000 | 06571nam a22009135i 4500 | ||
---|---|---|---|
001 | 9781501506529 | ||
003 | DE-B1597 | ||
005 | 20240730161523.0 | ||
006 | m|||||o||d|||||||| | ||
007 | cr || |||||||| | ||
008 | 210830t20202020gw fo d z eng d | ||
010 | _a2020939274 | ||
020 | _a9781501506529 | ||
024 | 7 |
_a10.1515/9781501506529 _2doi |
|
035 | _a(DE-B1597)479832 | ||
035 | _a(OCoLC)1198930891 | ||
040 |
_aDE-B1597 _beng _cDE-B1597 _erda |
||
041 | 0 | _aeng | |
044 |
_agw _cDE |
||
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_85p _a005.8 _qDE-101 |
100 | 1 |
_aWilliams, Chris, _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _975689 |
|
245 | 1 | 0 |
_aBuilding an Effective Security Program / _cChris Williams, Scott Donaldson, Stanley Siegel. |
264 | 1 |
_aBerlin ; _aBoston : _bDe Gruyter, _c[2020] |
|
264 | 4 | _c©2020 | |
300 | _a1 online resource (XIX, 425 p.) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | 0 |
_tFrontmatter -- _tAcknowledgments -- _tAbout the Authors -- _tContents -- _tIntroduction -- _tChapter 1. The Digital Organization -- _tChapter 2. Ever-Present Cyber Threats -- _tChapter 3. Cyber Risk Management -- _tChapter 4. Cyberdefense Concepts -- _tChapter 5. Cybersecurity Drivers -- _tChapter 6. Cyber Program Management -- _tChapter 7. Cybersecurity Capabilities -- _tChapter 8. Cybersecurity Operations -- _tChapter 9. Cyber Awareness -- _tChapter 10. Organization Cyber Awareness -- _tChapter 11. Cyber Training -- _tChapter 12. Measuring Cyber Performance -- _tChapter 13. When Things Go Wrong -- _tChapter 14. Looking to the Future -- _tAppendix A: Common Malware Threats -- _tAppendix B: Cyber Awareness and Cyber Training Topics -- _tAppendix C: Example Cyber Policy -- _tAppendix D: Online Cybersecurity Resources -- _tGlossary -- _tIndex |
506 | 0 |
_arestricted access _uhttp://purl.org/coar/access_right/c_16ec _fonline access with authorization _2star |
|
520 | _aBuilding an Effective Security Program provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security awareness, and training. This program will establish and maintain effective security protections for the confidentiality, availability, and integrity of organization information. In this book, the authors take a pragmatic approach to building organization cyberdefenses that are effective while also remaining affordable. This book is intended for business leaders, IT professionals, cybersecurity personnel, educators, and students interested in deploying real-world cyberdefenses against today's persistent and sometimes devastating cyberattacks. It includes detailed explanation of the following IT security topics: IT Security Mindset-Think like an IT security professional, and consider how your IT environment can be defended against potential cyberattacks. Risk Management-Identify the assets, vulnerabilities and threats that drive IT risk, along with the controls that can be used to mitigate such risk. Effective Cyberdefense-Consider the components of an effective organization cyberdefense to successfully protect computers, devices, networks, accounts, applications and data. Cyber Operations-Operate cyberdefense capabilities and controls so that assets are protected, and intruders can be detected and repelled before significant damage can be done. IT Security Awareness and Training-Promote effective cybersecurity practices at work, on travel, and at home, among your organization's business leaders, IT professionals, and staff. Resilient IT Security-Implement, operate, monitor, assess, and improve your cybersecurity program on an ongoing basis to defend against the cyber threats of today and the future. | ||
538 | _aMode of access: Internet via World Wide Web. | ||
546 | _aIn English. | ||
588 | 0 | _aDescription based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021) | |
650 | 7 |
_aCOMPUTERS / Security / General. _2bisacsh _975690 |
|
653 | _aCyber Threat. | ||
653 | _aCybercrime. | ||
653 | _aCybersecurity. | ||
653 | _aHacking. | ||
653 | _aPhishing. | ||
653 | _aSecurity. | ||
653 | _aVirus. | ||
700 | 1 |
_aDonaldson, Scott, _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _975691 |
|
700 | 1 |
_aSiegel, Stanley, _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _975692 |
|
773 | 0 | 8 |
_iTitle is part of eBook package: _dDe Gruyter _tDG Ebook Package English 2020 _z9783110696288 |
773 | 0 | 8 |
_iTitle is part of eBook package: _dDe Gruyter _tDG Plus DeG Package 2020 Part 1 _z9783110696271 |
773 | 0 | 8 |
_iTitle is part of eBook package: _dDe Gruyter _tDe Gruyter English eBooks 2020 - UC _z9783110659061 |
773 | 0 | 8 |
_iTitle is part of eBook package: _dDe Gruyter _tEBOOK PACKAGE COMPLETE 2020 English _z9783110704716 |
773 | 0 | 8 |
_iTitle is part of eBook package: _dDe Gruyter _tEBOOK PACKAGE COMPLETE 2020 _z9783110704518 _oZDB-23-DGG |
773 | 0 | 8 |
_iTitle is part of eBook package: _dDe Gruyter _tEBOOK PACKAGE Engineering, Computer Sciences 2020 English _z9783110704815 |
773 | 0 | 8 |
_iTitle is part of eBook package: _dDe Gruyter _tEBOOK PACKAGE Engineering, Computer Sciences 2020 _z9783110704617 _oZDB-23-DEI |
776 | 0 |
_cEPUB _z9781501506420 |
|
776 | 0 |
_cprint _z9781501515248 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1515/9781501506529 |
856 | 4 | 0 | _uhttps://www.degruyter.com/isbn/9781501506529 |
856 | 4 | 2 |
_3Cover _uhttps://www.degruyter.com/cover/covers/9781501506529.jpg |
912 |
_a978-3-11-065906-1 De Gruyter English eBooks 2020 - UC _b2020 |
||
912 |
_a978-3-11-069627-1 DG Plus DeG Package 2020 Part 1 _b2020 |
||
912 |
_a978-3-11-069628-8 DG Ebook Package English 2020 _b2020 |
||
912 |
_a978-3-11-070471-6 EBOOK PACKAGE COMPLETE 2020 English _b2020 |
||
912 |
_a978-3-11-070481-5 EBOOK PACKAGE Engineering, Computer Sciences 2020 English _b2020 |
||
912 | _aEBA_CL_CHCOMSGSEN | ||
912 | _aEBA_DGALL | ||
912 | _aEBA_EBKALL | ||
912 | _aEBA_ECL_CHCOMSGSEN | ||
912 | _aEBA_EEBKALL | ||
912 | _aEBA_ESTMALL | ||
912 | _aEBA_STMALL | ||
912 | _aGBV-deGruyter-alles | ||
912 | _aPDA12STME | ||
912 | _aPDA13ENGE | ||
912 | _aPDA18STMEE | ||
912 | _aPDA5EBK | ||
912 |
_aZDB-23-DEI _b2020 |
||
912 |
_aZDB-23-DGG _b2020 |
||
942 | _cEBK | ||
999 |
_c84413 _d84413 |