The Resource CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity enviroment, Julie E. Mehan

CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity enviroment, Julie E. Mehan

Label
CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity enviroment
Title
CyberWar, CyberTerror, CyberCrime and CyberActivism
Title remainder
an in-depth guide to the role of standards in cybersecurity enviroment
Statement of responsibility
Julie E. Mehan
Creator
Contributor
Provider
Subject
Language
eng
Summary
This book encourages cybersecurity professionals to take a wider view of what cybersecurity means, and to make the most of international standards and best practice to create a culture of cybersecurity awareness that complements technology-based defenses. This second edition analyzes the changing threats in the cyber landscape, and includes an updated body of knowledge that describes how to acquire, develop, and sustain a secure information environment that goes beyond technology and how to create a cyber-aware organizational culture that is more robust and better able to deal with a wider range of threats. --
Assigning source
Edited summary from book
Cataloging source
UMI
http://library.link/vocab/creatorName
Mehan, Julie E
Illustrations
illustrations
Index
index present
LC call number
HV6773
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
JSTOR
http://library.link/vocab/subjectName
  • Computer security
  • Hacking
  • Electronics in military engineering
  • Computer security
  • Hacking
  • Electronics in military engineering
  • COMPUTERS
  • Computer security
  • Electronics in military engineering
  • Hacking
  • Computer security
  • Hacking
  • Electronics in military engineering
Label
CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity enviroment, Julie E. Mehan
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Cover; Title; Copyright; Preface; About the Author; Contents; Introduction; Chapter 1: Technology Is a Double-Edged Sword; From the printing press to the information age; The ''dark side of high tech''; Chapter 2: Cyber Attack: It''s A Dangerous World for Information Systems; Cyberwar; Cyberterror; Cybercrime; CyberEspionage (and Information Exfiltration) -- It''s midnight; do you know where your data is?; Social Media -- an opportunity and a challenge; Supply Chain (In- ) security; The blended threat; The asymmetric effects of cyber attacks; Porous perimeters, compromisable software -- or both?
  • If we know about the vulnerabilities, why are exploits still successful?Chapter 3: The Human Factor: The Underrated Threat; Are people the problem?; Who are the attackers?; Most likely forms of attack; Sometimes it''s just human error; People can also be the solution!; Chapter 4: Transition from an Environment of ''FUD'' to a Standards-Based Environment; Chapter 5: Establishing a Culture of Cybersecurity; Chapter 6: Increasing Internationalism: Governance, Laws, and Ethics; Information globalism equals increased exposure; Following the lead of good governance; The proliferation of laws
  • Ethics in an information society and a minimum standard of due care in cybersecurityCybersecurity and privacy; Chapter 7: Standards: What Are They and Why Should We Care?; What are standards?; How and by whom are standards developed?; The importance of terminology; Standards-based process improvement; Focus on consensus-based cybersecurity; Standards provide a level playing-field for co-ordination and co-operation; If standards are so good, then why is it so hard?; Chapter 8: From Reaction to Proaction: Applying Standards in an Environment of Change and Danger
  • Moving beyond compliance and reactionA quick look at relevant standards; Take four steps forward; The future is ''ROSI''; Making the case for cybersecurity assurance; Chapter 9: Conclusion: Where Do We Go From Here?; Cybersecurity program roadmap; Appendix 1: Gap Analysis Areas of Interest; Appendix 2: Standards Crosswalk; Definitions; Acronyms; Index; A; B; C; D; E; F; G; H; I; J; K; L; M; N; O; P; Q; R; S; T; U; V; W; X; Y; ITG Resources
Dimensions
unknown
Edition
2nd ed.
Extent
1 online resource (1 volume)
Form of item
online
Isbn
9781849285728
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other physical details
illustrations
Sound
unknown sound
Specific material designation
remote
Stock number
  • CL0500000466
  • 22573/ctt7z4f4c
  • F64A6000-ECF8-4944-9F65-EF5E8314D43F
System control number
  • (OCoLC)888035950
  • (OCoLC)ocn888035950
Label
CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity enviroment, Julie E. Mehan
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Cover; Title; Copyright; Preface; About the Author; Contents; Introduction; Chapter 1: Technology Is a Double-Edged Sword; From the printing press to the information age; The ''dark side of high tech''; Chapter 2: Cyber Attack: It''s A Dangerous World for Information Systems; Cyberwar; Cyberterror; Cybercrime; CyberEspionage (and Information Exfiltration) -- It''s midnight; do you know where your data is?; Social Media -- an opportunity and a challenge; Supply Chain (In- ) security; The blended threat; The asymmetric effects of cyber attacks; Porous perimeters, compromisable software -- or both?
  • If we know about the vulnerabilities, why are exploits still successful?Chapter 3: The Human Factor: The Underrated Threat; Are people the problem?; Who are the attackers?; Most likely forms of attack; Sometimes it''s just human error; People can also be the solution!; Chapter 4: Transition from an Environment of ''FUD'' to a Standards-Based Environment; Chapter 5: Establishing a Culture of Cybersecurity; Chapter 6: Increasing Internationalism: Governance, Laws, and Ethics; Information globalism equals increased exposure; Following the lead of good governance; The proliferation of laws
  • Ethics in an information society and a minimum standard of due care in cybersecurityCybersecurity and privacy; Chapter 7: Standards: What Are They and Why Should We Care?; What are standards?; How and by whom are standards developed?; The importance of terminology; Standards-based process improvement; Focus on consensus-based cybersecurity; Standards provide a level playing-field for co-ordination and co-operation; If standards are so good, then why is it so hard?; Chapter 8: From Reaction to Proaction: Applying Standards in an Environment of Change and Danger
  • Moving beyond compliance and reactionA quick look at relevant standards; Take four steps forward; The future is ''ROSI''; Making the case for cybersecurity assurance; Chapter 9: Conclusion: Where Do We Go From Here?; Cybersecurity program roadmap; Appendix 1: Gap Analysis Areas of Interest; Appendix 2: Standards Crosswalk; Definitions; Acronyms; Index; A; B; C; D; E; F; G; H; I; J; K; L; M; N; O; P; Q; R; S; T; U; V; W; X; Y; ITG Resources
Dimensions
unknown
Edition
2nd ed.
Extent
1 online resource (1 volume)
Form of item
online
Isbn
9781849285728
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other physical details
illustrations
Sound
unknown sound
Specific material designation
remote
Stock number
  • CL0500000466
  • 22573/ctt7z4f4c
  • F64A6000-ECF8-4944-9F65-EF5E8314D43F
System control number
  • (OCoLC)888035950
  • (OCoLC)ocn888035950

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...