2 options
Cyber security culture : counteracting cyber threats through organizational learning and training / Peter Trim and David Upton.
- Format:
- Book
- Author/Creator:
- Trim, Peter R. J.
- Series:
- Gower applied business research Cyber security culture
- Language:
- English
- Subjects (All):
- Information technology--Security measures.
- Information technology.
- Computer security.
- Computer crimes--Prevention.
- Computer crimes.
- Physical Description:
- 1 online resource (235 p.)
- Edition:
- 1st ed.
- Place of Publication:
- Farnham, England ; Burlington, Vt. : Gower, c2013.
- Language Note:
- English
- Summary:
- Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers in industry and government to understand how organizational learning and training can be utilized to develop a culture that protects an organization from attacks. The authors provide information to help managers form policy and procedures, to undertake scenario-based planning and arrange appropriate training interventions, such as table top exercises.Although the
- Contents:
- Cover; Contents; List of Figures; List of Tables; About the Authors; Foreword; Preface; 1 Introduction and Background to the Research; 1.0 Introduction; 1.1 The Relevance of Training Exercises; 1.2 Scenario Planning; 1.3 Simulation Exercises and the Learning Organization Approach; 1.4 The Alternative Worlds Project; 1.5 Methodological Approach and the Main Steps in the Research Process; 1.6 The Data Collection Process; 1.7 Ethical Issues; 1.8 Conclusion; 2 Social Engineering; 2.0 Introduction; 2.1 The Size of the Problem; 2.2 What is 'Social Engineering'?; 2.3 Who Does This, and Why?
- 2.4 Targets: The Employees2.5 The Contrast with the Real World; 2.6 Conclusion; 3 Organizational Issues Relating to Critical Information Infrastructure Protection; 3.0 Introduction; 3.1 Placing Critical Information Infrastructure Protection in Context; 3.2 Current Issues, Threats and Ways to Co-operate; 3.3 A Joint Training Approach; 3.4 Organizational Culture and Corporate Security Education; 3.5 A Joint Security Approach; 3.6 Disaster and Emergency Management; 3.7 Developing a Joint Security Approach; 3.8 A New Stakeholder Security Agenda; 3.9 Cyber Security and an Organizational Response
- 3.10 Conclusion4 Protecting Critical Information Infrastructure; 4.0 Introduction; 4.1 General Overview; 4.2 Issues and Considerations Relating to Critical Information Infrastructure Protection (CIIP); 4.3 Wider Implications and the Public and Private Sectors; 4.4 Strategic Framework; 4.5 Placing Matters in Context; 4.6 Cyber Attacks; 4.7 Towards a Possible Solution; 4.8 Conclusion; 5 Critical Information Infrastructure; 5.0 Introduction; 5.1 Traditional Analysis; 5.2 Effects-based Analysis and Modelling; 5.3 A Layered Approach; 5.4 Protean Systems; 5.5 The 'Black Box' Model
- 5.6 A 'Bottom-up' Approach5.7 Conclusion; 6 Insights into Organizational Learning; 6.0 Introduction; 6.1 Organizational Learning and Case Study Narrative; 6.2 A Review and Reflection of Organizational Learning; 6.3 Discussion; 6.4 Conclusion; 7 Critical Information Infrastructure Road Map; 7.0 Introduction; 7.1 Changes to the 'Road Map'; 7.2 Who are the Stakeholders During a CIIP Incident?; 7.3 Interactions 1: Information Flow; 7.4 Interactions 2: Providing Assistance or Advice; 7.5 Interactions 3: Responsibility for Maintaining Systems; 7.6 The Road Map and the Way Forward
- 8 The Learning Organization and Managing Change8.0 Introduction; 8.1 Training, Staff Development and Strategy Implementation; 8.2 The Learning Organization Concept and Organizational Learning; 8.3 International Project Groups; 8.4 Changing Organizational Attitudes and Mindsets; 8.5 Conclusion; 9 Devising an Effective Counter Threat Strategy; 9.0 Introduction; 9.1 An Effective Counterintelligence Policy; 9.2 Devising an Organizational Cyber Security Policy; 9.3 The Importance of Training; 9.4 Conclusion; Index
- Notes:
- Description based upon print version of record.
- Includes bibliographical references and index.
- Description based on publisher supplied metadata and other sources.
- ISBN:
- 1-315-57568-X
- 1-317-15529-7
- 1-317-15528-9
- 1-4094-5695-1
- 1-299-18402-2
- 9781315575681
- OCLC:
- 829461063
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.