Jeżeli nie znalazłeś poszukiwanej książki, skontaktuj się z nami wypełniając formularz kontaktowy.

Ta strona używa plików cookies, by ułatwić korzystanie z serwisu. Mogą Państwo określić warunki przechowywania lub dostępu do plików cookies w swojej przeglądarce zgodnie z polityką prywatności.

Wydawcy

Literatura do programów

Informacje szczegółowe o książce

Cyber Security Policy Guidebook - ISBN 9781118027806

Cyber Security Policy Guidebook

ISBN 9781118027806

Autor: Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey Schmidt, Joseph Weiss

Wydawca: Wiley

Dostępność: 3-6 tygodni

Cena: 474,60 zł

Przed złożeniem zamówienia prosimy o kontakt mailowy celem potwierdzenia ceny.


ISBN13:      

9781118027806

ISBN10:      

1118027809

Autor:      

Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey Schmidt, Joseph Weiss

Oprawa:      

Hardback

Rok Wydania:      

2012-05-15

Ilość stron:      

288

Wymiary:      

246x199

Tematy:      

TJ

Drawing upon a wealth of experience from academia, industry, andgovernment service, Cyber Security Policy Guidebook detailsand dissects, in simple language, current organizational cybersecurity policy issues on a global scale taking great care toeducate readers on the history and current approaches to thesecurity of cyberspace. It includes thorough descriptions aswell as the pros and cons of a plethora of issues, anddocuments policy alternatives for the sake of clarity with respectto policy alone. The Guidebook also delves into organizationalimplementation issues, and equips readers with descriptions of thepositive and negative impact of specific policy choices.

Inside are detailed chapters that:

Explain what is meant by cyber security and cyber securitypolicy

Discuss the process by which cyber security policy goals areset

Educate the reader on decision–making processes related to cybersecurity

Describe a new framework and taxonomy for explaining cybersecurity policy issues

Show how the U.S. government is dealing with cyber securitypolicy issues

With a glossary that puts cyber security language in layman′sterms and diagrams that help explain complextopics Cyber Security Policy Guidebook gives students,scholars, and technical decision–makers the necessary knowledge tomake informed decisions on cyber security policy.



Foreword ix

Preface xi

Acknowledgments xv

1 Introduction 1

1.1 What Is Cyber Security? 1

1.2 What Is Cyber Security Policy? 3

1.3 Domains of Cyber Security Policy 7

1.3.1 Laws and Regulations 7

1.3.2 Enterprise Policy 9

1.3.3 Technology Operations 10

1.3.4 Technology Configuration 10

1.4 Strategy versus Policy 11

2 Cyber Security Evolution 15

2.1 Productivity 15

2.2 Internet 21

2.3 e–Commerce 28

2.4 Countermeasures 34

2.5 Challenges 37

3 Cyber Security Objectives 39

3.1 Cyber Security Metrics 40

3.2 Security Management Goals 45

3.3 Counting Vulnerabilities 49

3.4 Security Frameworks 51

3.4.1 e–Commerce Systems 52

3.4.2 Industrial Control Systems 57

3.4.3 Personal Mobile Devices 62

3.5 Security Policy Objectives 67

4 Guidance for Decision Makers 69

4.1 Tone at the Top 69

4.2 Policy as a Project 71

4.3 Cyber Security Management 73

4.3.1 Arriving at Goals 74

4.3.2 Cyber Security Documentation 77

4.4 Using the Catalog 79

5 The Catalog Approach 83

5.1 Catalog Format 87

5.2 Cyber Security Policy Taxonomy 89

6 Cyber Security Policy Catalog 93

6.1 Cyber Governance Issues 94

6.1.1 Net Neutrality 95

6.1.2 Internet Names and Numbers 96

6.1.3 Copyrights and Trademarks 103

6.1.4 Email and Messaging 107

6.2 Cyber User Issues 112

6.2.1 Malvertising 116

6.2.2 Impersonation 117

6.2.3 Appropriate Use 121

6.2.4 Cyber Crime 125

6.2.5 Geolocation 136

6.2.6 Privacy 138

6.3 Cyber Conflict Issues 140

6.3.1 Intellectual Property Theft 144

6.3.2 Cyber Espionage 145

6.3.3 Cyber Sabotage 150

6.3.4 Cyber Warfare 150

6.4 Cyber Management Issues 155

6.4.1 Fiduciary Responsibility 162

6.4.2 Risk Management 163

6.4.3 Professional Certification 171

6.4.4 Supply Chain 172

6.4.5 Security Principles 175

6.4.6 Research and Development 185

6.5 Cyber Infrastructure Issues 186

6.5.1 Banking and Finance 190

6.5.2 Health Care 194

6.5.3 Industrial Control Systems 197

7 One Government s Approach to Cyber Security Policy211

7.1 U.S. Federal Cyber Security Strategy 211

7.2 A Brief History of Cyber Security Public Policy Developmentin the U.S. Federal Government 212

7.2.1 The Bombing of New York′s World Trade Center on February26, 1993 212

7.2.2 Cyber Attacks against the United States Air Force,March May 1994: Targeting the Pentagon 213

7.2.3 The Citibank Caper, June October, 1994: How to Catcha Hacker 214

7.2.4 Murrah Federal Building, Oklahoma City April 19,1995: Major Terrorism Events and Their U.S. Outcomes 215

7.2.5 President s Commission on Critical InfrastructureProtection 1996 216

7.2.6 Presidential Decision Directive 63 1998 218

7.2.7 National Infrastructure Protection Center (NIPC) andISACs 1998 219

7.2.8 Eligible Receiver 1997 219

7.2.9 Solar Sunrise 1998 220

7.2.10 Joint Task Force Computer Network Defense(JTF–CND) 1998 221

7.2.11 Terrorist Attacks against the UnitedStates September 11, 2001 Effects of Catastrophic Events onTransportation System Management and Operations 222

7.2.12 U.S. Government Response to the September 11, 2001Terrorist Attacks 224

7.2.13 Homeland Security Presidential Directives 226

7.2.14 National Strategies 227

7.3 The Rise of Cyber Crime 230

7.4 Espionage and Nation–State Actions 232

7.5 Policy Response to Growing Espionage Threats: U.S. CyberCommand 233

7.6 Congressional Action 235

7.7 Summary 236

8 Conclusion 239

Glossary 243

References 255

Index 267



Dr. Jennifer L. Bayuk is an independent cyber security consultant and industry professor at Stevens Institute of Technology in Hoboken, New Jersey.

Jason Healey runs the Cyber Statecraft Initiative at the Atlantic Council in Washington, DC.

Dr. Paul Rohmeyer directs the Technology Information Management program at Stevens Institute of Technology in Hoboken, New Jersey.

Marcus H. Sachs is the Vice President for National Security Policy at Verizon Communications.

Jeffrey Schmidt is a cyber security technology entrepreneur.

Joseph Weiss is an industrial control system cyber security author and consultant.



This very readable and organized guidebook equips readerswith a consistent methodology for turning their answers to thosequestions into cyber security policy.   (ComputingReviews, 24 April 2013)

Koszyk

Książek w koszyku: 0 szt.

Wartość zakupów: 0,00 zł

ebooks
covid

Kontakt

Gambit
Centrum Oprogramowania
i Szkoleń Sp. z o.o.

Al. Pokoju 29b/22-24

31-564 Kraków


Siedziba Księgarni

ul. Kordylewskiego 1

31-542 Kraków

+48 12 410 5991

+48 12 410 5987

+48 12 410 5989

Zobacz na mapie google

Wyślij e-mail

Subskrypcje

Administratorem danych osobowych jest firma Gambit COiS Sp. z o.o. Na podany adres będzie wysyłany wyłącznie biuletyn informacyjny.

Autoryzacja płatności

PayU

Informacje na temat autoryzacji płatności poprzez PayU.

PayU banki

© Copyright 2012: GAMBIT COiS Sp. z o.o. Wszelkie prawa zastrzeżone.

Projekt i wykonanie: Alchemia Studio Reklamy