top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cyber security policy guidebook [[electronic resource] /] / Jennifer L. Bayuk ... [et al.]
Cyber security policy guidebook [[electronic resource] /] / Jennifer L. Bayuk ... [et al.]
Edizione [First edition]
Pubbl/distr/stampa Hoboken, N.J., : Wiley, c2012
Descrizione fisica 1 online resource (xvi, 270 pages) : illustrations
Disciplina 005.8
Altri autori (Persone) BayukJennifer L
Soggetto topico Information technology - Government policy
Computer security - Government policy
Data protection - Government policy
ISBN 1-299-18932-6
1-118-24132-0
1-118-24153-3
1-118-24148-7
Classificazione COM053000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cyber Security Policy Guidebook; Contents; Foreword; Preface; Acknowledgments; 1: Introduction; 1.1 What Is Cyber Security?; 1.2 What Is Cyber Security Policy?; 1.3 Domains of Cyber Security Policy; 1.3.1 Laws and Regulations; 1.3.2 Enterprise Policy; 1.3.3 Technology Operations; 1.3.4 Technology Configuration; 1.4 Strategy versus Policy; 2: Cyber Security Evolution; 2.1 Productivity; 2.2 Internet; 2.3 e-Commerce; 2.4 Countermeasures; 2.5 Challenges; 3: Cyber Security Objectives; 3.1 Cyber Security Metrics; 3.2 Security Management Goals; 3.3 Counting Vulnerabilities; 3.4 Security Frameworks
3.4.1 e-Commerce Systems3.4.2 Industrial Control Systems; 3.4.3 Personal Mobile Devices; 3.5 Security Policy Objectives; 4: Guidance for Decision Makers; 4.1 Tone at the Top; 4.2 Policy as a Project; 4.3 Cyber Security Management; 4.3.1 Arriving at Goals; 4.3.2 Cyber Security Documentation; 4.4 Using the Catalog; 5: The Catalog Approach; 5.1 Catalog Format; 5.2 Cyber Security Policy Taxonomy; 6: Cyber Security Policy Catalog; 6.1 Cyber Governance Issues; 6.1.1 Net Neutrality; 6.1.2 Internet Names and Numbers; 6.1.3 Copyrights and Trademarks; 6.1.4 Email and Messaging; 6.2 Cyber User Issues
6.2.1 Malvertising6.2.2 Impersonation; 6.2.3 Appropriate Use; 6.2.4 Cyber Crime; 6.2.5 Geolocation; 6.2.6 Privacy; 6.3 Cyber Conflict Issues; 6.3.1 Intellectual Property Theft; 6.3.2 Cyber Espionage; 6.3.3 Cyber Sabotage; 6.3.4 Cyber Warfare; 6.4 Cyber Management Issues; 6.4.1 Fiduciary Responsibility; 6.4.2 Risk Management; 6.4.3 Professional Certification; 6.4.4 Supply Chain; 6.4.5 Security Principles; 6.4.6 Research and Development; 6.5 Cyber Infrastructure Issues; 6.5.1 Banking and Finance; 6.5.2 Health Care; 6.5.3 Industrial Control Systems
7: One Government's Approach to Cyber Security Policy7.1 U.S. Federal Cyber Security Strategy; 7.2 A Brief History of Cyber Security Public Policy Development in the U.S. Federal Government; 7.2.1 The Bombing of New York's World Trade Center on February 26, 1993; 7.2.2 Cyber Attacks against the United States Air Force, March-May 1994: Targeting the Pentagon; 7.2.3 The Citibank Caper, June-October, 1994: How to Catch a Hacker; 7.2.4 Murrah Federal Building, Oklahoma City-April 19, 1995: Major Terrorism Events and Their U.S. Outcomes
7.2.5 President's Commission on Critical Infrastructure Protection-19967.2.6 Presidential Decision Directive 63-1998; 7.2.7 National Infrastructure Protection Center (NIPC) and ISACs-1998; 7.2.8 Eligible Receiver-1997; 7.2.9 Solar Sunrise-1998; 7.2.10 Joint Task Force-Computer Network Defense (JTF-CND)-1998; 7.2.11 Terrorist Attacks against the United States-September 11, 2001 Effects of Catastrophic Events on Transportation System Management and Operations; 7.2.12 U.S. Government Response to the September 11, 2001 Terrorist Attacks; 7.2.13 Homeland Security Presidential Directives
7.2.14 National Strategies
Record Nr. UNINA-9910141299203321
Hoboken, N.J., : Wiley, c2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber security policy guidebook [[electronic resource] /] / Jennifer L. Bayuk ... [et al.]
Cyber security policy guidebook [[electronic resource] /] / Jennifer L. Bayuk ... [et al.]
Edizione [First edition]
Pubbl/distr/stampa Hoboken, N.J., : Wiley, c2012
Descrizione fisica 1 online resource (xvi, 270 pages) : illustrations
Disciplina 005.8
Altri autori (Persone) BayukJennifer L
Soggetto topico Information technology - Government policy
Computer security - Government policy
Data protection - Government policy
ISBN 1-299-18932-6
1-118-24132-0
1-118-24153-3
1-118-24148-7
Classificazione COM053000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cyber Security Policy Guidebook; Contents; Foreword; Preface; Acknowledgments; 1: Introduction; 1.1 What Is Cyber Security?; 1.2 What Is Cyber Security Policy?; 1.3 Domains of Cyber Security Policy; 1.3.1 Laws and Regulations; 1.3.2 Enterprise Policy; 1.3.3 Technology Operations; 1.3.4 Technology Configuration; 1.4 Strategy versus Policy; 2: Cyber Security Evolution; 2.1 Productivity; 2.2 Internet; 2.3 e-Commerce; 2.4 Countermeasures; 2.5 Challenges; 3: Cyber Security Objectives; 3.1 Cyber Security Metrics; 3.2 Security Management Goals; 3.3 Counting Vulnerabilities; 3.4 Security Frameworks
3.4.1 e-Commerce Systems3.4.2 Industrial Control Systems; 3.4.3 Personal Mobile Devices; 3.5 Security Policy Objectives; 4: Guidance for Decision Makers; 4.1 Tone at the Top; 4.2 Policy as a Project; 4.3 Cyber Security Management; 4.3.1 Arriving at Goals; 4.3.2 Cyber Security Documentation; 4.4 Using the Catalog; 5: The Catalog Approach; 5.1 Catalog Format; 5.2 Cyber Security Policy Taxonomy; 6: Cyber Security Policy Catalog; 6.1 Cyber Governance Issues; 6.1.1 Net Neutrality; 6.1.2 Internet Names and Numbers; 6.1.3 Copyrights and Trademarks; 6.1.4 Email and Messaging; 6.2 Cyber User Issues
6.2.1 Malvertising6.2.2 Impersonation; 6.2.3 Appropriate Use; 6.2.4 Cyber Crime; 6.2.5 Geolocation; 6.2.6 Privacy; 6.3 Cyber Conflict Issues; 6.3.1 Intellectual Property Theft; 6.3.2 Cyber Espionage; 6.3.3 Cyber Sabotage; 6.3.4 Cyber Warfare; 6.4 Cyber Management Issues; 6.4.1 Fiduciary Responsibility; 6.4.2 Risk Management; 6.4.3 Professional Certification; 6.4.4 Supply Chain; 6.4.5 Security Principles; 6.4.6 Research and Development; 6.5 Cyber Infrastructure Issues; 6.5.1 Banking and Finance; 6.5.2 Health Care; 6.5.3 Industrial Control Systems
7: One Government's Approach to Cyber Security Policy7.1 U.S. Federal Cyber Security Strategy; 7.2 A Brief History of Cyber Security Public Policy Development in the U.S. Federal Government; 7.2.1 The Bombing of New York's World Trade Center on February 26, 1993; 7.2.2 Cyber Attacks against the United States Air Force, March-May 1994: Targeting the Pentagon; 7.2.3 The Citibank Caper, June-October, 1994: How to Catch a Hacker; 7.2.4 Murrah Federal Building, Oklahoma City-April 19, 1995: Major Terrorism Events and Their U.S. Outcomes
7.2.5 President's Commission on Critical Infrastructure Protection-19967.2.6 Presidential Decision Directive 63-1998; 7.2.7 National Infrastructure Protection Center (NIPC) and ISACs-1998; 7.2.8 Eligible Receiver-1997; 7.2.9 Solar Sunrise-1998; 7.2.10 Joint Task Force-Computer Network Defense (JTF-CND)-1998; 7.2.11 Terrorist Attacks against the United States-September 11, 2001 Effects of Catastrophic Events on Transportation System Management and Operations; 7.2.12 U.S. Government Response to the September 11, 2001 Terrorist Attacks; 7.2.13 Homeland Security Presidential Directives
7.2.14 National Strategies
Record Nr. UNINA-9910825352603321
Hoboken, N.J., : Wiley, c2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity regulation harmonization : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Fifteenth Congress, first session, June 21, 2017
Cybersecurity regulation harmonization : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Fifteenth Congress, first session, June 21, 2017
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2018
Descrizione fisica 1 online resource (iii, 117 pages) : illustrations
Collana S. hrg.
Soggetto topico Computer networks - Security measures - United States
Cyberspace - Security measures - United States
Computer security - Law and legislation - United States
Data protection - Government policy - United States
Cyberterrorism - United States - Prevention
Cyberinfrastructure - Security measures - United States
Computer networks - Security measures
Computer security - Law and legislation
Cyberterrorism - Prevention
Data protection - Government policy
Soggetto genere / forma Legislative hearings.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Cybersecurity regulation harmonization
Record Nr. UNINA-9910711345003321
Washington : , : U.S. Government Publishing Office, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data stored abroad : ensuring lawful access and privacy protection in the digital era : hearing before the Committee on the Judiciary, House of Representatives, One Hundred Fifteenth Congress, first session, June 15, 2017
Data stored abroad : ensuring lawful access and privacy protection in the digital era : hearing before the Committee on the Judiciary, House of Representatives, One Hundred Fifteenth Congress, first session, June 15, 2017
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2018
Descrizione fisica 1 online resource (iii, 64 pages)
Soggetto topico Data protection - Government policy - United States
Disclosure of information - Government policy - United States
Disclosure of information - International cooperation
Conflict of laws - Data protection - United States
Privacy, Right of - United States
Conflict of laws - Data protection
Data protection - Government policy
Disclosure of information - Government policy
Privacy, Right of
Soggetto genere / forma Legislative hearings.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Data stored abroad
Record Nr. UNINA-9910711598203321
Washington : , : U.S. Government Publishing Office, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Examining the Consumer Financial Protection Bureau's mass data collection program : hearing before the Subcommittee on Oversight and Investigations of the Committee on Financial Services, U.S. House of Representatives, One Hundred Fourteenth Congress, first session, December 16, 2015
Examining the Consumer Financial Protection Bureau's mass data collection program : hearing before the Subcommittee on Oversight and Investigations of the Committee on Financial Services, U.S. House of Representatives, One Hundred Fourteenth Congress, first session, December 16, 2015
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2016
Descrizione fisica 1 online resource (v, 79 pages)
Soggetto topico Financial services industry - United States
Data protection - Government policy - United States
Data protection - Government policy
Electronic data processing
Financial services industry
Soggetto genere / forma Legislative hearings.
Records and correspondence
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Examining the Consumer Financial Protection Bureau's mass data collection program
Record Nr. UNINA-9910707806203321
Washington : , : U.S. Government Publishing Office, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
GAO high risk focus : cybersecurity : joint hearing before the Subcommittee on Information Technology and the Subcommittee on Government Operations of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Fifteenth Congress, second session, July 25, 2018
GAO high risk focus : cybersecurity : joint hearing before the Subcommittee on Information Technology and the Subcommittee on Government Operations of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Fifteenth Congress, second session, July 25, 2018
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2018
Descrizione fisica 1 online resource (v, 81 pages) : illustrations
Soggetto topico Administrative agencies - Computer networks - Security measures - United States
Infrastructure (Economics) - Computer networks - Security measures - United States
Cyberinfrastructure - Government policy - United States
Data protection - Government policy - United States
Computer crimes - United States - Prevention
Computer crimes - Prevention
Data protection - Government policy
Soggetto genere / forma Legislative hearings.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti GAO high risk focus
Record Nr. UNINA-9910711627403321
Washington : , : U.S. Government Publishing Office, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Global digital data governance : polycentric perspectives / / edited by Carolina Aguerre, Malcolm Campbell-Verduyn, and Jan Aart Scholte
Global digital data governance : polycentric perspectives / / edited by Carolina Aguerre, Malcolm Campbell-Verduyn, and Jan Aart Scholte
Pubbl/distr/stampa Taylor & Francis (Unlimited), 2024
Disciplina 303.48/34
Soggetto topico Data protection - International cooperation
Data protection - Government policy
ISBN 1-003-38841-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction : polycentric perspectives on digital data governance / Carolina Aguerre, Malcolm Campbell-Verduyn and Jan Aart Scholte -- Nudging the Ostroms' vision of the commons on polycentric governance into the digital environment / Anjanette H. Raymond and Scott Shackelford -- Internet interoperability and polycentric attributes in global digital data ordering / Carolina Aguerre -- The challenges of governance in a datascape : theorizing the role of non-extractive methodologies in the 2030 agenda / Isabel Rocha de Siqueira and Laís Ramalho -- Grassroots data activism and polycentric governance : perspectives from the margins / Daivi Rodima Taylor -- Questions as a device for data responsibility : making data science responsible by formulating questions in a polycentric way / Stefaan Verhulst -- Decentralized but coordinated : probing polycentricity in EU data protection crossborder enforcement / Wenlong Li and Dan Yang -- Trade agreements and cross-border disinformation : patchwork or polycentric? / Susan A. Aaronson -- Trackers and chased : governance challenges in disinformation datafication / Clara Iglesias Keller and Bruna Martins dos Santos -- Privacy governance from a polycentric perspective / Dmitry Epstein and Rotem Medzini -- Global data governance by internet interconnection / Nathalia Sautchuk Patrício -- The distributions of distributed governance : power, instability and complexity in polycentric data ordering / Malcolm Campbell-Verduyn -- Polycentric theory diffusion and AI governance / Janet Hui Xue -- Conclusion : the end of a beginning / Carolina Aguerre, Malcolm Campbell-Verduyn and Jan Aart Scholte.
Record Nr. UNINA-9910773615103321
Taylor & Francis (Unlimited), 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Protecting customer network proprietary information in the Internet age : hearing before the Subcommittee on Communications and Technology of the Committee on Energy and Commerce, House of Representatives, One Hundred Fifteenth Congress, second session, July 11, 2018
Protecting customer network proprietary information in the Internet age : hearing before the Subcommittee on Communications and Technology of the Committee on Energy and Commerce, House of Representatives, One Hundred Fifteenth Congress, second session, July 11, 2018
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2019
Descrizione fisica 1 online resource (iii, 91 pages) : illustrations
Soggetto topico Privacy, Right of - United States
Data protection - Government policy - United States
Telecommunication - Data processing - Moral and ethical aspects - United States
Telecommunication policy - United States
Consumer protection - United States
Consumer protection
Data protection - Government policy
Privacy, Right of
Telecommunication policy
Soggetto genere / forma Legislative hearings.
Rules.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Protecting Customer Network Proprietary Information in the Internet Age
Record Nr. UNINA-9910714350503321
Washington : , : U.S. Government Publishing Office, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
VA's longstanding information security weaknesses continue to allow extensive data manipulation : hearing before the Committee on Veterans' Affairs, U.S. House of Representatives, One Hundred Thirteenth Congress, second session, Tuesday, November 18, 2014
VA's longstanding information security weaknesses continue to allow extensive data manipulation : hearing before the Committee on Veterans' Affairs, U.S. House of Representatives, One Hundred Thirteenth Congress, second session, Tuesday, November 18, 2014
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2015
Descrizione fisica 1 online resource (iii, 64 pages)
Soggetto topico Data protection - Government policy - United States
Computer security - Government policy - United States
Computer security - Government policy
Data protection - Government policy
Information technology - Management
Soggetto genere / forma Legislative hearings.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti VA's longstanding information security weaknesses continue to allow extensive data manipulation
Record Nr. UNINA-9910704134803321
Washington : , : U.S. Government Publishing Office, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Weathering the storm : the role of private tech in the SolarWinds breach and ongoing campaign : joint hearing before the Committee on Oversight and Reform, U.S. House of Representatives, and the Committee on Homeland Security, U.S. House of Representatives, One Hundred Seventeenth Congress, first session, February 26, 2021
Weathering the storm : the role of private tech in the SolarWinds breach and ongoing campaign : joint hearing before the Committee on Oversight and Reform, U.S. House of Representatives, and the Committee on Homeland Security, U.S. House of Representatives, One Hundred Seventeenth Congress, first session, February 26, 2021
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2021
Descrizione fisica 1 online resource (v, 77 pages)
Soggetto topico Hacking - Russia (Federation)
Private security services - United States
Cyber intelligence (Computer security) - United States
Hacking - United States - Prevention
Data protection - Government policy - United States
Cyberterrorism - United States - Prevention
Cyber intelligence (Computer security)
Cyberterrorism - Prevention
Data protection - Government policy
Hacking
Private security services
Soggetto genere / forma Legislative hearings.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Weathering the storm
Record Nr. UNINA-9910716032903321
Washington : , : U.S. Government Publishing Office, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui