top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cyber security policy guidebook [[electronic resource] /] / Jennifer L. Bayuk ... [et al.]
Cyber security policy guidebook [[electronic resource] /] / Jennifer L. Bayuk ... [et al.]
Edizione [First edition]
Pubbl/distr/stampa Hoboken, N.J., : Wiley, c2012
Descrizione fisica 1 online resource (xvi, 270 pages) : illustrations
Disciplina 005.8
Altri autori (Persone) BayukJennifer L
Soggetto topico Information technology - Government policy
Computer security - Government policy
Data protection - Government policy
ISBN 1-299-18932-6
1-118-24132-0
1-118-24153-3
1-118-24148-7
Classificazione COM053000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cyber Security Policy Guidebook; Contents; Foreword; Preface; Acknowledgments; 1: Introduction; 1.1 What Is Cyber Security?; 1.2 What Is Cyber Security Policy?; 1.3 Domains of Cyber Security Policy; 1.3.1 Laws and Regulations; 1.3.2 Enterprise Policy; 1.3.3 Technology Operations; 1.3.4 Technology Configuration; 1.4 Strategy versus Policy; 2: Cyber Security Evolution; 2.1 Productivity; 2.2 Internet; 2.3 e-Commerce; 2.4 Countermeasures; 2.5 Challenges; 3: Cyber Security Objectives; 3.1 Cyber Security Metrics; 3.2 Security Management Goals; 3.3 Counting Vulnerabilities; 3.4 Security Frameworks
3.4.1 e-Commerce Systems3.4.2 Industrial Control Systems; 3.4.3 Personal Mobile Devices; 3.5 Security Policy Objectives; 4: Guidance for Decision Makers; 4.1 Tone at the Top; 4.2 Policy as a Project; 4.3 Cyber Security Management; 4.3.1 Arriving at Goals; 4.3.2 Cyber Security Documentation; 4.4 Using the Catalog; 5: The Catalog Approach; 5.1 Catalog Format; 5.2 Cyber Security Policy Taxonomy; 6: Cyber Security Policy Catalog; 6.1 Cyber Governance Issues; 6.1.1 Net Neutrality; 6.1.2 Internet Names and Numbers; 6.1.3 Copyrights and Trademarks; 6.1.4 Email and Messaging; 6.2 Cyber User Issues
6.2.1 Malvertising6.2.2 Impersonation; 6.2.3 Appropriate Use; 6.2.4 Cyber Crime; 6.2.5 Geolocation; 6.2.6 Privacy; 6.3 Cyber Conflict Issues; 6.3.1 Intellectual Property Theft; 6.3.2 Cyber Espionage; 6.3.3 Cyber Sabotage; 6.3.4 Cyber Warfare; 6.4 Cyber Management Issues; 6.4.1 Fiduciary Responsibility; 6.4.2 Risk Management; 6.4.3 Professional Certification; 6.4.4 Supply Chain; 6.4.5 Security Principles; 6.4.6 Research and Development; 6.5 Cyber Infrastructure Issues; 6.5.1 Banking and Finance; 6.5.2 Health Care; 6.5.3 Industrial Control Systems
7: One Government's Approach to Cyber Security Policy7.1 U.S. Federal Cyber Security Strategy; 7.2 A Brief History of Cyber Security Public Policy Development in the U.S. Federal Government; 7.2.1 The Bombing of New York's World Trade Center on February 26, 1993; 7.2.2 Cyber Attacks against the United States Air Force, March-May 1994: Targeting the Pentagon; 7.2.3 The Citibank Caper, June-October, 1994: How to Catch a Hacker; 7.2.4 Murrah Federal Building, Oklahoma City-April 19, 1995: Major Terrorism Events and Their U.S. Outcomes
7.2.5 President's Commission on Critical Infrastructure Protection-19967.2.6 Presidential Decision Directive 63-1998; 7.2.7 National Infrastructure Protection Center (NIPC) and ISACs-1998; 7.2.8 Eligible Receiver-1997; 7.2.9 Solar Sunrise-1998; 7.2.10 Joint Task Force-Computer Network Defense (JTF-CND)-1998; 7.2.11 Terrorist Attacks against the United States-September 11, 2001 Effects of Catastrophic Events on Transportation System Management and Operations; 7.2.12 U.S. Government Response to the September 11, 2001 Terrorist Attacks; 7.2.13 Homeland Security Presidential Directives
7.2.14 National Strategies
Record Nr. UNINA-9910141299203321
Hoboken, N.J., : Wiley, c2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber security policy guidebook / / Jennifer L. Bayuk ... [et al.]
Cyber security policy guidebook / / Jennifer L. Bayuk ... [et al.]
Edizione [First edition]
Pubbl/distr/stampa Hoboken, N.J., : Wiley, c2012
Descrizione fisica 1 online resource (xvi, 270 pages) : illustrations
Disciplina 005.8
Altri autori (Persone) BayukJennifer L
Soggetto topico Information technology - Government policy
Computer security - Government policy
Data protection - Government policy
ISBN 9781299189324
1299189326
9781118241325
1118241320
9781118241530
1118241533
9781118241486
1118241487
Classificazione COM053000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cyber Security Policy Guidebook; Contents; Foreword; Preface; Acknowledgments; 1: Introduction; 1.1 What Is Cyber Security?; 1.2 What Is Cyber Security Policy?; 1.3 Domains of Cyber Security Policy; 1.3.1 Laws and Regulations; 1.3.2 Enterprise Policy; 1.3.3 Technology Operations; 1.3.4 Technology Configuration; 1.4 Strategy versus Policy; 2: Cyber Security Evolution; 2.1 Productivity; 2.2 Internet; 2.3 e-Commerce; 2.4 Countermeasures; 2.5 Challenges; 3: Cyber Security Objectives; 3.1 Cyber Security Metrics; 3.2 Security Management Goals; 3.3 Counting Vulnerabilities; 3.4 Security Frameworks
3.4.1 e-Commerce Systems3.4.2 Industrial Control Systems; 3.4.3 Personal Mobile Devices; 3.5 Security Policy Objectives; 4: Guidance for Decision Makers; 4.1 Tone at the Top; 4.2 Policy as a Project; 4.3 Cyber Security Management; 4.3.1 Arriving at Goals; 4.3.2 Cyber Security Documentation; 4.4 Using the Catalog; 5: The Catalog Approach; 5.1 Catalog Format; 5.2 Cyber Security Policy Taxonomy; 6: Cyber Security Policy Catalog; 6.1 Cyber Governance Issues; 6.1.1 Net Neutrality; 6.1.2 Internet Names and Numbers; 6.1.3 Copyrights and Trademarks; 6.1.4 Email and Messaging; 6.2 Cyber User Issues
6.2.1 Malvertising6.2.2 Impersonation; 6.2.3 Appropriate Use; 6.2.4 Cyber Crime; 6.2.5 Geolocation; 6.2.6 Privacy; 6.3 Cyber Conflict Issues; 6.3.1 Intellectual Property Theft; 6.3.2 Cyber Espionage; 6.3.3 Cyber Sabotage; 6.3.4 Cyber Warfare; 6.4 Cyber Management Issues; 6.4.1 Fiduciary Responsibility; 6.4.2 Risk Management; 6.4.3 Professional Certification; 6.4.4 Supply Chain; 6.4.5 Security Principles; 6.4.6 Research and Development; 6.5 Cyber Infrastructure Issues; 6.5.1 Banking and Finance; 6.5.2 Health Care; 6.5.3 Industrial Control Systems
7: One Government's Approach to Cyber Security Policy7.1 U.S. Federal Cyber Security Strategy; 7.2 A Brief History of Cyber Security Public Policy Development in the U.S. Federal Government; 7.2.1 The Bombing of New York's World Trade Center on February 26, 1993; 7.2.2 Cyber Attacks against the United States Air Force, March-May 1994: Targeting the Pentagon; 7.2.3 The Citibank Caper, June-October, 1994: How to Catch a Hacker; 7.2.4 Murrah Federal Building, Oklahoma City-April 19, 1995: Major Terrorism Events and Their U.S. Outcomes
7.2.5 President's Commission on Critical Infrastructure Protection-19967.2.6 Presidential Decision Directive 63-1998; 7.2.7 National Infrastructure Protection Center (NIPC) and ISACs-1998; 7.2.8 Eligible Receiver-1997; 7.2.9 Solar Sunrise-1998; 7.2.10 Joint Task Force-Computer Network Defense (JTF-CND)-1998; 7.2.11 Terrorist Attacks against the United States-September 11, 2001 Effects of Catastrophic Events on Transportation System Management and Operations; 7.2.12 U.S. Government Response to the September 11, 2001 Terrorist Attacks; 7.2.13 Homeland Security Presidential Directives
7.2.14 National Strategies
Record Nr. UNINA-9910825352603321
Hoboken, N.J., : Wiley, c2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity challenges for state and local governments : assessing how the federal government can help : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation of the Committee on Homeland Security, House of Representatives, One Hundred Sixteenth Congress, first session, June 25, 2019
Cybersecurity challenges for state and local governments : assessing how the federal government can help : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation of the Committee on Homeland Security, House of Representatives, One Hundred Sixteenth Congress, first session, June 25, 2019
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2020
Descrizione fisica 1 online resource (iii, 50 pages) : color illustration
Soggetto topico Computer security - United States - States
Computer security - Government policy - United States
Hacking - United States - States - Prevention
Computer networks - Security measures - United States - States
Computer security - Government policy
Soggetto genere / forma Legislative hearings.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Cybersecurity challenges for state and local governments
Record Nr. UNINA-9910712860803321
Washington : , : U.S. Government Publishing Office, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
DHS's progress in securing election systems and other critical infrastructure : hearing before the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, July 11, 2018
DHS's progress in securing election systems and other critical infrastructure : hearing before the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, July 11, 2018
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2019
Descrizione fisica 1 online resource (iii, 91 pages)
Soggetto topico Elections - Corrupt practices - United States - Prevention
Hacking - United States - Prevention
Cyberinfrastructure - Security measures - United States
Computer security - Government policy - United States
National security - United States
Computer security - Government policy
National security
Soggetto genere / forma Online resources.
Legislative hearings.
Rules.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti DHS's progress in securing election systems and other critical infrastructure
Record Nr. UNINA-9910711814303321
Washington : , : U.S. Government Publishing Office, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital risk governance : security strategies for the public and private sectors / / Walter Amedzro St-Hilaire
Digital risk governance : security strategies for the public and private sectors / / Walter Amedzro St-Hilaire
Autore Amedzro St-Hilaire Walter
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XVIII, 218 p.)
Disciplina 005.8
Soggetto topico Computer security - Government policy
Computer security - Law and legislation
ISBN 3-030-61386-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: The international context of corporate digital security -- Chapter 2: National frameworks for the implementation of digital security -- Chapter 3: The complexity of digital technology makes it difficult for enterprises to conceive of its security -- Chapter 4: Intense inter-state competition in cyberspace -- Chapter 5: Establishing competition in digital markets -- Chapter 6: Preserve the legal order by strengthening data control and the ability to regulate platforms -- Chapter 7: Responding to the fiscal challenge launched by the major digital enterprises: a digital security and equity issue -- Chapter 8: Strengths and weaknesses of the enterprise's information system -- Chapter 9: Securing the information system of enterprises and institutions -- Chapter 10: Digital vulnerabilities and attacks compromising the security of enterprises and institutions -- Chapter 11: The nature of the attacks and the characteristics of a cyber-attitude -- Chapter 12: IT safety education for Digital Literacy -- Chapter 13: How to win the digital security challenge in terms of governance -- Chapter 14: Governance through the development of key technologies and the loss of strategic assets -- Chapter 15: Optimize the levers of industrial policy to mobilize financial and human capital: Chapter 16: Conclusion -- Glossary -- References.
Record Nr. UNINA-9910468227603321
Amedzro St-Hilaire Walter  
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Election security : hearing before the Committee on House Administration, House of Representatives, One Hundred Sixteenth Congress, first session, May 8, 2019
Election security : hearing before the Committee on House Administration, House of Representatives, One Hundred Sixteenth Congress, first session, May 8, 2019
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2020
Descrizione fisica 1 online resource (iii, 83 pages)
Soggetto topico Voting-machines - Computer networks - Security measures - United States
Electronic voting - Computer networks - Security measures - United States
Ballot - United States
Computer security - Government policy - United States
Elections - Corrupt practices - United States - Prevention
Ballot
Computer security - Government policy
Soggetto genere / forma Legislative hearings.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Election security
Record Nr. UNINA-9910712813903321
Washington : , : U.S. Government Publishing Office, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Federal cybersecurity research and development strategic plan / / prepared by the Cyber Security and Information Assurance Interagency Working Group, Subcommittee on Networking & Information Technology Research & Development, Committee on Science & Technology Enterprise of the National Science & Technology Council
Federal cybersecurity research and development strategic plan / / prepared by the Cyber Security and Information Assurance Interagency Working Group, Subcommittee on Networking & Information Technology Research & Development, Committee on Science & Technology Enterprise of the National Science & Technology Council
Pubbl/distr/stampa [Washington, D.C.] : , : Executive Office of the President of the United States, National Science and Technology Council, , [2019?]-
Descrizione fisica 1 online resource (volumes)
Disciplina 005.8
Soggetto topico Computer security - Government policy - United States
Research and development projects - United States - Planning
Administrative agencies - Computer networks - Security measures - United States - Planning
Technology and state - United States
Computer security - Government policy
Technology and state
Soggetto genere / forma Periodicals.
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti .. federal cybersecurity research and development strategic plan
Record Nr. UNINA-9910708686803321
[Washington, D.C.] : , : Executive Office of the President of the United States, National Science and Technology Council, , [2019?]-
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Federal cybersecurity research and development strategic plan / / National Science and Technology Council, Networking and Information Technology Research and Development Program
Federal cybersecurity research and development strategic plan / / National Science and Technology Council, Networking and Information Technology Research and Development Program
Pubbl/distr/stampa Washington, D.C. : , : Executive Office of the President, , 2016
Descrizione fisica 1 online resource (iv, 48 pages)
Soggetto topico Computer security - Government policy - United States
Computer networks - Security measures - United States
Computer networks - Security measures
Computer security - Government policy
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti 2016 federal cybersecurity research and development strategic plan
Record Nr. UNINA-9910704394803321
Washington, D.C. : , : Executive Office of the President, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Federal IT modernization : how the coronavirus exposed outdated systems : hearing before the Subcommittee on Government Operations of the Committee on Oversight and Reform, House of Representatives, One Hundred Sixteenth Congress, second session, July 20, 2020
Federal IT modernization : how the coronavirus exposed outdated systems : hearing before the Subcommittee on Government Operations of the Committee on Oversight and Reform, House of Representatives, One Hundred Sixteenth Congress, second session, July 20, 2020
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2020
Descrizione fisica 1 online resource (iii, 38 pages)
Soggetto topico Information technology - Government policy - United States
Computer security - Government policy - United States
Federal government - United States - Information services
Government information - Technological innovations - United States
Electronic government information - United States
COVID-19 (Disease) - United States
Computer security - Government policy
COVID-19 (Disease)
Electronic government information
Federal government - Information services
Government information - Technological innovations
Information technology - Government policy
Soggetto genere / forma Legislative hearings.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Federal IT modernization
Record Nr. UNINA-9910715178203321
Washington : , : U.S. Government Publishing Office, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Improved administration can enhance Federal Emergency Management Agency classified laptop computer security [[electronic resource] ] : unclassified summary / / Department of Homeland Security, Office of Inspector General
Improved administration can enhance Federal Emergency Management Agency classified laptop computer security [[electronic resource] ] : unclassified summary / / Department of Homeland Security, Office of Inspector General
Pubbl/distr/stampa Washington, DC : , : Dept. of Homeland Security, Office of Inspector General, , [2007]
Descrizione fisica 1 online resource (3 pages)
Soggetto topico Computer security - Government policy - United States
Computer security - Government policy
Information technology
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Improved administration can enhance Federal Emergency Management Agency classified laptop computer security
Record Nr. UNINA-9910700935403321
Washington, DC : , : Dept. of Homeland Security, Office of Inspector General, , [2007]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui