Many professions--including medicine, law, and engineering--have long required their practitioners to embrace and abide by an overarching code of ethics and conduct. Cybersecurity, possibly due to its more fragmented and distributed nature, has never had such a code. The gap left by the absence of an ethical standard is a significant threat to the safety of consumers and businesses around the world. In The Code of Honor: Embracing Ethics in Cybersecurity, Ed Skoudis, president of SANS.edu and Paul Maurer, president of Montreat College, deliver a comprehensive discussion of the ethical…mehr
Many professions--including medicine, law, and engineering--have long required their practitioners to embrace and abide by an overarching code of ethics and conduct. Cybersecurity, possibly due to its more fragmented and distributed nature, has never had such a code. The gap left by the absence of an ethical standard is a significant threat to the safety of consumers and businesses around the world. In The Code of Honor: Embracing Ethics in Cybersecurity, Ed Skoudis, president of SANS.edu and Paul Maurer, president of Montreat College, deliver a comprehensive discussion of the ethical challenges facing contemporary workers, managers, and executives. This book explains and establishes ethical best practices for the tech industry. The need is so compelling that security practitioners and leaders around the world are currently incorporating this code into the fabric of their corporate culture and hiring policies. You'll take a deep dive into many of the high-stakes situations commonly encountered. Compelling case studies--called Critical Applications in the book--included at the end of each chapter demonstrate how to use the hands-on skills being explored within. You'll discover a complete system of cybersecurity ethics relevant to everyone from C-suite leaders and executives to ground-level cybersecurity pros. This carefully crafted framework of ethical decision-making in cybersecurity is rooted in timeless principles of ethics. An essential resource for security analysts, incident responders, threat hunters, forensics experts, penetration testers, red teamers, security researchers, security architects, CISOs, and any other cybersecurity professional, The Code of Honor is timely and practical for the ever-increasing challenges that are rampant in the modern world of cybersecurity.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
PAUL J. MAURER, PhD, is the president of Montreat College, a national leader in cybersecurity education and workforce development. After being approached by the NSA to create a curriculum on cybersecurity ethics for our nation's students preparing for cybersecurity careers, Paul was convinced this book needed to be written. He speaks and writes frequently on a wide range of topics, but regularly does so on cybersecurity across the country. ED SKOUDIS serves as president of the SANS Technology Institute College, the country's leading provider of cybersecurity professional development. Ed began teaching at the SANS Institute in 1999 and has trained over 30,000 cybersecurity professionals in incident response and ethical hacking, codifying many of the practices used throughout the industry today. He is the recipient of the Order of Thor medal from the Military Cyber Professionals Association and is the author of Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses.
Inhaltsangabe
Introduction: "Like Your Hair Is On Fire" ix Chapter 1 One Code to Rule Them All? 1 In Case You Are Wondering Why You Should Care 3 Do We Need Ethics in Cybersecurity? 6 Long-Standing Models for the Code 9 Why the Need for the Code Is Urgent 11 Chapter 2 This Is a Human Business 15 Cybersecurity Is a Human Business 18 Humans Have Inherent Value 20 Humans Over Technology 21 The Solution to the Problem of Cybersecurity Is Principally a Human Solution 24 Character Costs and Character Pays 25 Case Study: When Security Is on the Chopping Block 27 Chapter 3 To Serve and Protect 33 We Need You on That Wall 35 Know Your Why- Purpose and People 37 Service Means Sharing: Sharing Starts with Good Communication 42 Sharing with the Broader Cyber Community: We Are All on the Same Wall 44 Checking In 46 A Final Example 47 Case Study: Responsible Disclosure of a Security Flaw 48 Chapter 4 "Zero-Day" Humanity and Accountability 51 Bad Decisions and Multiplication 52 Humans Are Flawed 55 Turning Vulnerability into Strength: It Begins with Humility 56 Being a Lifelong Learner 60 Handling the Mistakes of Others 62 Let's Try to Avoid "Breaking Bad" 63 How to Develop a Reflective Practice 67 Case Study: To Pay or Not to Pay- A Ransomware Quandary 69 Chapter 5 It Begins and Ends with Trust 75 The Secret of Success 77 Trust Is the Currency of Cybersecurity 80 How Trust Is Built 82 When Things Go Bad 83 Building Trust Requires Courage 84 The Role of Leadership in Building a Culture of Trust 87 A Checklist for Building Trust 90 Case Study: A Matter of Trust and Data Breaches 93 Chapter 6 There Is Strength in the Pack 99 No Room for Know-it-Alls 103 Making Informed Ethical Decisions with Input 105 Why Teamwork Really Does Make the Dream Work 106 When Collaboration Breaks Down- Seeking Allies in Your Organization 110 The Power of Mentors 111 Beware of Rattlesnakes 115 Case Study: Graded on a Curve? The Security Audit Checkmark 117 Chapter 7 Practicing Cyber Kung Fu 123 Essential to Success: Patience, Wisdom, and Self-Control 128 Remember the Titanic 129 A Few Principles for Emergency Planning 131 Stay Calm, Cool, and Collected 132 Our Job Is Not Revenge 136 Develop Your Cyber Kung Fu 138 Case Study: An Open Door: Vigilante Justice 139 Chapter 8 No Sticky Fingers Allowed 143 If It's Free, It's for Me? 146 Avoid a "Robin Hood" Narrative 148 A Tragedy of "Free Information" 150 Intellectual Property Is Property 151 To Catch a Thief, We Must Train Like One 154 Choices Have Consequences 154 All I Really Need to Know I Learned in Kindergarten 156 Case Study: Something Borrowed and Something New 157 Chapter 9 It's None of Your Business 163 Curiosity Can Kill the Cat 167 The Golden Rule Applied to Cybersecurity 169 Stay in Your Lane 170 Four Questions to Help Avoid Impropriety 172 Each Time You Cross the Line, It Becomes Easier 173 We Hurt Real Human Beings 175 An Outrageous Example of the Problem 177 Remember: We Are the Shield 179 Case Study: To Share or Not to Share? Investigating the CFO's System 181 Appendix A: The Cybersecurity Code of Honor 185 Appendix B: Where Do We Go from Here? 189 Notes 191 Acknowledgments 193 About the Authors 197 Index 199
Introduction: "Like Your Hair Is On Fire" ix Chapter 1 One Code to Rule Them All? 1 In Case You Are Wondering Why You Should Care 3 Do We Need Ethics in Cybersecurity? 6 Long-Standing Models for the Code 9 Why the Need for the Code Is Urgent 11 Chapter 2 This Is a Human Business 15 Cybersecurity Is a Human Business 18 Humans Have Inherent Value 20 Humans Over Technology 21 The Solution to the Problem of Cybersecurity Is Principally a Human Solution 24 Character Costs and Character Pays 25 Case Study: When Security Is on the Chopping Block 27 Chapter 3 To Serve and Protect 33 We Need You on That Wall 35 Know Your Why- Purpose and People 37 Service Means Sharing: Sharing Starts with Good Communication 42 Sharing with the Broader Cyber Community: We Are All on the Same Wall 44 Checking In 46 A Final Example 47 Case Study: Responsible Disclosure of a Security Flaw 48 Chapter 4 "Zero-Day" Humanity and Accountability 51 Bad Decisions and Multiplication 52 Humans Are Flawed 55 Turning Vulnerability into Strength: It Begins with Humility 56 Being a Lifelong Learner 60 Handling the Mistakes of Others 62 Let's Try to Avoid "Breaking Bad" 63 How to Develop a Reflective Practice 67 Case Study: To Pay or Not to Pay- A Ransomware Quandary 69 Chapter 5 It Begins and Ends with Trust 75 The Secret of Success 77 Trust Is the Currency of Cybersecurity 80 How Trust Is Built 82 When Things Go Bad 83 Building Trust Requires Courage 84 The Role of Leadership in Building a Culture of Trust 87 A Checklist for Building Trust 90 Case Study: A Matter of Trust and Data Breaches 93 Chapter 6 There Is Strength in the Pack 99 No Room for Know-it-Alls 103 Making Informed Ethical Decisions with Input 105 Why Teamwork Really Does Make the Dream Work 106 When Collaboration Breaks Down- Seeking Allies in Your Organization 110 The Power of Mentors 111 Beware of Rattlesnakes 115 Case Study: Graded on a Curve? The Security Audit Checkmark 117 Chapter 7 Practicing Cyber Kung Fu 123 Essential to Success: Patience, Wisdom, and Self-Control 128 Remember the Titanic 129 A Few Principles for Emergency Planning 131 Stay Calm, Cool, and Collected 132 Our Job Is Not Revenge 136 Develop Your Cyber Kung Fu 138 Case Study: An Open Door: Vigilante Justice 139 Chapter 8 No Sticky Fingers Allowed 143 If It's Free, It's for Me? 146 Avoid a "Robin Hood" Narrative 148 A Tragedy of "Free Information" 150 Intellectual Property Is Property 151 To Catch a Thief, We Must Train Like One 154 Choices Have Consequences 154 All I Really Need to Know I Learned in Kindergarten 156 Case Study: Something Borrowed and Something New 157 Chapter 9 It's None of Your Business 163 Curiosity Can Kill the Cat 167 The Golden Rule Applied to Cybersecurity 169 Stay in Your Lane 170 Four Questions to Help Avoid Impropriety 172 Each Time You Cross the Line, It Becomes Easier 173 We Hurt Real Human Beings 175 An Outrageous Example of the Problem 177 Remember: We Are the Shield 179 Case Study: To Share or Not to Share? Investigating the CFO's System 181 Appendix A: The Cybersecurity Code of Honor 185 Appendix B: Where Do We Go from Here? 189 Notes 191 Acknowledgments 193 About the Authors 197 Index 199
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/neu