My Account Log in

5 options

Managing cybersecurity risk : case studies and solution / Jonathan Reuvid.

EBSCOhost Academic eBook Collection (North America) Available online

View online

EBSCOhost Ebook Business Collection Available online

View online

EBSCOhost eBook Community College Collection Available online

View online

Ebook Central Academic Complete Available online

View online

Ebook Central College Complete Available online

View online
Format:
Book
Author/Creator:
Reuvid, Jonathan, author.
Language:
English
Subjects (All):
Business enterprises--Computer networks--Security measures.
Business enterprises.
Computer crimes--Prevention.
Computer crimes.
Physical Description:
1 online resource (211 pages)
Edition:
2nd ed.
Place of Publication:
London : Legend Press, [2018]
Summary:
This book provides detailed information about the cybersecurity environment and specific threats, and offers advice on the resources available to build defences and the selection of tools and managed services to achieve enhanced security at acceptable cost.
Contents:
Cover
Title
Copyright
Contents
Foreword
Preface
List of Contributors
Introduction
Part One Cybersecurity in the Information Age
1.1 Building Business Resilience
1.2 Enterprise Vulnerablity Scanning
1.3 Cybercrime - Translating the Tech from the Floor to the Boardroom
1.4 Cybersecurity: Moving from Awareness to Understanding
1.5 How Cyber Criminals Make Money
1.6 If SMEs are the Life Blood of the British Economy, We've Cut an Artery
Part Two Addressing the Management Issues
2.1 Managing Cyber Risk - The Role of the Board
2.2 Activating the Human Firewall -The Leap from Knowing to Doing
2.3 The Resilient Organisation - Are We Searching for Our "Phlogiston"?
2.4 An Action Plan for Response and Damage Containment
2.5 Addressing the Skills Shortage in Cybersecurity
Part Three General Data Protection Regulation
3.1 GDPR - A View from the Frontline
3.2 GDPR - Introducing the UK Regime
3.3 Using Scenario Workshops to Prepare for GDPR and Other Legislation
3.4 GDPR - Comparative International Regimes
3.5 Intrusion Detection System Evaluation Guide
Part Four Innovative Tools for Cyber Threat Response
4.1 Identifying Affordable and Cost-effective Solutions
4.2 Detecting Ransomware with Unified Security
4.3 Petya Ransomwware Rapid Response Guide
4.4 The Incident Response Toolkit: Putting the OODA Loop to Work in the Real World
Part Five Cautionary Tales from the Frontline
5.1 The Power of Storytelling
5.2 How to Avoid That 'I Told You So' Moment
5.3 A Cuckoo in the Nest?
5.4 The Trouble with Contractors
5.5 Hacked into a Parallel Universe
Contributors' Contacts.
Notes:
Description based on print version record.
ISBN:
9781787198906
1787198901
OCLC:
1158222251

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account