Cyber Security in a Language Anyone can Understand Gotcha! An essential resource book that has not come a moment too soon. This is the essential handbook on Cyber Security for business executives. The book raises awareness of the serious nature of the cyber security threat and provides practical steps and key questions that will help assess risks and what they mean to you and your organisation. Gotcha! Is an easy-to-read, yet deeply informative resource, book that addresses the crucial issues that come with the new normal operating environment of 21st century life. Taking a vital step towards…mehr
Cyber Security in a Language Anyone can Understand Gotcha! An essential resource book that has not come a moment too soon. This is the essential handbook on Cyber Security for business executives. The book raises awareness of the serious nature of the cyber security threat and provides practical steps and key questions that will help assess risks and what they mean to you and your organisation. Gotcha! Is an easy-to-read, yet deeply informative resource, book that addresses the crucial issues that come with the new normal operating environment of 21st century life. Taking a vital step towards bridging the gap between cyber security experts and the influence of the board, executive and management you will be empowered with the tools and insights necessary to start protecting yourself and your organisation. Why is Cyber Security so important? From communication to commerce, in our entire modern way of life we are dependent on the internet. Cybercrime is a new danger that affects everyone and is at the top of the board agenda for every responsible organisation. Gotcha! includes cyber security checklists for individuals to small companies to large organisations that will enable you to consider whether you and your organisation have the basics covered, assess the potential risks and take action! Gotcha! The book is the core part of a series of educational tools and programs to help anyone from any walk or level of life stay on top of cyber security, including a card game, roadshow and other initiatives. Stay up-to-date at www.csns.co. Gotcha! Cyber security in a language anyone can understand, and not a moment too soon. This essential, easy-to-read, yet deeply informative handbook on Cyber Security provides key questions to ask in assessing cyber security risks along with cyber security checklists for individuals, smaller and larger organisations to take action! Gotcha! has not come a moment too soon for business executives. This essential, easy-to-read, yet deeply informative handbook on Cyber Security provides practical steps and key questions to ask in assessing potential threats. With cyber security checklists for individuals to small companies to large organisations Gotcha! will enable you to assess the potential risk and take action! Gotcha!Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Dr. Sally Ernst, co-founder UK and Australian Cyber Security Networks (www.CSNs.co), has over 15 years leadership experience in British and Asia-Pacific tech companies. She has held board positions, contributed to government-led forums, and invested in start-ups. Sally's Doctorate, along with her MBA, specialises in tech intrapreneurship in a radical innovation context and she continues to be involved in industry research. An international cyber security strategist and businesswoman, Sally regularly speaks on cyber security from a business perspective.
Inhaltsangabe
CHAPTER 1: We're All a Dot Com .......................................... 13 The Gotcha......................................................................... 19 CHAPTER 2: Some Scenarios ............................................... 23 Scenario 1: APT and Destructive Payload.......................... 24 Scenario 2: Supply Chain Risk........................................... 26 Scenario 3: Medical Centres.............................................. 28 Scenario 4: The Horse has Bolted...................................... 29 CHAPTER 3: How Things Work (and do not Work)................. 33 The Internet........................................................................ 34 Servers and the Cloud........................................................ 36 Corporate Networks........................................................... 38 Firewalls.............................................................................. 40 Antivirus.............................................................................. 43 VPNs................................................................................... 44 Encryption.......................................................................... 45 Passwords.......................................................................... 46 >/b>........................ 49 Protecting the 'Endpoint'.................................................... 50 Monitoring.......................................................................... 52 Well-tested Incident Response Plans................................. 54 Knowing our Vulnerabilities................................................ 54 Backups............................................................................. 55 Strategic Cyber Security Governance................................ 56 APT and Government Contact........................................... 57 CHAPTER 5: Some Terms We May Have Heard............... 61 Big Data.............................................................................. 62 Botnet................................................................................. 62 BYOD.................................................................................. 63 Cookies.............................................................................. 63 Distributed Denial of Service Attack.................................. 64 Drive-by.............................................................................. 65 Waterholing........................................................................ 65 External Media................................................................... 66 Insiders............................................................................... 66 Phishing.............................................................................. 67 Spearphishing.................................................................... 69 Ransomware....................................................................... 69 Remote Access Tool........................................................... 70 Social Media Leakage........................................................ 70 Spyware.............................................................................. 71 Viruses, Worms and Trojans............................................... 72 Blended Threats................................................................. 73 CHAPTER 6: What to Do Next........................................... 75 For Everyone...................................................................... 76 For Small to Medium Businesses....................................... 79 For Larger Government or Corporations............................ 83 CHAPTER 7: CyberBasics Checklists................................ 89 Checklist for Everyone........................................................90 Checklist for Small and Medium Business......................... 93 Checklist for Larger Government or Corporations.............96
CHAPTER 1: We're All a Dot Com .......................................... 13 The Gotcha......................................................................... 19 CHAPTER 2: Some Scenarios ............................................... 23 Scenario 1: APT and Destructive Payload.......................... 24 Scenario 2: Supply Chain Risk........................................... 26 Scenario 3: Medical Centres.............................................. 28 Scenario 4: The Horse has Bolted...................................... 29 CHAPTER 3: How Things Work (and do not Work)................. 33 The Internet........................................................................ 34 Servers and the Cloud........................................................ 36 Corporate Networks........................................................... 38 Firewalls.............................................................................. 40 Antivirus.............................................................................. 43 VPNs................................................................................... 44 Encryption.......................................................................... 45 Passwords.......................................................................... 46 >/b>........................ 49 Protecting the 'Endpoint'.................................................... 50 Monitoring.......................................................................... 52 Well-tested Incident Response Plans................................. 54 Knowing our Vulnerabilities................................................ 54 Backups............................................................................. 55 Strategic Cyber Security Governance................................ 56 APT and Government Contact........................................... 57 CHAPTER 5: Some Terms We May Have Heard............... 61 Big Data.............................................................................. 62 Botnet................................................................................. 62 BYOD.................................................................................. 63 Cookies.............................................................................. 63 Distributed Denial of Service Attack.................................. 64 Drive-by.............................................................................. 65 Waterholing........................................................................ 65 External Media................................................................... 66 Insiders............................................................................... 66 Phishing.............................................................................. 67 Spearphishing.................................................................... 69 Ransomware....................................................................... 69 Remote Access Tool........................................................... 70 Social Media Leakage........................................................ 70 Spyware.............................................................................. 71 Viruses, Worms and Trojans............................................... 72 Blended Threats................................................................. 73 CHAPTER 6: What to Do Next........................................... 75 For Everyone...................................................................... 76 For Small to Medium Businesses....................................... 79 For Larger Government or Corporations............................ 83 CHAPTER 7: CyberBasics Checklists................................ 89 Checklist for Everyone........................................................90 Checklist for Small and Medium Business......................... 93 Checklist for Larger Government or Corporations.............96
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826