Cyberwar, Cyberterror, Cybercrime & Cyberactivism (2nd Edition)

An in-depth guide to the role of standards in the cybersecurity environment

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Cyberwar, Cyberterror, Cybercrime & Cyberactivism (2nd Edition) by Julie Mehan, IT Governance Ltd
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Julie Mehan ISBN: 9781849285735
Publisher: IT Governance Ltd Publication: May 8, 2014
Imprint: IT Governance Publishing Language: English
Author: Julie Mehan
ISBN: 9781849285735
Publisher: IT Governance Ltd
Publication: May 8, 2014
Imprint: IT Governance Publishing
Language: English

The intentions of the cyberterrorist, the cybercriminal, the cyberactivist and the state-sponsored hacker are not the same. They can all cause serious problems for your organisation, however, including information theft, disruption of normal operations and undermining your reputation or credibility.

Many books on cybersecurity focus on technical responses to these threats. As important as this is, human fallibility and other known vulnerabilities will allow hackers to easily break into a system that has not taken account of these factors.

This book encourages cybersecurity professionals to take a wider view of what cybersecurity means, and to exploit international standards and best practice to create a culture of cybersecurity awareness within their organization that supplements technology-based defenses.

This second edition takes account of the changing threats in the cyber landscape, and includes an updated body of knowledge that describes how to acquire, develop, and sustain a secure information environment that goes beyond technology. This enables you to move towards a cyber aware organizational culture that is more robust and better able to deal with a wider range of threats. Related references and recommendations for additional reading are included at the end of each chapter, making this a valuable resource for trainers and researchers, as well as cybersecurity practitioners.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The intentions of the cyberterrorist, the cybercriminal, the cyberactivist and the state-sponsored hacker are not the same. They can all cause serious problems for your organisation, however, including information theft, disruption of normal operations and undermining your reputation or credibility.

Many books on cybersecurity focus on technical responses to these threats. As important as this is, human fallibility and other known vulnerabilities will allow hackers to easily break into a system that has not taken account of these factors.

This book encourages cybersecurity professionals to take a wider view of what cybersecurity means, and to exploit international standards and best practice to create a culture of cybersecurity awareness within their organization that supplements technology-based defenses.

This second edition takes account of the changing threats in the cyber landscape, and includes an updated body of knowledge that describes how to acquire, develop, and sustain a secure information environment that goes beyond technology. This enables you to move towards a cyber aware organizational culture that is more robust and better able to deal with a wider range of threats. Related references and recommendations for additional reading are included at the end of each chapter, making this a valuable resource for trainers and researchers, as well as cybersecurity practitioners.

More books from IT Governance Ltd

Cover of the book IT Induction and Information Security Awareness by Julie Mehan
Cover of the book ITIL Lifecycle Essentials by Julie Mehan
Cover of the book OHSAS 18001 Step by Step by Julie Mehan
Cover of the book Integrated Measurement - KPIs and Metrics for ITSM by Julie Mehan
Cover of the book Data Protection Compliance in the UK by Julie Mehan
Cover of the book ISO19770-1:2012 SAM Process Guidance by Julie Mehan
Cover of the book Selection Management for Systems and Services by Julie Mehan
Cover of the book ISO22301 by Julie Mehan
Cover of the book Security Testing Handbook for Banking Applications by Julie Mehan
Cover of the book Agile: An Executive Guide by Julie Mehan
Cover of the book An Introduction to Hacking and Crimeware by Julie Mehan
Cover of the book Managing in a Service-Focused World by Julie Mehan
Cover of the book The Definitive Guide to the C&A Transformation Process by Julie Mehan
Cover of the book The Chief Information Security Officer by Julie Mehan
Cover of the book Everything you want to know about Agile by Julie Mehan
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy