My Account Log in

2 options

Cyber security culture : counteracting cyber threats through organizational learning and training / Peter Trim and David Upton.

EBSCOhost Academic eBook Collection (North America) Available online

View online

EBSCOhost Ebook Business Collection Available online

View online
Format:
Book
Author/Creator:
Trim, Peter R. J.
Contributor:
Upton, David.
Series:
Gower applied business research Cyber security culture
Language:
English
Subjects (All):
Information technology--Security measures.
Information technology.
Computer security.
Computer crimes--Prevention.
Computer crimes.
Physical Description:
1 online resource (235 p.)
Edition:
1st ed.
Place of Publication:
Farnham, England ; Burlington, Vt. : Gower, c2013.
Language Note:
English
Summary:
Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers in industry and government to understand how organizational learning and training can be utilized to develop a culture that protects an organization from attacks. The authors provide information to help managers form policy and procedures, to undertake scenario-based planning and arrange appropriate training interventions, such as table top exercises.Although the
Contents:
Cover; Contents; List of Figures; List of Tables; About the Authors; Foreword; Preface; 1 Introduction and Background to the Research; 1.0 Introduction; 1.1 The Relevance of Training Exercises; 1.2 Scenario Planning; 1.3 Simulation Exercises and the Learning Organization Approach; 1.4 The Alternative Worlds Project; 1.5 Methodological Approach and the Main Steps in the Research Process; 1.6 The Data Collection Process; 1.7 Ethical Issues; 1.8 Conclusion; 2 Social Engineering; 2.0 Introduction; 2.1 The Size of the Problem; 2.2 What is 'Social Engineering'?; 2.3 Who Does This, and Why?
2.4 Targets: The Employees2.5 The Contrast with the Real World; 2.6 Conclusion; 3 Organizational Issues Relating to Critical Information Infrastructure Protection; 3.0 Introduction; 3.1 Placing Critical Information Infrastructure Protection in Context; 3.2 Current Issues, Threats and Ways to Co-operate; 3.3 A Joint Training Approach; 3.4 Organizational Culture and Corporate Security Education; 3.5 A Joint Security Approach; 3.6 Disaster and Emergency Management; 3.7 Developing a Joint Security Approach; 3.8 A New Stakeholder Security Agenda; 3.9 Cyber Security and an Organizational Response
3.10 Conclusion4 Protecting Critical Information Infrastructure; 4.0 Introduction; 4.1 General Overview; 4.2 Issues and Considerations Relating to Critical Information Infrastructure Protection (CIIP); 4.3 Wider Implications and the Public and Private Sectors; 4.4 Strategic Framework; 4.5 Placing Matters in Context; 4.6 Cyber Attacks; 4.7 Towards a Possible Solution; 4.8 Conclusion; 5 Critical Information Infrastructure; 5.0 Introduction; 5.1 Traditional Analysis; 5.2 Effects-based Analysis and Modelling; 5.3 A Layered Approach; 5.4 Protean Systems; 5.5 The 'Black Box' Model
5.6 A 'Bottom-up' Approach5.7 Conclusion; 6 Insights into Organizational Learning; 6.0 Introduction; 6.1 Organizational Learning and Case Study Narrative; 6.2 A Review and Reflection of Organizational Learning; 6.3 Discussion; 6.4 Conclusion; 7 Critical Information Infrastructure Road Map; 7.0 Introduction; 7.1 Changes to the 'Road Map'; 7.2 Who are the Stakeholders During a CIIP Incident?; 7.3 Interactions 1: Information Flow; 7.4 Interactions 2: Providing Assistance or Advice; 7.5 Interactions 3: Responsibility for Maintaining Systems; 7.6 The Road Map and the Way Forward
8 The Learning Organization and Managing Change8.0 Introduction; 8.1 Training, Staff Development and Strategy Implementation; 8.2 The Learning Organization Concept and Organizational Learning; 8.3 International Project Groups; 8.4 Changing Organizational Attitudes and Mindsets; 8.5 Conclusion; 9 Devising an Effective Counter Threat Strategy; 9.0 Introduction; 9.1 An Effective Counterintelligence Policy; 9.2 Devising an Organizational Cyber Security Policy; 9.3 The Importance of Training; 9.4 Conclusion; Index
Notes:
Description based upon print version of record.
Includes bibliographical references and index.
Description based on publisher supplied metadata and other sources.
ISBN:
1-315-57568-X
1-317-15529-7
1-317-15528-9
1-4094-5695-1
1-299-18402-2
9781315575681
OCLC:
829461063

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account