Building an Effective Security Program / / Chris Williams, Scott Donaldson, Stanley Siegel.

Building an Effective Security Program provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security aw...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter DG Ebook Package English 2020
VerfasserIn:
Place / Publishing House:Berlin ;, Boston : : De Gruyter, , [2020]
©2020
Year of Publication:2020
Language:English
Online Access:
Physical Description:1 online resource (XIX, 425 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 06510nam a22008895i 4500
001 9781501506529
003 DE-B1597
005 20210830012106.0
006 m|||||o||d||||||||
007 cr || ||||||||
008 210830t20202020gw fo d z eng d
010 |a 2020939274 
020 |a 9781501506529 
024 7 |a 10.1515/9781501506529  |2 doi 
035 |a (DE-B1597)479832 
035 |a (OCoLC)1198930891 
040 |a DE-B1597  |b eng  |c DE-B1597  |e rda 
041 0 |a eng 
044 |a gw  |c DE 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |8 5p  |a 005.8  |q DE-101 
100 1 |a Williams, Chris,   |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Building an Effective Security Program /  |c Chris Williams, Scott Donaldson, Stanley Siegel. 
264 1 |a Berlin ;  |a Boston :   |b De Gruyter,   |c [2020] 
264 4 |c ©2020 
300 |a 1 online resource (XIX, 425 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 0 |t Frontmatter --   |t Acknowledgments --   |t About the Authors --   |t Contents --   |t Introduction --   |t Chapter 1. The Digital Organization --   |t Chapter 2. Ever-Present Cyber Threats --   |t Chapter 3. Cyber Risk Management --   |t Chapter 4. Cyberdefense Concepts --   |t Chapter 5. Cybersecurity Drivers --   |t Chapter 6. Cyber Program Management --   |t Chapter 7. Cybersecurity Capabilities --   |t Chapter 8. Cybersecurity Operations --   |t Chapter 9. Cyber Awareness --   |t Chapter 10. Organization Cyber Awareness --   |t Chapter 11. Cyber Training --   |t Chapter 12. Measuring Cyber Performance --   |t Chapter 13. When Things Go Wrong --   |t Chapter 14. Looking to the Future --   |t Appendix A: Common Malware Threats --   |t Appendix B: Cyber Awareness and Cyber Training Topics --   |t Appendix C: Example Cyber Policy --   |t Appendix D: Online Cybersecurity Resources --   |t Glossary --   |t Index 
506 0 |a restricted access  |u http://purl.org/coar/access_right/c_16ec  |f online access with authorization  |2 star 
520 |a Building an Effective Security Program provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security awareness, and training. This program will establish and maintain effective security protections for the confidentiality, availability, and integrity of organization information. In this book, the authors take a pragmatic approach to building organization cyberdefenses that are effective while also remaining affordable. This book is intended for business leaders, IT professionals, cybersecurity personnel, educators, and students interested in deploying real-world cyberdefenses against today’s persistent and sometimes devastating cyberattacks. It includes detailed explanation of the following IT security topics: IT Security Mindset—Think like an IT security professional, and consider how your IT environment can be defended against potential cyberattacks. Risk Management—Identify the assets, vulnerabilities and threats that drive IT risk, along with the controls that can be used to mitigate such risk. Effective Cyberdefense—Consider the components of an effective organization cyberdefense to successfully protect computers, devices, networks, accounts, applications and data. Cyber Operations—Operate cyberdefense capabilities and controls so that assets are protected, and intruders can be detected and repelled before significant damage can be done. IT Security Awareness and Training—Promote effective cybersecurity practices at work, on travel, and at home, among your organization’s business leaders, IT professionals, and staff. Resilient IT Security—Implement, operate, monitor, assess, and improve your cybersecurity program on an ongoing basis to defend against the cyber threats of today and the future. 
538 |a Mode of access: Internet via World Wide Web. 
546 |a In English. 
588 0 |a Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021) 
650 7 |a COMPUTERS / Security / General.  |2 bisacsh 
653 |a Cyber Threat. 
653 |a Cybercrime. 
653 |a Cybersecurity. 
653 |a Hacking. 
653 |a Phishing. 
653 |a Security. 
653 |a Virus. 
700 1 |a Donaldson, Scott,   |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Siegel, Stanley,   |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t DG Ebook Package English 2020  |z 9783110696288 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t DG Plus DeG Package 2020 Part 1  |z 9783110696271 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t De Gruyter English eBooks 2020 - UC  |z 9783110659061 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t EBOOK PACKAGE COMPLETE 2020 English  |z 9783110704716 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t EBOOK PACKAGE COMPLETE 2020  |z 9783110704518  |o ZDB-23-DGG 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t EBOOK PACKAGE Engineering, Computer Sciences 2020 English  |z 9783110704815 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t EBOOK PACKAGE Engineering, Computer Sciences 2020  |z 9783110704617  |o ZDB-23-DEI 
776 0 |c EPUB  |z 9781501506420 
776 0 |c print  |z 9781501515248 
856 4 0 |u https://doi.org/10.1515/9781501506529 
856 4 0 |u https://www.degruyter.com/isbn/9781501506529 
856 4 2 |3 Cover  |u https://www.degruyter.com/cover/covers/9781501506529.jpg 
912 |a 978-3-11-065906-1 De Gruyter English eBooks 2020 - UC  |b 2020 
912 |a 978-3-11-069627-1 DG Plus DeG Package 2020 Part 1  |b 2020 
912 |a 978-3-11-069628-8 DG Ebook Package English 2020  |b 2020 
912 |a 978-3-11-070471-6 EBOOK PACKAGE COMPLETE 2020 English  |b 2020 
912 |a 978-3-11-070481-5 EBOOK PACKAGE Engineering, Computer Sciences 2020 English  |b 2020 
912 |a EBA_CL_CHCOMSGSEN 
912 |a EBA_DGALL 
912 |a EBA_EBKALL 
912 |a EBA_ECL_CHCOMSGSEN 
912 |a EBA_EEBKALL 
912 |a EBA_ESTMALL 
912 |a EBA_STMALL 
912 |a GBV-deGruyter-alles 
912 |a PDA12STME 
912 |a PDA13ENGE 
912 |a PDA18STMEE 
912 |a PDA5EBK 
912 |a ZDB-23-DEI  |b 2020 
912 |a ZDB-23-DGG  |b 2020