feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Hoboken, N.J. :Wiley,
    UID:
    almafu_9959327850202883
    Format: 1 online resource (xvi, 270 pages) : , illustrations
    ISBN: 9781118241530 , 1118241533 , 9781299189324 , 1299189326 , 9781118241486 , 1118241487 , 9781118241325 , 1118241320
    Content: "Drawing upon a wealth of experience from academia, industry, and government service, this book details and dissects current organizational cybersecurity policy issues on a global scale. Using simple language, it includes a thorough description of each issue, lists pros and cons, documents policy alternatives for the sake of clarity with respect to policy alone, and dives into organizational implementation issues. It also equips the reader with descriptions of the impact of specific policy choices, both positive and negative. This book gives students, scholars, and technical decision-makers the necessary knowledge of cybersecurity policy in order to make more informed decisions"--Provided by publisher.
    Content: "This book is a taxonomy and thesaurus of current cybersecurity policy issues, including a thorough description of each issue and a corresponding list of pros and cons with respect to identified stances on each issue"--Provided by publisher.
    Note: Frontmatter -- Introduction -- Cyber Security Evolution -- Cyber Security Objectives -- Guidance for Decision Makers -- The Catalog Approach -- Cyber Security Policy Catalog -- One Government's Approach to Cyber Security Policy -- Conclusion -- Glossary -- References -- Index.
    Additional Edition: Print version: Cyber security policy guidebook. Hoboken, N.J. : Wiley, ©2012 ISBN 9781118027806
    Language: English
    Keywords: Electronic books. ; Ressources internet. ; Electronic books. ; Ressources internet.
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9948104407302882
    Format: XXI, 259 p. 48 illus. , online resource.
    ISBN: 9781484241943
    Content: Understand critical cybersecurity and risk perspectives, insights, and tools for the leaders of complex financial systems and markets. This book offers guidance for decision makers and helps establish a framework for communication between cyber leaders and front-line professionals. Information is provided to help in the analysis of cyber challenges and choosing between risk treatment options. Financial cybersecurity is a complex, systemic risk challenge that includes technological and operational elements. The interconnectedness of financial systems and markets creates dynamic, high-risk environments where organizational security is greatly impacted by the level of security effectiveness of partners, counterparties, and other external organizations. The result is a high-risk environment with a growing need for cooperation between enterprises that are otherwise direct competitors. There is a new normal of continuous attack pressures that produce unprecedented enterprise threats that must be met with an array of countermeasures. Financial Cybersecurity Risk Management explores a range of cybersecurity topics impacting financial enterprises. This includes the threat and vulnerability landscape confronting the financial sector, risk assessment practices and methodologies, and cybersecurity data analytics. Governance perspectives, including executive and board considerations, are analyzed as are the appropriate control measures and executive risk reporting. What You’ll Learn: Analyze the threat and vulnerability landscape confronting the financial sector Implement effective technology risk assessment practices and methodologies Craft strategies to treat observed risks in financial systems Improve the effectiveness of enterprise cybersecurity capabilities Evaluate critical aspects of cybersecurity governance, including executive and board oversight Identify significant cybersecurity operational challenges Consider the impact of the cybersecurity mission across the enterprise Leverage cybersecurity regulatory and industry standards to help manage financial services risks Use cybersecurity scenarios to measure systemic risks in financial systems environments Apply key experiences from actual cybersecurity events to develop more robust cybersecurity architectures.
    Note: Chapter 1: What Are We Afraid Of? -- Chapter 2: Where Are We Vulnerable? -- Chapter 3: What Would a Breach Cost Us? -- Chapter 4: What Are the Odds? -- Chapter 5: So What Can We Do? -- Chapter 6: How Do I Manage This? -- Chapter 7: Should This Involve the Whole Organization? -- Chapter 8: How Can We Improve Our Capabilities? -- Chapter 9: What Can We Learn from Losses? -- Chapter 10: So What’s Next?.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9781484241936
    Additional Edition: Printed edition: ISBN 9781484241950
    Additional Edition: Printed edition: ISBN 9781484247716
    Language: English
    Subjects: Computer Science , Economics
    RVK:
    RVK:
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Hoboken, New Jersey :John Wiley & Sons, Inc.,
    UID:
    almafu_9961517828002883
    Format: 1 online resource
    ISBN: 9781394213986 , 1394213980 , 1394213964 , 9781394213962 , 9781394213979 , 1394213972
    Content: Stepping Through Cybersecurity Risk Management Authoritative resource delivering the professional practice of cybersecurity from the perspective of enterprise governance and risk management. Stepping Through Cybersecurity Risk Management covers the professional practice of cybersecurity from the perspective of enterprise governance and risk management. It describes the state of the art in cybersecurity risk identification, classification, measurement, remediation, monitoring and reporting. It includes industry standard techniques for examining cybersecurity threat actors, cybersecurity attacks in the context of cybersecurity-related events, technology controls, cybersecurity measures and metrics, cybersecurity issue tracking and analysis, and risk and control assessments. The text provides precise definitions for information relevant to cybersecurity management decisions and recommendations for collecting and consolidating that information in the service of enterprise risk management. The objective is to enable the reader to recognize, understand, and apply risk-relevant information to the analysis, evaluation, and mitigation of cybersecurity risk. A well-rounded resource, the text describes both reports and studies that improve cybersecurity decision support. Composed of 10 chapters, the author provides learning objectives, exercises and quiz questions per chapter in an appendix, with quiz answers and exercise grading criteria available to professors. Written by a highly qualified professional with significant experience in the field, Stepping Through Cybersecurity Risk Management includes information on: Threat actors and networks, attack vectors, event sources, security operations, and CISO risk evaluation criteria with respect to this activity Control process, policy, standard, procedures, automation, and guidelines, along with risk and control self assessment and compliance with regulatory standards Cybersecurity measures and metrics, and corresponding key risk indicators The role of humans in security, including the "three lines of defense" approach, auditing, and overall human risk management Risk appetite, tolerance, and categories, and analysis of alternative security approaches via reports and studies Providing comprehensive coverage on the topic of cybersecurity through the unique lens of perspective of enterprise governance and risk management, Stepping Through Cybersecurity Risk Management is an essential resource for professionals engaged in compliance with diverse business risk appetites, as well as regulatory requirements such as FFIEC, HIIPAA, and GDPR, as well as a comprehensive primer for those new to the field. A complimentary forward by Professor Gene Spafford explains why "This book will be helpful to the newcomer as well as to the hierophants in the C-suite. The newcomer can read this to understand general principles and terms. The C-suite occupants can use the material as a guide to check that their understanding encompasses all it should.".
    Note: Foreword ix -- Preface xiii -- Acknowledgements xxv -- About the Companion Website xxvii -- 1 Framework Elements 1 -- References 16 -- 2 Threats 17 -- 2.1 Threat Actors 17 -- 2.1.1 Hackivists 22 -- 2.1.2 Insiders 23 -- 2.1.3 Hacker 26 -- 2.1.4 Competitors 29 -- 2.1.5 Lone Wolf 33 -- 2.2 Threat Networks 33 -- 2.2.1 Example: Identity Theft 34 -- 2.2.2 Zero-Day Threats 35 -- 2.3 Threat Vectors 37 -- References 44 -- 3 Events 47 -- 3.1 Event Classification 50 -- 3.2 Event Prevention 56 -- 3.3 Detection and Response 65 -- 3.4 Event Scenarios 77 -- References 87 -- 4 Controls 89 -- 4.1 Risk Appetite 91 -- 4.2 Policy 94 -- 4.2.1 Security Principles 96 -- 4.2.2 Formality 102 -- 4.3 Process 106 -- 4.4 Standards 114 -- 4.4.1 Internal Standards 114 -- 4.4.2 External Standards 116 -- 4.4.3 Security Architecture 123 -- 4.5 Procedures 130 -- 4.6 Guidelines 136 -- References 140 -- 5 Assessments 143 -- 5.1 Standards Adherence 147 -- 5.2 Risk and Control Self Assessment 154 -- 5.3 Pentests and Vulnscans 160 -- 5.4 Audits 165 -- 5.5 Spot Checks 169 -- References 172 -- 6 Issues 173 -- 6.1 Issue Identification 174 -- 6.2 Classification 177 -- 6.3 Criteria and Remediation 180 -- References 183 -- 7 Metrics 185 -- 7.1 Measuring Cybersecurity 186 -- 7.2 From Measures to Metrics 189 -- 7.3 Key Risk Indicators 205 -- References 216 -- 8 People 217 -- 8.1 Three Lines of Defense 217 -- 8.2 The Cybersecurity Team 224 -- 8.3 Enterprise Management 230 -- 8.4 Framework Element Owners 233 -- References 235 -- 9 Risks 237 -- 9.1 Risk Categories 239 -- 9.2 Risk Treatment 242 -- 9.2.1 Controls 242 -- 9.2.2 Transfer 242 -- 9.2.3 Avoidance 245 -- 9.2.4 Acceptance 245 -- 9.3 Risk Appetite 250 -- 9.4 Risk Tolerance 255 -- 9.5 Probability Measurement 260 -- References 266 -- 10 Analysis 269 -- 10.1 Reports and Studies 269 -- 10.2 Safety Analogies 275 -- 10.3 Decision Support 278 -- 10.4 Conclusion 280 -- References 282 -- Appendix: Exercises in FrameCyber 283 -- Index 299.
    Additional Edition: Print version: ISBN 1394213956
    Additional Edition: ISBN 9781394213955
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Santa Barbara, Calif : Praeger | London : Bloomsbury Publishing (UK)
    UID:
    gbv_1883206162
    Format: 1 Online-Ressource (xi, 165 p) , ill , cm
    ISBN: 9798400646492
    Note: Includes bibliographical references and index , Tone at the top -- Threats and vulnerabilities -- Triad and true -- Secure products and services -- Security through matrix management -- Navigating the regulatory landscape -- Investigation and remediation -- The right stuff. , Barrierefreier Inhalt: Compliant with Level AA of the Web Content Accessibility Guidelines. Content is displayed as HTML full text which can easily be resized or read with assistive technology, with mark-up that allows screen readers and keyboard-only users to navigate easily
    Additional Edition: ISBN 9780313376603
    Additional Edition: ISBN 9780313376610
    Additional Edition: ISBN 9798216080107
    Additional Edition: Erscheint auch als ISBN 0313376603
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Book
    Book
    Hoboken, NJ : Wiley
    UID:
    gbv_655765026
    Format: XVI, 270 S. , Ill.
    ISBN: 1118027809 , 9781118027806
    Content: "Drawing upon a wealth of experience from academia, industry, and government service, this book details and dissects current organizational cybersecurity policy issues on a global scale. Using simple language, it includes a thorough description of each issue, lists pros and cons, documents policy alternatives for the sake of clarity with respect to policy alone, and dives into organizational implementation issues. It also equips the reader with descriptions of the impact of specific policy choices, both positive and negative. This book gives students, scholars, and technical decision-makers the necessary knowledge of cybersecurity policy in order to make more informed decisions"--
    Note: Literaturverz. S. 255 - 265
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Informationstechnik ; Computersicherheit ; Datenschutz ; USA ; Richtlinie
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_BV045427714
    Format: xxi, 259 Seiten : , Illustrationen.
    ISBN: 978-1-4842-4193-6
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 978-1-4842-4194-3
    Language: English
    Subjects: Computer Science , Economics
    RVK:
    RVK:
    Keywords: Finanzwirtschaft ; Risikomanagement ; Datenschutz ; Computersicherheit
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_9948312985502882
    Format: xxiv, 231 p. : , ill.
    Edition: Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
    Series Statement: Artech House information security and privacy series
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Hoboken, N.J. :Wiley,
    UID:
    almahu_9948315708402882
    Format: xvi, 270 p. : , ill.
    Edition: Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
    Content: "Drawing upon a wealth of experience from academia, industry, and government service, this book details and dissects current organizational cybersecurity policy issues on a global scale. Using simple language, it includes a thorough description of each issue, lists pros and cons, documents policy alternatives for the sake of clarity with respect to policy alone, and dives into organizational implementation issues. It also equips the reader with descriptions of the impact of specific policy choices, both positive and negative. This book gives students, scholars, and technical decision-makers the necessary knowledge of cybersecurity policy in order to make more informed decisions"--Provided by publisher.
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Hoboken, N.J. :Wiley,
    UID:
    edocfu_BV041384584
    Format: 1 Online-Ressource (xvi, 270 Seiten).
    ISBN: 978-1-118-24153-0
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-1-118-02780-6
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 1-118-02780-9
    Language: English
    Keywords: Informationstechnik ; Computersicherheit ; Datenschutz ; Richtlinie
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Hoboken, N.J. :Wiley,
    UID:
    edocfu_9959327850202883
    Format: 1 online resource (xvi, 270 pages) : , illustrations
    ISBN: 9781118241530 , 1118241533 , 9781299189324 , 1299189326 , 9781118241486 , 1118241487 , 9781118241325 , 1118241320
    Content: "Drawing upon a wealth of experience from academia, industry, and government service, this book details and dissects current organizational cybersecurity policy issues on a global scale. Using simple language, it includes a thorough description of each issue, lists pros and cons, documents policy alternatives for the sake of clarity with respect to policy alone, and dives into organizational implementation issues. It also equips the reader with descriptions of the impact of specific policy choices, both positive and negative. This book gives students, scholars, and technical decision-makers the necessary knowledge of cybersecurity policy in order to make more informed decisions"--Provided by publisher.
    Content: "This book is a taxonomy and thesaurus of current cybersecurity policy issues, including a thorough description of each issue and a corresponding list of pros and cons with respect to identified stances on each issue"--Provided by publisher.
    Note: Frontmatter -- Introduction -- Cyber Security Evolution -- Cyber Security Objectives -- Guidance for Decision Makers -- The Catalog Approach -- Cyber Security Policy Catalog -- One Government's Approach to Cyber Security Policy -- Conclusion -- Glossary -- References -- Index.
    Additional Edition: Print version: Cyber security policy guidebook. Hoboken, N.J. : Wiley, ©2012 ISBN 9781118027806
    Language: English
    Keywords: Electronic books. ; Ressources internet.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages