrizione fisica 1 online resource (352 p.)
Disciplina 658.478
Soggetto topico Computer crimes - Prevention
Cyberterrorism - Prevention
Computer networks - Security measures - Standards
Soggetto genere / forma Electronic books.
ISBN 1-84928-572-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title; Copyright; Preface; About the Author; Contents; Introduction; Chapter 1: Technology Is a Double-Edged Sword; From the printing press to the information age; The 'dark side of high tech'; Chapter 2: Cyber Attack: It's A Dangerous World for Information Systems; Cyberwar; Cyberterror; Cybercrime; CyberEspionage (and Information Exfiltration) - It's midnight; do you know where your data is?; Social Media - an opportunity and a challenge; Supply Chain (In-) security; The blended threat; The asymmetric effects of cyber attacks; Porous perimeters, compromisable software - or both?
If we know about the vulnerabilities, why are exploits still successful?Chapter 3: The Human Factor: The Underrated Threat; Are people the problem?; Who are the attackers?; Most likely forms of attack; Sometimes it's just human error; People can also be the solution!; Chapter 4: Transition from an Environment of 'FUD' to a Standards-Based Environment; Chapter 5: Establishing a Culture of Cybersecurity; Chapter 6: Increasing Internationalism: Governance, Laws, and Ethics; Information globalism equals increased exposure; Following the lead of good governance; The proliferation of laws
Ethics in an information society and a minimum standard of due care in cybersecurityCybersecurity and privacy; Chapter 7: Standards: What Are They and Why Should We Care?; What are standards?; How and by whom are standards developed?; The importance of terminology; Standards-based process improvement; Focus on consensus-based cybersecurity; Standards provide a level playing-field for co-ordination and co-operation; If standards are so good, then why is it so hard?; Chapter 8: From Reaction to Proaction: Applying Standards in an Environment of Change and Danger
Moving beyond compliance and reactionA quick look at relevant standards; Take four steps forward; The future is 'ROSI'; Making the case for cybersecurity assurance; Chapter 9: Conclusion: Where Do We Go From Here?; Cybersecurity program roadmap; Appendix 1: Gap Analysis Areas of Interest; Appendix 2: Standards Crosswalk; Definitions; Acronyms; Index; A; B; C; D; E; F; G; H; I; J; K; L; M; N; O; P; Q; R; S; T; U; V; W; X; Y; ITG Resources
Record Nr. UNINA-9910459843303321
Mehan Julie E.  
[Cambridge, England] : , : IT Governance Publishing, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity environment / / Dr. Julie E. Mehan
CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity environment / / Dr. Julie E. Mehan
Autore Mehan Julie E.
Edizione [2nd ed.]
Pubbl/distr/stampa [Cambridge, England] : , : IT Governance Publishing, , 2014
Descrizione fisica 1 online resource (352 p.)
Disciplina 658.478
Soggetto topico Computer crimes - Prevention
Cyberterrorism - Prevention
Computer networks - Security measures - Standards
ISBN 1-84928-572-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title; Copyright; Preface; About the Author; Contents; Introduction; Chapter 1: Technology Is a Double-Edged Sword; From the printing press to the information age; The 'dark side of high tech'; Chapter 2: Cyber Attack: It's A Dangerous World for Information Systems; Cyberwar; Cyberterror; Cybercrime; CyberEspionage (and Information Exfiltration) - It's midnight; do you know where your data is?; Social Media - an opportunity and a challenge; Supply Chain (In-) security; The blended threat; The asymmetric effects of cyber attacks; Porous perimeters, compromisable software - or both?
If we know about the vulnerabilities, why are exploits still successful?Chapter 3: The Human Factor: The Underrated Threat; Are people the problem?; Who are the attackers?; Most likely forms of attack; Sometimes it's just human error; People can also be the solution!; Chapter 4: Transition from an Environment of 'FUD' to a Standards-Based Environment; Chapter 5: Establishing a Culture of Cybersecurity; Chapter 6: Increasing Internationalism: Governance, Laws, and Ethics; Information globalism equals increased exposure; Following the lead of good governance; The proliferation of laws
Ethics in an information society and a minimum standard of due care in cybersecurityCybersecurity and privacy; Chapter 7: Standards: What Are They and Why Should We Care?; What are standards?; How and by whom are standards developed?; The importance of terminology; Standards-based process improvement; Focus on consensus-based cybersecurity; Standards provide a level playing-field for co-ordination and co-operation; If standards are so good, then why is it so hard?; Chapter 8: From Reaction to Proaction: Applying Standards in an Environment of Change and Danger
Moving beyond compliance and reactionA quick look at relevant standards; Take four steps forward; The future is 'ROSI'; Making the case for cybersecurity assurance; Chapter 9: Conclusion: Where Do We Go From Here?; Cybersecurity program roadmap; Appendix 1: Gap Analysis Areas of Interest; Appendix 2: Standards Crosswalk; Definitions; Acronyms; Index; A; B; C; D; E; F; G; H; I; J; K; L; M; N; O; P; Q; R; S; T; U; V; W; X; Y; ITG Resources
Record Nr. UNINA-9910787048803321
Mehan Julie E.  
[Cambridge, England] : , : IT Governance Publishing, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity environment / / Dr. Julie E. Mehan
CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity environment / / Dr. Julie E. Mehan
Autore Mehan Julie E.
Edizione [2nd ed.]
Pubbl/distr/stampa [Cambridge, England] : , : IT Governance Publishing, , 2014
Descrizione fisica 1 online resource (352 p.)
Disciplina 658.478
Soggetto topico Computer crimes - Prevention
Cyberterrorism - Prevention
Computer networks - Security measures - Standards
ISBN 1-84928-572-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title; Copyright; Preface; About the Author; Contents; Introduction; Chapter 1: Technology Is a Double-Edged Sword; From the printing press to the information age; The 'dark side of high tech'; Chapter 2: Cyber Attack: It's A Dangerous World for Information Systems; Cyberwar; Cyberterror; Cybercrime; CyberEspionage (and Information Exfiltration) - It's midnight; do you know where your data is?; Social Media - an opportunity and a challenge; Supply Chain (In-) security; The blended threat; The asymmetric effects of cyber attacks; Porous perimeters, compromisable software - or both?
If we know about the vulnerabilities, why are exploits still successful?Chapter 3: The Human Factor: The Underrated Threat; Are people the problem?; Who are the attackers?; Most likely forms of attack; Sometimes it's just human error; People can also be the solution!; Chapter 4: Transition from an Environment of 'FUD' to a Standards-Based Environment; Chapter 5: Establishing a Culture of Cybersecurity; Chapter 6: Increasing Internationalism: Governance, Laws, and Ethics; Information globalism equals increased exposure; Following the lead of good governance; The proliferation of laws
Ethics in an information society and a minimum standard of due care in cybersecurityCybersecurity and privacy; Chapter 7: Standards: What Are They and Why Should We Care?; What are standards?; How and by whom are standards developed?; The importance of terminology; Standards-based process improvement; Focus on consensus-based cybersecurity; Standards provide a level playing-field for co-ordination and co-operation; If standards are so good, then why is it so hard?; Chapter 8: From Reaction to Proaction: Applying Standards in an Environment of Change and Danger
Moving beyond compliance and reactionA quick look at relevant standards; Take four steps forward; The future is 'ROSI'; Making the case for cybersecurity assurance; Chapter 9: Conclusion: Where Do We Go From Here?; Cybersecurity program roadmap; Appendix 1: Gap Analysis Areas of Interest; Appendix 2: Standards Crosswalk; Definitions; Acronyms; Index; A; B; C; D; E; F; G; H; I; J; K; L; M; N; O; P; Q; R; S; T; U; V; W; X; Y; ITG Resources
Record Nr. UNINA-9910813108803321
Mehan Julie E.  
[Cambridge, England] : , : IT Governance Publishing, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Insider threat : a guide to understanding, detecting, and defending against the enemy from within / / Julie E. Mehan
Insider threat : a guide to understanding, detecting, and defending against the enemy from within / / Julie E. Mehan
Autore Mehan Julie E.
Pubbl/distr/stampa Cambridgeshire, England : , : IT Governance Publishing, , 2016
Descrizione fisica 1 online resource (301 pages)
Disciplina 364.168
Soggetto topico Computer crimes - Prevention
ISBN 1-84928-840-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910155109103321
Mehan Julie E.  
Cambridgeshire, England : , : IT Governance Publishing, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui