Normal view MARC view ISBD view

Cyber security. simply. make it happen : leveraging digitization through it security

Title By: Abolhassan, Ferri [Edited by]
Material type: BookSeries: Management for professionals.Publisher: Cham, Switzerland : Springer, c2017.Description: 144 p. ; 24 cm.ISBN: 9783319465289Subject(s): Internet -- Security measures -- Social aspects | Computer networks -- Security measures | COMPUTERS /​ Security /​ Networking | BUSINESS &​ ECONOMICS /​ Management | BUSINESS &​ ECONOMICS /​ Reference | BUSINESS &​ ECONOMICS /​ SkillsDDC classification: 005.8 CY RP Online resources: Location Map
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Home library Call number Status Date due Barcode Item holds
REGULAR University of Wollongong in Dubai
Main Collection
005.8 CY RP (Browse shelf) Available T0056581
Total holds: 0

Includes bibliographical references.

Foreword; Trust Is the Basis of Digitization; Digitization Offers Great Opportunities; Data Protection and Digital Business Models Are Not in Opposition; Security Has to Be Simple; Contents; 1: Security: The Real Challenge for Digitalization; 1.1 Introduction; 1.2 Status Quo: The Cloud Is the Backbone of Digitalization; 1.3 Data Security: Only a Secure Cloud Will Lead to Secure Digitalization; 1.3.1 Risk Transformation: It Has to Be Easy to Get into the Cloud; 1.3.2 Risk of an Incident: Making Sure the Cloud Doesnt́ Crash.
1.3.3 Risk of Technical/​Physical Attack: A Castle Wall Alone Isnt́ Enough1.3.4 Risk of a Cyberattack: Ensuring Data and Devices Arent́ Casualties; 1.4 Looking to the Future; 1.5 Conclusion; References; 2: Security Policy: Rules for Cyberspace; 2.1 Taking Stock: Digital Warfare in the 21st Century; 2.2 Challenges for the Political Sphere: Rules, Resources and Expertise; 2.3 Outlook: A Strategy for the Digital Age; References; 3: Data Protection Empowerment; 3.1 Code Is Law; 3.2 Empowerment; 3.3 Information Technology and Social Values; References.
4: Red Teaming and Wargaming: How Can Management and Supervisory Board Members Become More Involved in Cybersecurity?4.1 Cybersecurity: A Management Board Issue; 4.2 Integrating the Management Board into Existing Cybersecurity Strategies; 4.3 Red Teaming and Wargaming; 4.3.1 Red Teaming Defined; 4.3.2 Wargaming Defined; 4.3.3 Differences Compared with Methods Currently in Use; 4.4 Use of Red Teaming in Combination with Wargaming at Companies; 4.4.1 Classification; 4.4.2 Definition of a Target; 4.4.3 Composition of the Teams; 4.4.4 Analysis: Data Collection and Evaluation; 4.4.5 Wargaming.
4.4.6 Report4.5 Conclusion; References; 5: The Law and Its Contribution to IT Security: Legal Framework, Requirements, Limits; 5.1 Key Features of the Existing Legal Framework; 5.1.1 IT Compliance: A Challenge for Management Boards and Executives; 5.1.1.1 The Cornerstone of IT Compliance: IT Security; 5.1.1.2 Liability of the Management Board and Executives; 5.1.2 Who Is Responsible?; 5.1.2.1 Requirements for Software Manufacturers; 5.1.2.2 Requirements for Network and Platform Operators; 5.1.2.3 Legal Framework for Providers of IT Services.
5.1.3 Regulation on Determining Critical Infrastructure5.1.4 Controversial: Changes Affecting Telemedia Services; 5.2 International Issues: The European Unionś Directive on Security of Network and Information Systems (NIS Directive); 5.3 Data Protection and Data Security in the United States; 5.4 Data Exchange Between EU and US Companies; 5.4.1 Safe Harbor; 5.4.2 Privacy Shield; 5.5 Conclusion: Many Legal Issues to Consider; References; 6: IT Security: Stronger Together; 6.1 The Trinity of IT Security; 6.2 CSSA Security Through Collaboration; 6.2.1 Targeted Interaction.

Powered by Koha