top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cyber threat! : how to manage the growing risk of cyber attacks / / N. MacDonnell Ulsch
Cyber threat! : how to manage the growing risk of cyber attacks / / N. MacDonnell Ulsch
Autore Ulsch N. MacDonnell <1951->
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , 2014
Descrizione fisica 1 online resource (227 p.)
Disciplina 658.4/78
Collana Wiley Corporate F&A
Soggetto topico Corporations - Security measures
Business enterprises - Computer networks - Security measures
Computer crimes - Prevention
Computer security
Computer networks - Security measures
ISBN 1-118-93595-0
1-118-91502-X
1-118-93596-9
Classificazione BUS083000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks; Contents; Foreword; Preface; Acknowledgments; Introduction: What Every Current and Future Senior Executive Must Know about the Cyber Threat: A Perfect Digital Storm Is Forming; What Factors Create a Perfect Storm?; Industry Vulnerability; Threat Intensification; Inadequate Government Preparedness; Low Level of Awareness; Inadequate Risk Assessments; Offshoring of Data; Insider Threat; Denial of Vulnerability; Increasingly Sophisticated Attacks; Mobile Devices at Higher Risk; Sometimes Security Just Doesn't Take Hold
It Wasn't Always Like ThisWithout a Bang; A Board Issue; The Cyber Frankenstein Cometh; Defining Success; Notes; Part I: The Cyber Threat to the Corporate Brand: How It Will Impact Your Company; Chapter 1: The Rise of Cyber Organized Crime and Its Global Impact; Is Nothing Sacred?; The Liberty Reserve Case: Money Laundering in the Digital Age; The Corruption Factor; Information Threat, Physical Threat; Notes; Chapter 2: The Emergence of the Cyber Nation-State and Technology Espionage: Red China Rising and Its Global Cyber Theft Strategy; A Case of Cyber Espionage Conspiracy?
According to the Select Committee . . .Notes; Chapter 3: Cyber Al Qaeda Poses a Threat to Critical Infrastructure; A Disabled America; A New Age: Inspiring Terrorists and Terrorism; A Call Heard Vaguely; Attack upon Attack, No Peace in Sight; Notes; Part II: Corporate Vulnerabilitiesin the Digital Society: Prepare to Defend Yourself and Your Brand; Chapter 4: What Is the True Cost of a Cyber Attack?; Cyber Attack Detection Sometimes Takes Years; One of the First Questions: "How Much Will This Cost?"; A Few Common Cost Factors; What about Unreported Breaches?
Cyber Attacks Result in a Wider Impact: The CommunityNotes; Chapter 5: U.S. Cyber Public Policy: Don't Rely on It to Protect the Brand; No Guarantees with This Executive Order; Government-Industry Cooperation: No Silver Bullet; The Challenge of Defining Cyber Public Policy; Cold War II: The Cyber Chapter; Is There a Silver Lining in an Attack?; Notes; Chapter 6: Four Trends Driving Cyber Breaches and Increasing Corporate Risk: Technological, Cultural, Economic, and Geopolitical Shifts; Technology Trend; Loss of Situational Awareness: Distraction; Culture; Technology Is a Double-Edged Sword
NotesChapter 7: Social Media and Digital Protest; Social Media: A Tool for Disruption, a Model for Change; The Hacker Group Anonymous; Anonymous Is an "Anti" Outfit of Malcontents; In Reckless Move, Anonymous Targeted Law Enforcement; Anonymous: Making All Information Free for All; In Pursuit of the Anonymous Definition of Civil Liberties; Anarchaos: In the Image of Anonymous; Notes; Part III: Protecting the Brand: Actions Executive Management Must Take to Reduce Cyber Risk; Chapter 8: Managing the Brand When the Worst Occurs; Be Prepared; 1. Initiation
2. Discovery and Forensic Evidence Capture
Record Nr. UNINA-9910786630203321
Ulsch N. MacDonnell <1951->  
Hoboken, New Jersey : , : Wiley, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber threat! : how to manage the growing risk of cyber attacks / / N. MacDonnell Ulsch
Cyber threat! : how to manage the growing risk of cyber attacks / / N. MacDonnell Ulsch
Autore Ulsch N. MacDonnell <1951->
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , 2014
Descrizione fisica 1 online resource (227 p.)
Disciplina 658.4/78
Collana Wiley Corporate F&A
Soggetto topico Corporations - Security measures
Business enterprises - Computer networks - Security measures
Computer crimes - Prevention
Computer security
Computer networks - Security measures
ISBN 1-118-93595-0
1-118-91502-X
1-118-93596-9
Classificazione BUS083000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks; Contents; Foreword; Preface; Acknowledgments; Introduction: What Every Current and Future Senior Executive Must Know about the Cyber Threat: A Perfect Digital Storm Is Forming; What Factors Create a Perfect Storm?; Industry Vulnerability; Threat Intensification; Inadequate Government Preparedness; Low Level of Awareness; Inadequate Risk Assessments; Offshoring of Data; Insider Threat; Denial of Vulnerability; Increasingly Sophisticated Attacks; Mobile Devices at Higher Risk; Sometimes Security Just Doesn't Take Hold
It Wasn't Always Like ThisWithout a Bang; A Board Issue; The Cyber Frankenstein Cometh; Defining Success; Notes; Part I: The Cyber Threat to the Corporate Brand: How It Will Impact Your Company; Chapter 1: The Rise of Cyber Organized Crime and Its Global Impact; Is Nothing Sacred?; The Liberty Reserve Case: Money Laundering in the Digital Age; The Corruption Factor; Information Threat, Physical Threat; Notes; Chapter 2: The Emergence of the Cyber Nation-State and Technology Espionage: Red China Rising and Its Global Cyber Theft Strategy; A Case of Cyber Espionage Conspiracy?
According to the Select Committee . . .Notes; Chapter 3: Cyber Al Qaeda Poses a Threat to Critical Infrastructure; A Disabled America; A New Age: Inspiring Terrorists and Terrorism; A Call Heard Vaguely; Attack upon Attack, No Peace in Sight; Notes; Part II: Corporate Vulnerabilitiesin the Digital Society: Prepare to Defend Yourself and Your Brand; Chapter 4: What Is the True Cost of a Cyber Attack?; Cyber Attack Detection Sometimes Takes Years; One of the First Questions: "How Much Will This Cost?"; A Few Common Cost Factors; What about Unreported Breaches?
Cyber Attacks Result in a Wider Impact: The CommunityNotes; Chapter 5: U.S. Cyber Public Policy: Don't Rely on It to Protect the Brand; No Guarantees with This Executive Order; Government-Industry Cooperation: No Silver Bullet; The Challenge of Defining Cyber Public Policy; Cold War II: The Cyber Chapter; Is There a Silver Lining in an Attack?; Notes; Chapter 6: Four Trends Driving Cyber Breaches and Increasing Corporate Risk: Technological, Cultural, Economic, and Geopolitical Shifts; Technology Trend; Loss of Situational Awareness: Distraction; Culture; Technology Is a Double-Edged Sword
NotesChapter 7: Social Media and Digital Protest; Social Media: A Tool for Disruption, a Model for Change; The Hacker Group Anonymous; Anonymous Is an "Anti" Outfit of Malcontents; In Reckless Move, Anonymous Targeted Law Enforcement; Anonymous: Making All Information Free for All; In Pursuit of the Anonymous Definition of Civil Liberties; Anarchaos: In the Image of Anonymous; Notes; Part III: Protecting the Brand: Actions Executive Management Must Take to Reduce Cyber Risk; Chapter 8: Managing the Brand When the Worst Occurs; Be Prepared; 1. Initiation
2. Discovery and Forensic Evidence Capture
Record Nr. UNINA-9910816453803321
Ulsch N. MacDonnell <1951->  
Hoboken, New Jersey : , : Wiley, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The handbook of security / / editor, Martin Gill
The handbook of security / / editor, Martin Gill
Edizione [Third edition.]
Pubbl/distr/stampa Cham, Switzerland : , : Palgrave Macmillan, , [2022]
Descrizione fisica 1 online resource (1040 pages)
Disciplina 363.289
Soggetto topico Private security services
Corporations - Security measures
Security systems
ISBN 9783030917357
9783030917340
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910580158303321
Cham, Switzerland : , : Palgrave Macmillan, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Managing cybersecurity risk : how directors and corporate officers can protect their businesses / / Jonathan Reuvid
Managing cybersecurity risk : how directors and corporate officers can protect their businesses / / Jonathan Reuvid
Autore Reuvid Jonathan
Pubbl/distr/stampa London, [England] : , : Legend Business, , 2016
Descrizione fisica 1 online resource (178 pages) : illustrations
Disciplina 658.478
Soggetto topico Business enterprises - Computer networks - Security measures
Corporations - Security measures
ISBN 1-78507-914-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910154853003321
Reuvid Jonathan  
London, [England] : , : Legend Business, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Managing the insider threat : no dark corners / / Nick Catrantzos
Managing the insider threat : no dark corners / / Nick Catrantzos
Autore Catrantzos Nick
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton, Fla. : , : CRC Press, , 2012
Descrizione fisica 1 online resource (357 p.)
Disciplina 658.4/73
Soggetto topico Corporations - Security measures
Employee crimes - Prevention
Sabotage in the workplace - Prevention
Soggetto genere / forma Electronic books.
ISBN 0-429-25147-5
1-4665-6656-6
1-4398-7293-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Foreword; Preface; Author; Chapter 1 - The Problem and Limits of Accepted Wisdom; Chapter 2 - New Research and Contrarian Findings; Chapter 5 - Rethinking Background Investigations; Chapter 6 - Deception and the Insider Threat; Chapter 7 - Lawful Disruption of the Insider Threat; Chapter 8 - Existential Insider Threats; Chapter 9 - Other Insider Threats; Chapter 10 - Consulting for No Dark Corners Implementation; Chapter 11 - Answer Guide; Appendix A: Three Rounds of Delphi Questions; Appendix B: Summary of Delphi Round 1 Findings Accompanying Round 2 Questions
Appendix C: Summary of Delphi Round 2 Findings Accompanying Round 3 QuestionsAppendix D: Delphi Expert Comments and Stories; Back Cover
Record Nr. UNINA-9910452081203321
Catrantzos Nick  
Boca Raton, Fla. : , : CRC Press, , 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network attacks & exploitation : a framework / / Matthew Monte
Network attacks & exploitation : a framework / / Matthew Monte
Autore Monte Matthew
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, Indiana : , : Wiley, , 2015
Descrizione fisica 1 online resource (219 p.)
Disciplina 658.478
Soggetto topico Business enterprises - Computer networks - Security measures
Computer security
Computer crimes - Prevention
Corporations - Security measures
ISBN 1-118-98723-3
1-119-18344-8
1-118-98708-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Introduction; Chapter 1 Computer Network Exploitation; Operations; Operational Objectives; Strategic Collection; Directed Collection; Non-Kinetic Computer Network Attack (CNA); Strategic Access; Positional Access; CNE Revisited; A Framework for Computer Network Exploitation; First Principles; Principles; Themes; Summary; Chapter 2 The Attacker; Principle of Humanity; Life Cycle of an Operation; Stage 1: Targeting; Stage 2: Initial Access; Stage 3: Persistence; Stage 4: Expansion; Stage 5: Exfiltration; Stage 6: Detection; Principle of Access
Inbound AccessOutbound Access; Bidirectional Access; No Outside Access; Access Summary; Principle of Economy; Time; Targeting Capabilities; Exploitation Expertise; Networking Expertise; Software Development Expertise; Operational Expertise; Operational Analysis Expertise; Technical Resources; Economy Summary; Attacker Structure; Summary; Chapter 3 The Defender; Principle of Humanity; Humanity and Network Layout; Humanity and Security Policy; Principle of Access; The Defensive Life Cycle; Principle of Economy; The Helpful Defender; Summary; Chapter 4 Asymmetries; False Asymmetries
Advantage AttackerMotivation; Initiative; Focus; Effect of Failure; Knowledge of Technology; Analysis of Opponent; Tailored Software; Rate of Change; Advantage Defender; Network Awareness; Network Posture; Advantage Indeterminate; Time; Efficiency; Summary; Chapter 5 Attacker Frictions; Mistakes; Complexity; Flawed Attack Tools; Upgrades and Updates; Other Attackers; The Security Community; Bad Luck; Summary; Chapter 6 Defender Frictions; Mistakes; Flawed Software; Inertia; The Security Community; Complexity; Users; Bad Luck; Summary; Chapter 7 Offensive Strategy; Principle 1: Knowledge
Measuring KnowledgePrinciple 2: Awareness; Measuring Awareness; Principle 3: Innovation; Measuring Innovation; Defensive Innovation; Principle 4: Precaution; Measuring Precaution; Principle 5: Operational Security; Minimizing Exposure; Minimizing Recognition; Controlling Reaction; Measuring Operational Security; Principle 6: Program Security; Attacker Liabilities; Program Security Costs; Measuring Program Security; Crafting an Offensive Strategy; Modular Frameworks; A Note on Tactical Decisions; Summary; Chapter 8 Defensive Strategy; Failed Tactics; Antivirus and Signature-Based Detection
Password PoliciesUser Training; Crafting a Defensive Strategy; Cloud-Based Security; Summary; Chapter 9 Offensive Case Studies; Stuxnet; Access; Economy; Humanity; Knowledge; Awareness; Precaution; Innovation; Operational Security; Program Security; Stuxnet Summary; Flame; Gauss; Dragonfly; Red October; APT1; Axiom; Summary; Epilogue; Appendix Attack Tools; Antivirus Defeats; Audio/Webcam Recording; Backdoor; Bootkit; Collection Tools; Exploits; Fuzzer; Hardware-based Trojan; Implant; Keystroke Logger; Network Capture; Network Survey; Network Tunnel; Password Dumpers and Crackers; Packer
Persistence Mechanism
Record Nr. UNINA-9910131512403321
Monte Matthew  
Indianapolis, Indiana : , : Wiley, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network attacks & exploitation : a framework / / Matthew Monte
Network attacks & exploitation : a framework / / Matthew Monte
Autore Monte Matthew
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, Indiana : , : Wiley, , 2015
Descrizione fisica 1 online resource (219 p.)
Disciplina 658.478
Soggetto topico Business enterprises - Computer networks - Security measures
Computer security
Computer crimes - Prevention
Corporations - Security measures
ISBN 1-118-98723-3
1-119-18344-8
1-118-98708-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Introduction; Chapter 1 Computer Network Exploitation; Operations; Operational Objectives; Strategic Collection; Directed Collection; Non-Kinetic Computer Network Attack (CNA); Strategic Access; Positional Access; CNE Revisited; A Framework for Computer Network Exploitation; First Principles; Principles; Themes; Summary; Chapter 2 The Attacker; Principle of Humanity; Life Cycle of an Operation; Stage 1: Targeting; Stage 2: Initial Access; Stage 3: Persistence; Stage 4: Expansion; Stage 5: Exfiltration; Stage 6: Detection; Principle of Access
Inbound AccessOutbound Access; Bidirectional Access; No Outside Access; Access Summary; Principle of Economy; Time; Targeting Capabilities; Exploitation Expertise; Networking Expertise; Software Development Expertise; Operational Expertise; Operational Analysis Expertise; Technical Resources; Economy Summary; Attacker Structure; Summary; Chapter 3 The Defender; Principle of Humanity; Humanity and Network Layout; Humanity and Security Policy; Principle of Access; The Defensive Life Cycle; Principle of Economy; The Helpful Defender; Summary; Chapter 4 Asymmetries; False Asymmetries
Advantage AttackerMotivation; Initiative; Focus; Effect of Failure; Knowledge of Technology; Analysis of Opponent; Tailored Software; Rate of Change; Advantage Defender; Network Awareness; Network Posture; Advantage Indeterminate; Time; Efficiency; Summary; Chapter 5 Attacker Frictions; Mistakes; Complexity; Flawed Attack Tools; Upgrades and Updates; Other Attackers; The Security Community; Bad Luck; Summary; Chapter 6 Defender Frictions; Mistakes; Flawed Software; Inertia; The Security Community; Complexity; Users; Bad Luck; Summary; Chapter 7 Offensive Strategy; Principle 1: Knowledge
Measuring KnowledgePrinciple 2: Awareness; Measuring Awareness; Principle 3: Innovation; Measuring Innovation; Defensive Innovation; Principle 4: Precaution; Measuring Precaution; Principle 5: Operational Security; Minimizing Exposure; Minimizing Recognition; Controlling Reaction; Measuring Operational Security; Principle 6: Program Security; Attacker Liabilities; Program Security Costs; Measuring Program Security; Crafting an Offensive Strategy; Modular Frameworks; A Note on Tactical Decisions; Summary; Chapter 8 Defensive Strategy; Failed Tactics; Antivirus and Signature-Based Detection
Password PoliciesUser Training; Crafting a Defensive Strategy; Cloud-Based Security; Summary; Chapter 9 Offensive Case Studies; Stuxnet; Access; Economy; Humanity; Knowledge; Awareness; Precaution; Innovation; Operational Security; Program Security; Stuxnet Summary; Flame; Gauss; Dragonfly; Red October; APT1; Axiom; Summary; Epilogue; Appendix Attack Tools; Antivirus Defeats; Audio/Webcam Recording; Backdoor; Bootkit; Collection Tools; Exploits; Fuzzer; Hardware-based Trojan; Implant; Keystroke Logger; Network Capture; Network Survey; Network Tunnel; Password Dumpers and Crackers; Packer
Persistence Mechanism
Record Nr. UNINA-9910816276103321
Monte Matthew  
Indianapolis, Indiana : , : Wiley, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security metrics management : measuring the effectiveness and efficiency of a security program / / Dr. Gerald L. Kovacich, Edward P. Halibozek
Security metrics management : measuring the effectiveness and efficiency of a security program / / Dr. Gerald L. Kovacich, Edward P. Halibozek
Autore Kovacich Gerald L.
Edizione [Second edition.]
Pubbl/distr/stampa Oxford, United Kingdom : , : Butterworth-Heinemann, , [2017]
Descrizione fisica 1 online resource (xxxiii, 272 pages) : illustrations
Disciplina 363.289
Collana Gale eBooks
Soggetto topico Private security services
Security systems
Corporations - Security measures
Corporations - Security measures - Costs
ISBN 0-12-804500-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto chapter 1. Security metrics management program : an overview -- chapter 2. Corporate assets protection program -- chapter 3. Personnel security -- chapter 4. Information security -- chapter 5. Security compliance audits -- chapter 6. Security education and awareness -- chapter 7. Surveys and risk management -- chapter 8. Contingency planning -- chapter 9. The guard force -- chapter 10. Technical security systems -- chapter 11. Locks and keys -- chapter 12. Fire protection -- chapter 13. Event security -- chapter 14. Executive protection -- chapter 15. Investigations and noncompliance inquiries -- chapter 16. Government security -- chapter 17. Information systems security -- chapter 18. Mergers, acquisitions, or divestitures security -- chapter 19. Outsourcing -- chapter 20. A look into the future.
Record Nr. UNINA-9910583325603321
Kovacich Gerald L.  
Oxford, United Kingdom : , : Butterworth-Heinemann, , [2017]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security metrics management [[electronic resource] ] : how to measure the costs and benefits of security / / Gerald Kovacich, Edward P. Halibozek
Security metrics management [[electronic resource] ] : how to measure the costs and benefits of security / / Gerald Kovacich, Edward P. Halibozek
Autore Kovacich Gerald L
Pubbl/distr/stampa Burlington, MA, : Butterworth-Heinemann, c2006
Descrizione fisica 1 online resource (353 p.)
Disciplina 658.4/70681
Altri autori (Persone) HalibozekEdward P
Soggetto topico Private security services
Security systems
Corporations - Security measures
Corporations - Security measures - Costs
Soggetto genere / forma Electronic books.
ISBN 1-281-00684-X
9786611006846
0-08-049226-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover
Record Nr. UNINA-9910457338203321
Kovacich Gerald L  
Burlington, MA, : Butterworth-Heinemann, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security metrics management [[electronic resource] ] : how to measure the costs and benefits of security / / Gerald Kovacich, Edward P. Halibozek
Security metrics management [[electronic resource] ] : how to measure the costs and benefits of security / / Gerald Kovacich, Edward P. Halibozek
Autore Kovacich Gerald L
Pubbl/distr/stampa Burlington, MA, : Butterworth-Heinemann, c2006
Descrizione fisica 1 online resource (353 p.)
Disciplina 658.4/70681
Altri autori (Persone) HalibozekEdward P
Soggetto topico Private security services
Security systems
Corporations - Security measures
Corporations - Security measures - Costs
ISBN 1-281-00684-X
9786611006846
0-08-049226-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover
Record Nr. UNINA-9910784365003321
Kovacich Gerald L  
Burlington, MA, : Butterworth-Heinemann, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui