000 06571nam a22009135i 4500
001 9781501506529
003 DE-B1597
005 20240730161523.0
006 m|||||o||d||||||||
007 cr || ||||||||
008 210830t20202020gw fo d z eng d
010 _a2020939274
020 _a9781501506529
024 7 _a10.1515/9781501506529
_2doi
035 _a(DE-B1597)479832
035 _a(OCoLC)1198930891
040 _aDE-B1597
_beng
_cDE-B1597
_erda
041 0 _aeng
044 _agw
_cDE
072 7 _aCOM053000
_2bisacsh
082 0 4 _85p
_a005.8
_qDE-101
100 1 _aWilliams, Chris,
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_975689
245 1 0 _aBuilding an Effective Security Program /
_cChris Williams, Scott Donaldson, Stanley Siegel.
264 1 _aBerlin ;
_aBoston :
_bDe Gruyter,
_c[2020]
264 4 _c©2020
300 _a1 online resource (XIX, 425 p.)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 0 _tFrontmatter --
_tAcknowledgments --
_tAbout the Authors --
_tContents --
_tIntroduction --
_tChapter 1. The Digital Organization --
_tChapter 2. Ever-Present Cyber Threats --
_tChapter 3. Cyber Risk Management --
_tChapter 4. Cyberdefense Concepts --
_tChapter 5. Cybersecurity Drivers --
_tChapter 6. Cyber Program Management --
_tChapter 7. Cybersecurity Capabilities --
_tChapter 8. Cybersecurity Operations --
_tChapter 9. Cyber Awareness --
_tChapter 10. Organization Cyber Awareness --
_tChapter 11. Cyber Training --
_tChapter 12. Measuring Cyber Performance --
_tChapter 13. When Things Go Wrong --
_tChapter 14. Looking to the Future --
_tAppendix A: Common Malware Threats --
_tAppendix B: Cyber Awareness and Cyber Training Topics --
_tAppendix C: Example Cyber Policy --
_tAppendix D: Online Cybersecurity Resources --
_tGlossary --
_tIndex
506 0 _arestricted access
_uhttp://purl.org/coar/access_right/c_16ec
_fonline access with authorization
_2star
520 _aBuilding an Effective Security Program provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security awareness, and training. This program will establish and maintain effective security protections for the confidentiality, availability, and integrity of organization information. In this book, the authors take a pragmatic approach to building organization cyberdefenses that are effective while also remaining affordable. This book is intended for business leaders, IT professionals, cybersecurity personnel, educators, and students interested in deploying real-world cyberdefenses against today's persistent and sometimes devastating cyberattacks. It includes detailed explanation of the following IT security topics: IT Security Mindset-Think like an IT security professional, and consider how your IT environment can be defended against potential cyberattacks. Risk Management-Identify the assets, vulnerabilities and threats that drive IT risk, along with the controls that can be used to mitigate such risk. Effective Cyberdefense-Consider the components of an effective organization cyberdefense to successfully protect computers, devices, networks, accounts, applications and data. Cyber Operations-Operate cyberdefense capabilities and controls so that assets are protected, and intruders can be detected and repelled before significant damage can be done. IT Security Awareness and Training-Promote effective cybersecurity practices at work, on travel, and at home, among your organization's business leaders, IT professionals, and staff. Resilient IT Security-Implement, operate, monitor, assess, and improve your cybersecurity program on an ongoing basis to defend against the cyber threats of today and the future.
538 _aMode of access: Internet via World Wide Web.
546 _aIn English.
588 0 _aDescription based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021)
650 7 _aCOMPUTERS / Security / General.
_2bisacsh
_975690
653 _aCyber Threat.
653 _aCybercrime.
653 _aCybersecurity.
653 _aHacking.
653 _aPhishing.
653 _aSecurity.
653 _aVirus.
700 1 _aDonaldson, Scott,
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_975691
700 1 _aSiegel, Stanley,
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_975692
773 0 8 _iTitle is part of eBook package:
_dDe Gruyter
_tDG Ebook Package English 2020
_z9783110696288
773 0 8 _iTitle is part of eBook package:
_dDe Gruyter
_tDG Plus DeG Package 2020 Part 1
_z9783110696271
773 0 8 _iTitle is part of eBook package:
_dDe Gruyter
_tDe Gruyter English eBooks 2020 - UC
_z9783110659061
773 0 8 _iTitle is part of eBook package:
_dDe Gruyter
_tEBOOK PACKAGE COMPLETE 2020 English
_z9783110704716
773 0 8 _iTitle is part of eBook package:
_dDe Gruyter
_tEBOOK PACKAGE COMPLETE 2020
_z9783110704518
_oZDB-23-DGG
773 0 8 _iTitle is part of eBook package:
_dDe Gruyter
_tEBOOK PACKAGE Engineering, Computer Sciences 2020 English
_z9783110704815
773 0 8 _iTitle is part of eBook package:
_dDe Gruyter
_tEBOOK PACKAGE Engineering, Computer Sciences 2020
_z9783110704617
_oZDB-23-DEI
776 0 _cEPUB
_z9781501506420
776 0 _cprint
_z9781501515248
856 4 0 _uhttps://doi.org/10.1515/9781501506529
856 4 0 _uhttps://www.degruyter.com/isbn/9781501506529
856 4 2 _3Cover
_uhttps://www.degruyter.com/cover/covers/9781501506529.jpg
912 _a978-3-11-065906-1 De Gruyter English eBooks 2020 - UC
_b2020
912 _a978-3-11-069627-1 DG Plus DeG Package 2020 Part 1
_b2020
912 _a978-3-11-069628-8 DG Ebook Package English 2020
_b2020
912 _a978-3-11-070471-6 EBOOK PACKAGE COMPLETE 2020 English
_b2020
912 _a978-3-11-070481-5 EBOOK PACKAGE Engineering, Computer Sciences 2020 English
_b2020
912 _aEBA_CL_CHCOMSGSEN
912 _aEBA_DGALL
912 _aEBA_EBKALL
912 _aEBA_ECL_CHCOMSGSEN
912 _aEBA_EEBKALL
912 _aEBA_ESTMALL
912 _aEBA_STMALL
912 _aGBV-deGruyter-alles
912 _aPDA12STME
912 _aPDA13ENGE
912 _aPDA18STMEE
912 _aPDA5EBK
912 _aZDB-23-DEI
_b2020
912 _aZDB-23-DGG
_b2020
942 _cEBK
999 _c84413
_d84413