Syndetics omslagsbild
Bild från Syndetics

Cyber Security Policy Guidebook.

Av: Medverkande: Materialtyp: TextTextUtgivningsuppgift: Newark : John Wiley & Sons, Incorporated, 2012Datum för upphovsrätt: ©2012Utgåva: 1st edBeskrivning: 1 online resource (288 pages)Innehållstyp:
  • text
Medietyp:
  • computer
Bärartyp:
  • online resource
ISBN:
  • 9781118241486
Ämnen: Genre/form: DDK-klassifikation:
  • 005.8
Onlineresurser:
Innehåll:
Intro -- Cyber Security Policy Guidebook -- Contents -- Foreword -- Preface -- Acknowledgments -- 1: Introduction -- 1.1 What Is Cyber Security? -- 1.2 What Is Cyber Security Policy? -- 1.3 Domains of Cyber Security Policy -- 1.3.1 Laws and Regulations -- 1.3.2 Enterprise Policy -- 1.3.3 Technology Operations -- 1.3.4 Technology Configuration -- 1.4 Strategy versus Policy -- 2: Cyber Security Evolution -- 2.1 Productivity -- 2.2 Internet -- 2.3 e-Commerce -- 2.4 Countermeasures -- 2.5 Challenges -- 3: Cyber Security Objectives -- 3.1 Cyber Security Metrics -- 3.2 Security Management Goals -- 3.3 Counting Vulnerabilities -- 3.4 Security Frameworks -- 3.4.1 e-Commerce Systems -- 3.4.2 Industrial Control Systems -- 3.4.3 Personal Mobile Devices -- 3.5 Security Policy Objectives -- 4: Guidance for Decision Makers -- 4.1 Tone at the Top -- 4.2 Policy as a Project -- 4.3 Cyber Security Management -- 4.3.1 Arriving at Goals -- 4.3.2 Cyber Security Documentation -- 4.4 Using the Catalog -- 5: The Catalog Approach -- 5.1 Catalog Format -- 5.2 Cyber Security Policy Taxonomy -- 6: Cyber Security Policy Catalog -- 6.1 Cyber Governance Issues -- 6.1.1 Net Neutrality -- 6.1.2 Internet Names and Numbers -- 6.1.3 Copyrights and Trademarks -- 6.1.4 Email and Messaging -- 6.2 Cyber User Issues -- 6.2.1 Malvertising -- 6.2.2 Impersonation -- 6.2.3 Appropriate Use -- 6.2.4 Cyber Crime -- 6.2.5 Geolocation -- 6.2.6 Privacy -- 6.3 Cyber Conflict Issues -- 6.3.1 Intellectual Property Theft -- 6.3.2 Cyber Espionage -- 6.3.3 Cyber Sabotage -- 6.3.4 Cyber Warfare -- 6.4 Cyber Management Issues -- 6.4.1 Fiduciary Responsibility -- 6.4.2 Risk Management -- 6.4.3 Professional Certification -- 6.4.4 Supply Chain -- 6.4.5 Security Principles -- 6.4.6 Research and Development -- 6.5 Cyber Infrastructure Issues -- 6.5.1 Banking and Finance -- 6.5.2 Health Care.
6.5.3 Industrial Control Systems -- 7: One Government's Approach to Cyber Security Policy -- 7.1 U.S. Federal Cyber Security Strategy -- 7.2 A Brief History of Cyber Security Public Policy Development in the U.S. Federal Government -- 7.2.1 The Bombing of New York's World Trade Center on February 26, 1993 -- 7.2.2 Cyber Attacks against the United States Air Force, March-May 1994: Targeting the Pentagon -- 7.2.3 The Citibank Caper, June-October, 1994: How to Catch a Hacker -- 7.2.4 Murrah Federal Building, Oklahoma City-April 19, 1995: Major Terrorism Events and Their U.S. Outcomes -- 7.2.5 President's Commission on Critical Infrastructure Protection-1996 -- 7.2.6 Presidential Decision Directive 63-1998 -- 7.2.7 National Infrastructure Protection Center (NIPC) and ISACs-1998 -- 7.2.8 Eligible Receiver-1997 -- 7.2.9 Solar Sunrise-1998 -- 7.2.10 Joint Task Force-Computer Network Defense (JTF-CND)-1998 -- 7.2.11 Terrorist Attacks against the United States-September 11, 2001 Effects of Catastrophic Events on Transportation System Management and Operations -- 7.2.12 U.S. Government Response to the September 11, 2001 Terrorist Attacks -- 7.2.13 Homeland Security Presidential Directives -- 7.2.14 National Strategies -- 7.3 The Rise of Cyber Crime -- 7.4 Espionage and Nation-State Actions -- 7.5 Policy Response to Growing Espionage Threats: U.S. Cyber Command -- 7.6 Congressional Action -- 7.7 Summary -- 8: Conclusion -- Glossary -- References -- Index.
Inga fysiska exemplar för denna post

Intro -- Cyber Security Policy Guidebook -- Contents -- Foreword -- Preface -- Acknowledgments -- 1: Introduction -- 1.1 What Is Cyber Security? -- 1.2 What Is Cyber Security Policy? -- 1.3 Domains of Cyber Security Policy -- 1.3.1 Laws and Regulations -- 1.3.2 Enterprise Policy -- 1.3.3 Technology Operations -- 1.3.4 Technology Configuration -- 1.4 Strategy versus Policy -- 2: Cyber Security Evolution -- 2.1 Productivity -- 2.2 Internet -- 2.3 e-Commerce -- 2.4 Countermeasures -- 2.5 Challenges -- 3: Cyber Security Objectives -- 3.1 Cyber Security Metrics -- 3.2 Security Management Goals -- 3.3 Counting Vulnerabilities -- 3.4 Security Frameworks -- 3.4.1 e-Commerce Systems -- 3.4.2 Industrial Control Systems -- 3.4.3 Personal Mobile Devices -- 3.5 Security Policy Objectives -- 4: Guidance for Decision Makers -- 4.1 Tone at the Top -- 4.2 Policy as a Project -- 4.3 Cyber Security Management -- 4.3.1 Arriving at Goals -- 4.3.2 Cyber Security Documentation -- 4.4 Using the Catalog -- 5: The Catalog Approach -- 5.1 Catalog Format -- 5.2 Cyber Security Policy Taxonomy -- 6: Cyber Security Policy Catalog -- 6.1 Cyber Governance Issues -- 6.1.1 Net Neutrality -- 6.1.2 Internet Names and Numbers -- 6.1.3 Copyrights and Trademarks -- 6.1.4 Email and Messaging -- 6.2 Cyber User Issues -- 6.2.1 Malvertising -- 6.2.2 Impersonation -- 6.2.3 Appropriate Use -- 6.2.4 Cyber Crime -- 6.2.5 Geolocation -- 6.2.6 Privacy -- 6.3 Cyber Conflict Issues -- 6.3.1 Intellectual Property Theft -- 6.3.2 Cyber Espionage -- 6.3.3 Cyber Sabotage -- 6.3.4 Cyber Warfare -- 6.4 Cyber Management Issues -- 6.4.1 Fiduciary Responsibility -- 6.4.2 Risk Management -- 6.4.3 Professional Certification -- 6.4.4 Supply Chain -- 6.4.5 Security Principles -- 6.4.6 Research and Development -- 6.5 Cyber Infrastructure Issues -- 6.5.1 Banking and Finance -- 6.5.2 Health Care.

6.5.3 Industrial Control Systems -- 7: One Government's Approach to Cyber Security Policy -- 7.1 U.S. Federal Cyber Security Strategy -- 7.2 A Brief History of Cyber Security Public Policy Development in the U.S. Federal Government -- 7.2.1 The Bombing of New York's World Trade Center on February 26, 1993 -- 7.2.2 Cyber Attacks against the United States Air Force, March-May 1994: Targeting the Pentagon -- 7.2.3 The Citibank Caper, June-October, 1994: How to Catch a Hacker -- 7.2.4 Murrah Federal Building, Oklahoma City-April 19, 1995: Major Terrorism Events and Their U.S. Outcomes -- 7.2.5 President's Commission on Critical Infrastructure Protection-1996 -- 7.2.6 Presidential Decision Directive 63-1998 -- 7.2.7 National Infrastructure Protection Center (NIPC) and ISACs-1998 -- 7.2.8 Eligible Receiver-1997 -- 7.2.9 Solar Sunrise-1998 -- 7.2.10 Joint Task Force-Computer Network Defense (JTF-CND)-1998 -- 7.2.11 Terrorist Attacks against the United States-September 11, 2001 Effects of Catastrophic Events on Transportation System Management and Operations -- 7.2.12 U.S. Government Response to the September 11, 2001 Terrorist Attacks -- 7.2.13 Homeland Security Presidential Directives -- 7.2.14 National Strategies -- 7.3 The Rise of Cyber Crime -- 7.4 Espionage and Nation-State Actions -- 7.5 Policy Response to Growing Espionage Threats: U.S. Cyber Command -- 7.6 Congressional Action -- 7.7 Summary -- 8: Conclusion -- Glossary -- References -- Index.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2025. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

Licensed e-book