Cyber security policy guidebook [[electronic resource] /] / Jennifer L. Bayuk ... [et al.] |
Edizione | [First edition] |
Pubbl/distr/stampa | Hoboken, N.J., : Wiley, c2012 |
Descrizione fisica | 1 online resource (xvi, 270 pages) : illustrations |
Disciplina | 005.8 |
Altri autori (Persone) | BayukJennifer L |
Soggetto topico |
Information technology - Government policy
Computer security - Government policy Data protection - Government policy |
ISBN |
1-299-18932-6
1-118-24132-0 1-118-24153-3 1-118-24148-7 |
Classificazione | COM053000 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cyber Security Policy Guidebook; Contents; Foreword; Preface; Acknowledgments; 1: Introduction; 1.1 What Is Cyber Security?; 1.2 What Is Cyber Security Policy?; 1.3 Domains of Cyber Security Policy; 1.3.1 Laws and Regulations; 1.3.2 Enterprise Policy; 1.3.3 Technology Operations; 1.3.4 Technology Configuration; 1.4 Strategy versus Policy; 2: Cyber Security Evolution; 2.1 Productivity; 2.2 Internet; 2.3 e-Commerce; 2.4 Countermeasures; 2.5 Challenges; 3: Cyber Security Objectives; 3.1 Cyber Security Metrics; 3.2 Security Management Goals; 3.3 Counting Vulnerabilities; 3.4 Security Frameworks
3.4.1 e-Commerce Systems3.4.2 Industrial Control Systems; 3.4.3 Personal Mobile Devices; 3.5 Security Policy Objectives; 4: Guidance for Decision Makers; 4.1 Tone at the Top; 4.2 Policy as a Project; 4.3 Cyber Security Management; 4.3.1 Arriving at Goals; 4.3.2 Cyber Security Documentation; 4.4 Using the Catalog; 5: The Catalog Approach; 5.1 Catalog Format; 5.2 Cyber Security Policy Taxonomy; 6: Cyber Security Policy Catalog; 6.1 Cyber Governance Issues; 6.1.1 Net Neutrality; 6.1.2 Internet Names and Numbers; 6.1.3 Copyrights and Trademarks; 6.1.4 Email and Messaging; 6.2 Cyber User Issues 6.2.1 Malvertising6.2.2 Impersonation; 6.2.3 Appropriate Use; 6.2.4 Cyber Crime; 6.2.5 Geolocation; 6.2.6 Privacy; 6.3 Cyber Conflict Issues; 6.3.1 Intellectual Property Theft; 6.3.2 Cyber Espionage; 6.3.3 Cyber Sabotage; 6.3.4 Cyber Warfare; 6.4 Cyber Management Issues; 6.4.1 Fiduciary Responsibility; 6.4.2 Risk Management; 6.4.3 Professional Certification; 6.4.4 Supply Chain; 6.4.5 Security Principles; 6.4.6 Research and Development; 6.5 Cyber Infrastructure Issues; 6.5.1 Banking and Finance; 6.5.2 Health Care; 6.5.3 Industrial Control Systems 7: One Government's Approach to Cyber Security Policy7.1 U.S. Federal Cyber Security Strategy; 7.2 A Brief History of Cyber Security Public Policy Development in the U.S. Federal Government; 7.2.1 The Bombing of New York's World Trade Center on February 26, 1993; 7.2.2 Cyber Attacks against the United States Air Force, March-May 1994: Targeting the Pentagon; 7.2.3 The Citibank Caper, June-October, 1994: How to Catch a Hacker; 7.2.4 Murrah Federal Building, Oklahoma City-April 19, 1995: Major Terrorism Events and Their U.S. Outcomes 7.2.5 President's Commission on Critical Infrastructure Protection-19967.2.6 Presidential Decision Directive 63-1998; 7.2.7 National Infrastructure Protection Center (NIPC) and ISACs-1998; 7.2.8 Eligible Receiver-1997; 7.2.9 Solar Sunrise-1998; 7.2.10 Joint Task Force-Computer Network Defense (JTF-CND)-1998; 7.2.11 Terrorist Attacks against the United States-September 11, 2001 Effects of Catastrophic Events on Transportation System Management and Operations; 7.2.12 U.S. Government Response to the September 11, 2001 Terrorist Attacks; 7.2.13 Homeland Security Presidential Directives 7.2.14 National Strategies |
Record Nr. | UNINA-9910141299203321 |
Hoboken, N.J., : Wiley, c2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber security policy guidebook / / Jennifer L. Bayuk ... [et al.] |
Edizione | [First edition] |
Pubbl/distr/stampa | Hoboken, N.J., : Wiley, c2012 |
Descrizione fisica | 1 online resource (xvi, 270 pages) : illustrations |
Disciplina | 005.8 |
Altri autori (Persone) | BayukJennifer L |
Soggetto topico |
Information technology - Government policy
Computer security - Government policy Data protection - Government policy |
ISBN |
9781299189324
1299189326 9781118241325 1118241320 9781118241530 1118241533 9781118241486 1118241487 |
Classificazione | COM053000 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cyber Security Policy Guidebook; Contents; Foreword; Preface; Acknowledgments; 1: Introduction; 1.1 What Is Cyber Security?; 1.2 What Is Cyber Security Policy?; 1.3 Domains of Cyber Security Policy; 1.3.1 Laws and Regulations; 1.3.2 Enterprise Policy; 1.3.3 Technology Operations; 1.3.4 Technology Configuration; 1.4 Strategy versus Policy; 2: Cyber Security Evolution; 2.1 Productivity; 2.2 Internet; 2.3 e-Commerce; 2.4 Countermeasures; 2.5 Challenges; 3: Cyber Security Objectives; 3.1 Cyber Security Metrics; 3.2 Security Management Goals; 3.3 Counting Vulnerabilities; 3.4 Security Frameworks
3.4.1 e-Commerce Systems3.4.2 Industrial Control Systems; 3.4.3 Personal Mobile Devices; 3.5 Security Policy Objectives; 4: Guidance for Decision Makers; 4.1 Tone at the Top; 4.2 Policy as a Project; 4.3 Cyber Security Management; 4.3.1 Arriving at Goals; 4.3.2 Cyber Security Documentation; 4.4 Using the Catalog; 5: The Catalog Approach; 5.1 Catalog Format; 5.2 Cyber Security Policy Taxonomy; 6: Cyber Security Policy Catalog; 6.1 Cyber Governance Issues; 6.1.1 Net Neutrality; 6.1.2 Internet Names and Numbers; 6.1.3 Copyrights and Trademarks; 6.1.4 Email and Messaging; 6.2 Cyber User Issues 6.2.1 Malvertising6.2.2 Impersonation; 6.2.3 Appropriate Use; 6.2.4 Cyber Crime; 6.2.5 Geolocation; 6.2.6 Privacy; 6.3 Cyber Conflict Issues; 6.3.1 Intellectual Property Theft; 6.3.2 Cyber Espionage; 6.3.3 Cyber Sabotage; 6.3.4 Cyber Warfare; 6.4 Cyber Management Issues; 6.4.1 Fiduciary Responsibility; 6.4.2 Risk Management; 6.4.3 Professional Certification; 6.4.4 Supply Chain; 6.4.5 Security Principles; 6.4.6 Research and Development; 6.5 Cyber Infrastructure Issues; 6.5.1 Banking and Finance; 6.5.2 Health Care; 6.5.3 Industrial Control Systems 7: One Government's Approach to Cyber Security Policy7.1 U.S. Federal Cyber Security Strategy; 7.2 A Brief History of Cyber Security Public Policy Development in the U.S. Federal Government; 7.2.1 The Bombing of New York's World Trade Center on February 26, 1993; 7.2.2 Cyber Attacks against the United States Air Force, March-May 1994: Targeting the Pentagon; 7.2.3 The Citibank Caper, June-October, 1994: How to Catch a Hacker; 7.2.4 Murrah Federal Building, Oklahoma City-April 19, 1995: Major Terrorism Events and Their U.S. Outcomes 7.2.5 President's Commission on Critical Infrastructure Protection-19967.2.6 Presidential Decision Directive 63-1998; 7.2.7 National Infrastructure Protection Center (NIPC) and ISACs-1998; 7.2.8 Eligible Receiver-1997; 7.2.9 Solar Sunrise-1998; 7.2.10 Joint Task Force-Computer Network Defense (JTF-CND)-1998; 7.2.11 Terrorist Attacks against the United States-September 11, 2001 Effects of Catastrophic Events on Transportation System Management and Operations; 7.2.12 U.S. Government Response to the September 11, 2001 Terrorist Attacks; 7.2.13 Homeland Security Presidential Directives 7.2.14 National Strategies |
Record Nr. | UNINA-9910825352603321 |
Hoboken, N.J., : Wiley, c2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity regulation harmonization : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Fifteenth Congress, first session, June 21, 2017 |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2018 |
Descrizione fisica | 1 online resource (iii, 117 pages) : illustrations |
Collana | S. hrg. |
Soggetto topico |
Computer networks - Security measures - United States
Cyberspace - Security measures - United States Computer security - Law and legislation - United States Data protection - Government policy - United States Cyberterrorism - United States - Prevention Cyberinfrastructure - Security measures - United States Computer networks - Security measures Computer security - Law and legislation Cyberterrorism - Prevention Data protection - Government policy |
Soggetto genere / forma | Legislative hearings. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Cybersecurity regulation harmonization |
Record Nr. | UNINA-9910711345003321 |
Washington : , : U.S. Government Publishing Office, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Data stored abroad : ensuring lawful access and privacy protection in the digital era : hearing before the Committee on the Judiciary, House of Representatives, One Hundred Fifteenth Congress, first session, June 15, 2017 |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2018 |
Descrizione fisica | 1 online resource (iii, 64 pages) |
Soggetto topico |
Data protection - Government policy - United States
Disclosure of information - Government policy - United States Disclosure of information - International cooperation Conflict of laws - Data protection - United States Privacy, Right of - United States Conflict of laws - Data protection Data protection - Government policy Disclosure of information - Government policy Privacy, Right of |
Soggetto genere / forma | Legislative hearings. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Data stored abroad |
Record Nr. | UNINA-9910711598203321 |
Washington : , : U.S. Government Publishing Office, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Examining the Consumer Financial Protection Bureau's mass data collection program : hearing before the Subcommittee on Oversight and Investigations of the Committee on Financial Services, U.S. House of Representatives, One Hundred Fourteenth Congress, first session, December 16, 2015 |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2016 |
Descrizione fisica | 1 online resource (v, 79 pages) |
Soggetto topico |
Financial services industry - United States
Data protection - Government policy - United States Data protection - Government policy Electronic data processing Financial services industry |
Soggetto genere / forma |
Legislative hearings.
Records and correspondence |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Examining the Consumer Financial Protection Bureau's mass data collection program |
Record Nr. | UNINA-9910707806203321 |
Washington : , : U.S. Government Publishing Office, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
GAO high risk focus : cybersecurity : joint hearing before the Subcommittee on Information Technology and the Subcommittee on Government Operations of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Fifteenth Congress, second session, July 25, 2018 |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2018 |
Descrizione fisica | 1 online resource (v, 81 pages) : illustrations |
Soggetto topico |
Administrative agencies - Computer networks - Security measures - United States
Infrastructure (Economics) - Computer networks - Security measures - United States Cyberinfrastructure - Government policy - United States Data protection - Government policy - United States Computer crimes - United States - Prevention Computer crimes - Prevention Data protection - Government policy |
Soggetto genere / forma | Legislative hearings. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | GAO high risk focus |
Record Nr. | UNINA-9910711627403321 |
Washington : , : U.S. Government Publishing Office, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Global digital data governance : Polycentric perspectives. / / Carolina Aguerre |
Autore | Aguerre Carolina |
Descrizione fisica | 1 online resource |
Disciplina | 303.48/34 |
Collana | Routledge Global Cooperation Series. |
Soggetto topico |
Data protection - International cooperation
Data protection - Government policy |
ISBN |
1-003-85976-3
1-003-38841-8 |
Classificazione | COM060000COM060040POL040020 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction : polycentric perspectives on digital data governance / Carolina Aguerre, Malcolm Campbell-Verduyn and Jan Aart Scholte -- Nudging the Ostroms' vision of the commons on polycentric governance into the digital environment / Anjanette H. Raymond and Scott Shackelford -- Internet interoperability and polycentric attributes in global digital data ordering / Carolina Aguerre -- The challenges of governance in a datascape : theorizing the role of non-extractive methodologies in the 2030 agenda / Isabel Rocha de Siqueira and Laís Ramalho -- Grassroots data activism and polycentric governance : perspectives from the margins / Daivi Rodima Taylor -- Questions as a device for data responsibility : making data science responsible by formulating questions in a polycentric way / Stefaan Verhulst -- Decentralized but coordinated : probing polycentricity in EU data protection crossborder enforcement / Wenlong Li and Dan Yang -- Trade agreements and cross-border disinformation : patchwork or polycentric? / Susan A. Aaronson -- Trackers and chased : governance challenges in disinformation datafication / Clara Iglesias Keller and Bruna Martins dos Santos -- Privacy governance from a polycentric perspective / Dmitry Epstein and Rotem Medzini -- Global data governance by internet interconnection / Nathalia Sautchuk Patrício -- The distributions of distributed governance : power, instability and complexity in polycentric data ordering / Malcolm Campbell-Verduyn -- Polycentric theory diffusion and AI governance / Janet Hui Xue -- Conclusion : the end of a beginning / Carolina Aguerre, Malcolm Campbell-Verduyn and Jan Aart Scholte. |
Record Nr. | UNINA-9910773615103321 |
Aguerre Carolina | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Protecting customer network proprietary information in the Internet age : hearing before the Subcommittee on Communications and Technology of the Committee on Energy and Commerce, House of Representatives, One Hundred Fifteenth Congress, second session, July 11, 2018 |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2019 |
Descrizione fisica | 1 online resource (iii, 91 pages) : illustrations |
Soggetto topico |
Privacy, Right of - United States
Data protection - Government policy - United States Telecommunication - Data processing - Moral and ethical aspects - United States Telecommunication policy - United States Consumer protection - United States Consumer protection Data protection - Government policy Privacy, Right of Telecommunication policy |
Soggetto genere / forma |
Legislative hearings.
Rules. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Protecting Customer Network Proprietary Information in the Internet Age |
Record Nr. | UNINA-9910714350503321 |
Washington : , : U.S. Government Publishing Office, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
VA's longstanding information security weaknesses continue to allow extensive data manipulation : hearing before the Committee on Veterans' Affairs, U.S. House of Representatives, One Hundred Thirteenth Congress, second session, Tuesday, November 18, 2014 |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2015 |
Descrizione fisica | 1 online resource (iii, 64 pages) |
Soggetto topico |
Data protection - Government policy - United States
Computer security - Government policy - United States Computer security - Government policy Data protection - Government policy Information technology - Management |
Soggetto genere / forma | Legislative hearings. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | VA's longstanding information security weaknesses continue to allow extensive data manipulation |
Record Nr. | UNINA-9910704134803321 |
Washington : , : U.S. Government Publishing Office, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Weathering the storm : the role of private tech in the SolarWinds breach and ongoing campaign : joint hearing before the Committee on Oversight and Reform, U.S. House of Representatives, and the Committee on Homeland Security, U.S. House of Representatives, One Hundred Seventeenth Congress, first session, February 26, 2021 |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2021 |
Descrizione fisica | 1 online resource (v, 77 pages) |
Soggetto topico |
Hacking - Russia (Federation)
Private security services - United States Cyber intelligence (Computer security) - United States Hacking - United States - Prevention Data protection - Government policy - United States Cyberterrorism - United States - Prevention Cyber intelligence (Computer security) Cyberterrorism - Prevention Data protection - Government policy Hacking Private security services |
Soggetto genere / forma | Legislative hearings. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Weathering the storm |
Record Nr. | UNINA-9910716032903321 |
Washington : , : U.S. Government Publishing Office, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|