Cyber security policy guidebook [[electronic resource] /] / Jennifer L. Bayuk ... [et al.]
| Cyber security policy guidebook [[electronic resource] /] / Jennifer L. Bayuk ... [et al.] |
| Edizione | [First edition] |
| Pubbl/distr/stampa | Hoboken, N.J., : Wiley, c2012 |
| Descrizione fisica | 1 online resource (xvi, 270 pages) : illustrations |
| Disciplina | 005.8 |
| Altri autori (Persone) | BayukJennifer L |
| Soggetto topico |
Information technology - Government policy
Computer security - Government policy Data protection - Government policy |
| ISBN |
1-299-18932-6
1-118-24132-0 1-118-24153-3 1-118-24148-7 |
| Classificazione | COM053000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cyber Security Policy Guidebook; Contents; Foreword; Preface; Acknowledgments; 1: Introduction; 1.1 What Is Cyber Security?; 1.2 What Is Cyber Security Policy?; 1.3 Domains of Cyber Security Policy; 1.3.1 Laws and Regulations; 1.3.2 Enterprise Policy; 1.3.3 Technology Operations; 1.3.4 Technology Configuration; 1.4 Strategy versus Policy; 2: Cyber Security Evolution; 2.1 Productivity; 2.2 Internet; 2.3 e-Commerce; 2.4 Countermeasures; 2.5 Challenges; 3: Cyber Security Objectives; 3.1 Cyber Security Metrics; 3.2 Security Management Goals; 3.3 Counting Vulnerabilities; 3.4 Security Frameworks
3.4.1 e-Commerce Systems3.4.2 Industrial Control Systems; 3.4.3 Personal Mobile Devices; 3.5 Security Policy Objectives; 4: Guidance for Decision Makers; 4.1 Tone at the Top; 4.2 Policy as a Project; 4.3 Cyber Security Management; 4.3.1 Arriving at Goals; 4.3.2 Cyber Security Documentation; 4.4 Using the Catalog; 5: The Catalog Approach; 5.1 Catalog Format; 5.2 Cyber Security Policy Taxonomy; 6: Cyber Security Policy Catalog; 6.1 Cyber Governance Issues; 6.1.1 Net Neutrality; 6.1.2 Internet Names and Numbers; 6.1.3 Copyrights and Trademarks; 6.1.4 Email and Messaging; 6.2 Cyber User Issues 6.2.1 Malvertising6.2.2 Impersonation; 6.2.3 Appropriate Use; 6.2.4 Cyber Crime; 6.2.5 Geolocation; 6.2.6 Privacy; 6.3 Cyber Conflict Issues; 6.3.1 Intellectual Property Theft; 6.3.2 Cyber Espionage; 6.3.3 Cyber Sabotage; 6.3.4 Cyber Warfare; 6.4 Cyber Management Issues; 6.4.1 Fiduciary Responsibility; 6.4.2 Risk Management; 6.4.3 Professional Certification; 6.4.4 Supply Chain; 6.4.5 Security Principles; 6.4.6 Research and Development; 6.5 Cyber Infrastructure Issues; 6.5.1 Banking and Finance; 6.5.2 Health Care; 6.5.3 Industrial Control Systems 7: One Government's Approach to Cyber Security Policy7.1 U.S. Federal Cyber Security Strategy; 7.2 A Brief History of Cyber Security Public Policy Development in the U.S. Federal Government; 7.2.1 The Bombing of New York's World Trade Center on February 26, 1993; 7.2.2 Cyber Attacks against the United States Air Force, March-May 1994: Targeting the Pentagon; 7.2.3 The Citibank Caper, June-October, 1994: How to Catch a Hacker; 7.2.4 Murrah Federal Building, Oklahoma City-April 19, 1995: Major Terrorism Events and Their U.S. Outcomes 7.2.5 President's Commission on Critical Infrastructure Protection-19967.2.6 Presidential Decision Directive 63-1998; 7.2.7 National Infrastructure Protection Center (NIPC) and ISACs-1998; 7.2.8 Eligible Receiver-1997; 7.2.9 Solar Sunrise-1998; 7.2.10 Joint Task Force-Computer Network Defense (JTF-CND)-1998; 7.2.11 Terrorist Attacks against the United States-September 11, 2001 Effects of Catastrophic Events on Transportation System Management and Operations; 7.2.12 U.S. Government Response to the September 11, 2001 Terrorist Attacks; 7.2.13 Homeland Security Presidential Directives 7.2.14 National Strategies |
| Record Nr. | UNINA-9910141299203321 |
| Hoboken, N.J., : Wiley, c2012 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber security policy guidebook / / Jennifer L. Bayuk ... [et al.]
| Cyber security policy guidebook / / Jennifer L. Bayuk ... [et al.] |
| Edizione | [First edition] |
| Pubbl/distr/stampa | Hoboken, N.J., : Wiley, c2012 |
| Descrizione fisica | 1 online resource (xvi, 270 pages) : illustrations |
| Disciplina | 005.8 |
| Altri autori (Persone) | BayukJennifer L |
| Soggetto topico |
Information technology - Government policy
Computer security - Government policy Data protection - Government policy |
| ISBN |
9781299189324
1299189326 9781118241325 1118241320 9781118241530 1118241533 9781118241486 1118241487 |
| Classificazione | COM053000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cyber Security Policy Guidebook; Contents; Foreword; Preface; Acknowledgments; 1: Introduction; 1.1 What Is Cyber Security?; 1.2 What Is Cyber Security Policy?; 1.3 Domains of Cyber Security Policy; 1.3.1 Laws and Regulations; 1.3.2 Enterprise Policy; 1.3.3 Technology Operations; 1.3.4 Technology Configuration; 1.4 Strategy versus Policy; 2: Cyber Security Evolution; 2.1 Productivity; 2.2 Internet; 2.3 e-Commerce; 2.4 Countermeasures; 2.5 Challenges; 3: Cyber Security Objectives; 3.1 Cyber Security Metrics; 3.2 Security Management Goals; 3.3 Counting Vulnerabilities; 3.4 Security Frameworks
3.4.1 e-Commerce Systems3.4.2 Industrial Control Systems; 3.4.3 Personal Mobile Devices; 3.5 Security Policy Objectives; 4: Guidance for Decision Makers; 4.1 Tone at the Top; 4.2 Policy as a Project; 4.3 Cyber Security Management; 4.3.1 Arriving at Goals; 4.3.2 Cyber Security Documentation; 4.4 Using the Catalog; 5: The Catalog Approach; 5.1 Catalog Format; 5.2 Cyber Security Policy Taxonomy; 6: Cyber Security Policy Catalog; 6.1 Cyber Governance Issues; 6.1.1 Net Neutrality; 6.1.2 Internet Names and Numbers; 6.1.3 Copyrights and Trademarks; 6.1.4 Email and Messaging; 6.2 Cyber User Issues 6.2.1 Malvertising6.2.2 Impersonation; 6.2.3 Appropriate Use; 6.2.4 Cyber Crime; 6.2.5 Geolocation; 6.2.6 Privacy; 6.3 Cyber Conflict Issues; 6.3.1 Intellectual Property Theft; 6.3.2 Cyber Espionage; 6.3.3 Cyber Sabotage; 6.3.4 Cyber Warfare; 6.4 Cyber Management Issues; 6.4.1 Fiduciary Responsibility; 6.4.2 Risk Management; 6.4.3 Professional Certification; 6.4.4 Supply Chain; 6.4.5 Security Principles; 6.4.6 Research and Development; 6.5 Cyber Infrastructure Issues; 6.5.1 Banking and Finance; 6.5.2 Health Care; 6.5.3 Industrial Control Systems 7: One Government's Approach to Cyber Security Policy7.1 U.S. Federal Cyber Security Strategy; 7.2 A Brief History of Cyber Security Public Policy Development in the U.S. Federal Government; 7.2.1 The Bombing of New York's World Trade Center on February 26, 1993; 7.2.2 Cyber Attacks against the United States Air Force, March-May 1994: Targeting the Pentagon; 7.2.3 The Citibank Caper, June-October, 1994: How to Catch a Hacker; 7.2.4 Murrah Federal Building, Oklahoma City-April 19, 1995: Major Terrorism Events and Their U.S. Outcomes 7.2.5 President's Commission on Critical Infrastructure Protection-19967.2.6 Presidential Decision Directive 63-1998; 7.2.7 National Infrastructure Protection Center (NIPC) and ISACs-1998; 7.2.8 Eligible Receiver-1997; 7.2.9 Solar Sunrise-1998; 7.2.10 Joint Task Force-Computer Network Defense (JTF-CND)-1998; 7.2.11 Terrorist Attacks against the United States-September 11, 2001 Effects of Catastrophic Events on Transportation System Management and Operations; 7.2.12 U.S. Government Response to the September 11, 2001 Terrorist Attacks; 7.2.13 Homeland Security Presidential Directives 7.2.14 National Strategies |
| Record Nr. | UNINA-9910825352603321 |
| Hoboken, N.J., : Wiley, c2012 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cybersecurity challenges for state and local governments : assessing how the federal government can help : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation of the Committee on Homeland Security, House of Representatives, One Hundred Sixteenth Congress, first session, June 25, 2019
| Cybersecurity challenges for state and local governments : assessing how the federal government can help : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation of the Committee on Homeland Security, House of Representatives, One Hundred Sixteenth Congress, first session, June 25, 2019 |
| Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2020 |
| Descrizione fisica | 1 online resource (iii, 50 pages) : color illustration |
| Soggetto topico |
Computer security - United States - States
Computer security - Government policy - United States Hacking - United States - States - Prevention Computer networks - Security measures - United States - States Computer security - Government policy |
| Soggetto genere / forma | Legislative hearings. |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Cybersecurity challenges for state and local governments |
| Record Nr. | UNINA-9910712860803321 |
| Washington : , : U.S. Government Publishing Office, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
DHS's progress in securing election systems and other critical infrastructure : hearing before the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, July 11, 2018
| DHS's progress in securing election systems and other critical infrastructure : hearing before the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, July 11, 2018 |
| Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2019 |
| Descrizione fisica | 1 online resource (iii, 91 pages) |
| Soggetto topico |
Elections - Corrupt practices - United States - Prevention
Hacking - United States - Prevention Cyberinfrastructure - Security measures - United States Computer security - Government policy - United States National security - United States Computer security - Government policy National security |
| Soggetto genere / forma |
Online resources.
Legislative hearings. Rules. |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | DHS's progress in securing election systems and other critical infrastructure |
| Record Nr. | UNINA-9910711814303321 |
| Washington : , : U.S. Government Publishing Office, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Digital risk governance : security strategies for the public and private sectors / / Walter Amedzro St-Hilaire
| Digital risk governance : security strategies for the public and private sectors / / Walter Amedzro St-Hilaire |
| Autore | Amedzro St-Hilaire Walter |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
| Descrizione fisica | 1 online resource (XVIII, 218 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer security - Government policy
Computer security - Law and legislation |
| ISBN | 3-030-61386-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1: The international context of corporate digital security -- Chapter 2: National frameworks for the implementation of digital security -- Chapter 3: The complexity of digital technology makes it difficult for enterprises to conceive of its security -- Chapter 4: Intense inter-state competition in cyberspace -- Chapter 5: Establishing competition in digital markets -- Chapter 6: Preserve the legal order by strengthening data control and the ability to regulate platforms -- Chapter 7: Responding to the fiscal challenge launched by the major digital enterprises: a digital security and equity issue -- Chapter 8: Strengths and weaknesses of the enterprise's information system -- Chapter 9: Securing the information system of enterprises and institutions -- Chapter 10: Digital vulnerabilities and attacks compromising the security of enterprises and institutions -- Chapter 11: The nature of the attacks and the characteristics of a cyber-attitude -- Chapter 12: IT safety education for Digital Literacy -- Chapter 13: How to win the digital security challenge in terms of governance -- Chapter 14: Governance through the development of key technologies and the loss of strategic assets -- Chapter 15: Optimize the levers of industrial policy to mobilize financial and human capital: Chapter 16: Conclusion -- Glossary -- References. |
| Record Nr. | UNINA-9910468227603321 |
Amedzro St-Hilaire Walter
|
||
| Cham, Switzerland : , : Springer, , [2020] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Election security : hearing before the Committee on House Administration, House of Representatives, One Hundred Sixteenth Congress, first session, May 8, 2019
| Election security : hearing before the Committee on House Administration, House of Representatives, One Hundred Sixteenth Congress, first session, May 8, 2019 |
| Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2020 |
| Descrizione fisica | 1 online resource (iii, 83 pages) |
| Soggetto topico |
Voting-machines - Computer networks - Security measures - United States
Electronic voting - Computer networks - Security measures - United States Ballot - United States Computer security - Government policy - United States Elections - Corrupt practices - United States - Prevention Ballot Computer security - Government policy |
| Soggetto genere / forma | Legislative hearings. |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Election security |
| Record Nr. | UNINA-9910712813903321 |
| Washington : , : U.S. Government Publishing Office, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Federal cybersecurity research and development strategic plan / / prepared by the Cyber Security and Information Assurance Interagency Working Group, Subcommittee on Networking & Information Technology Research & Development, Committee on Science & Technology Enterprise of the National Science & Technology Council
| Federal cybersecurity research and development strategic plan / / prepared by the Cyber Security and Information Assurance Interagency Working Group, Subcommittee on Networking & Information Technology Research & Development, Committee on Science & Technology Enterprise of the National Science & Technology Council |
| Pubbl/distr/stampa | [Washington, D.C.] : , : Executive Office of the President of the United States, National Science and Technology Council, , [2019?]- |
| Descrizione fisica | 1 online resource (volumes) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer security - Government policy - United States
Research and development projects - United States - Planning Administrative agencies - Computer networks - Security measures - United States - Planning Technology and state - United States Computer security - Government policy Technology and state |
| Soggetto genere / forma | Periodicals. |
| Formato | Materiale a stampa |
| Livello bibliografico | Periodico |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | .. federal cybersecurity research and development strategic plan |
| Record Nr. | UNINA-9910708686803321 |
| [Washington, D.C.] : , : Executive Office of the President of the United States, National Science and Technology Council, , [2019?]- | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Federal cybersecurity research and development strategic plan / / National Science and Technology Council, Networking and Information Technology Research and Development Program
| Federal cybersecurity research and development strategic plan / / National Science and Technology Council, Networking and Information Technology Research and Development Program |
| Pubbl/distr/stampa | Washington, D.C. : , : Executive Office of the President, , 2016 |
| Descrizione fisica | 1 online resource (iv, 48 pages) |
| Soggetto topico |
Computer security - Government policy - United States
Computer networks - Security measures - United States Computer networks - Security measures Computer security - Government policy |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | 2016 federal cybersecurity research and development strategic plan |
| Record Nr. | UNINA-9910704394803321 |
| Washington, D.C. : , : Executive Office of the President, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Federal IT modernization : how the coronavirus exposed outdated systems : hearing before the Subcommittee on Government Operations of the Committee on Oversight and Reform, House of Representatives, One Hundred Sixteenth Congress, second session, July 20, 2020
| Federal IT modernization : how the coronavirus exposed outdated systems : hearing before the Subcommittee on Government Operations of the Committee on Oversight and Reform, House of Representatives, One Hundred Sixteenth Congress, second session, July 20, 2020 |
| Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2020 |
| Descrizione fisica | 1 online resource (iii, 38 pages) |
| Soggetto topico |
Information technology - Government policy - United States
Computer security - Government policy - United States Federal government - United States - Information services Government information - Technological innovations - United States Electronic government information - United States COVID-19 (Disease) - United States Computer security - Government policy COVID-19 (Disease) Electronic government information Federal government - Information services Government information - Technological innovations Information technology - Government policy |
| Soggetto genere / forma | Legislative hearings. |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Federal IT modernization |
| Record Nr. | UNINA-9910715178203321 |
| Washington : , : U.S. Government Publishing Office, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Improved administration can enhance Federal Emergency Management Agency classified laptop computer security [[electronic resource] ] : unclassified summary / / Department of Homeland Security, Office of Inspector General
| Improved administration can enhance Federal Emergency Management Agency classified laptop computer security [[electronic resource] ] : unclassified summary / / Department of Homeland Security, Office of Inspector General |
| Pubbl/distr/stampa | Washington, DC : , : Dept. of Homeland Security, Office of Inspector General, , [2007] |
| Descrizione fisica | 1 online resource (3 pages) |
| Soggetto topico |
Computer security - Government policy - United States
Computer security - Government policy Information technology |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Improved administration can enhance Federal Emergency Management Agency classified laptop computer security |
| Record Nr. | UNINA-9910700935403321 |
| Washington, DC : , : Dept. of Homeland Security, Office of Inspector General, , [2007] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||