|
List of Figures and Diagrams |
|
|
xi | |
|
|
xiii | |
|
|
xv | |
About the Authors |
|
xvii | |
Preface |
|
xix | |
Foreword |
|
xxi | |
|
|
Chapter 1 Introduction and Background to the Research |
|
|
1 | (16) |
|
|
1 | (1) |
|
1.1 Placing Cyber Threats and the Research in Context |
|
|
1 | (3) |
|
1.2 Promoting a Holistic View of Security |
|
|
4 | (2) |
|
|
6 | (1) |
|
1.4 Methodological Approach and Data Collection Process |
|
|
7 | (1) |
|
|
8 | (9) |
|
|
9 | (1) |
|
|
9 | (8) |
|
Chapter 2 Sequence-of-Events Model |
|
|
17 | (26) |
|
|
17 | (1) |
|
2.1 Cyber Security Analysis |
|
|
17 | (2) |
|
2.2 Corporate Security and Corporate Intelligence |
|
|
19 | (1) |
|
2.3 Cyber Security Threats |
|
|
20 | (4) |
|
2.4 Issues, Developments and Considerations Needing Answers |
|
|
24 | (3) |
|
2.5 Enterprise Risk Management (ERM) |
|
|
27 | (2) |
|
2.6 Issues for Commerce, Industry and Government |
|
|
29 | (2) |
|
2.7 Building Trust Based Relationships |
|
|
31 | (1) |
|
2.8 The Protective Umbrella |
|
|
32 | (1) |
|
2.9 Justifying the Approach |
|
|
32 | (1) |
|
2.10 Sequence-of-Events Model |
|
|
33 | (3) |
|
|
36 | (7) |
|
|
36 | (2) |
|
|
38 | (5) |
|
Chapter 3 Organizational Strategic Governance Framework |
|
|
43 | (12) |
|
|
43 | (1) |
|
|
43 | (2) |
|
3.2 Inter-organizational Development |
|
|
45 | (3) |
|
3.3 An Organizational Strategic Governance Framework |
|
|
48 | (2) |
|
|
50 | (5) |
|
|
50 | (5) |
|
Chapter 4 Business Continuity Management Planning Framework |
|
|
55 | (22) |
|
|
55 | (1) |
|
4.1 Business Continuity Management |
|
|
55 | (2) |
|
|
57 | (1) |
|
4.3 IT and Risk Management |
|
|
58 | (2) |
|
4.4 Business Continuity in the Context of IT |
|
|
60 | (5) |
|
4.5 The Relevance of Strategic Purchasing |
|
|
65 | (3) |
|
4.6 A Nine Stage Business Continuity Planning Process |
|
|
68 | (1) |
|
4.7 Education and Training |
|
|
69 | (1) |
|
4.8 A Business Continuity Management Planning Framework |
|
|
70 | (3) |
|
|
73 | (4) |
|
|
73 | (4) |
|
Chapter 5 Communication Risk Management Strategy |
|
|
77 | (8) |
|
|
77 | (1) |
|
5.1 Culture and Communication |
|
|
77 | (3) |
|
5.2 Business Continuity Management Planning Revisited |
|
|
80 | (1) |
|
5.3 Communication Risk Management Strategy |
|
|
81 | (1) |
|
|
81 | (4) |
|
|
82 | (3) |
|
Chapter 6 Risk Assessment Policy and its Strategic Context |
|
|
85 | (16) |
|
|
85 | (1) |
|
6.1 Understanding what Risk Involves |
|
|
85 | (1) |
|
6.2 Defining the Term Vulnerability |
|
|
86 | (1) |
|
6.3 Risk Assessment Policy |
|
|
86 | (6) |
|
6.4 Strategic Management Framework |
|
|
92 | (3) |
|
6.5 Cyber Security Strategy |
|
|
95 | (1) |
|
|
95 | (2) |
|
|
97 | (4) |
|
|
98 | (3) |
|
Chapter 7 Resilience Policy and Strategy Mapping |
|
|
101 | (14) |
|
|
101 | (1) |
|
7.1 Risk and Resilience Defined |
|
|
101 | (1) |
|
7.2 Examples Underpinning the Need for Resilience |
|
|
102 | (6) |
|
|
108 | (1) |
|
|
108 | (2) |
|
7.5 Resilience Domains and Features |
|
|
110 | (2) |
|
|
112 | (3) |
|
|
112 | (3) |
|
Chapter 8 Integrated Resilience Management Model |
|
|
115 | (8) |
|
|
115 | (1) |
|
|
115 | (1) |
|
8.2 Formulating a Resilience Policy |
|
|
116 | (1) |
|
8.3 Security Awareness and Organizational Learning |
|
|
117 | (1) |
|
8.4 Working with the Workforce |
|
|
118 | (2) |
|
|
120 | (3) |
|
|
120 | (3) |
|
Chapter 9 Integrated Management Model and System |
|
|
123 | (8) |
|
|
123 | (1) |
|
9.1 Placing the Material in a Security Context |
|
|
123 | (1) |
|
|
124 | (4) |
|
|
128 | (3) |
|
|
129 | (2) |
|
Chapter 10 Integrated Governance Mechanism |
|
|
131 | (10) |
|
|
131 | (1) |
|
10.1 Placing Corporate Governance in Context |
|
|
131 | (3) |
|
10.2 Harnessing Appropriate Technology |
|
|
134 | (2) |
|
10.3 Organizational Commitment to Corporate Governance |
|
|
136 | (2) |
|
10.4 Corporate Governance Revisited |
|
|
138 | (1) |
|
|
138 | (3) |
|
|
138 | (1) |
|
|
139 | (2) |
|
Chapter 11 Threat Identification |
|
|
141 | (12) |
|
|
141 | (1) |
|
11.1 UK Cyber Security Strategy and Changing Threats |
|
|
141 | (1) |
|
11.2 Cloud Computing: Opportunities and Threats |
|
|
142 | (2) |
|
11.3 Insights into Counteracting Cyber Attacks |
|
|
144 | (3) |
|
11.4 The International Context |
|
|
147 | (2) |
|
11.5 Organizational Considerations |
|
|
149 | (1) |
|
|
150 | (3) |
|
|
150 | (3) |
|
Chapter 12 Competitor and Marketing Analysis |
|
|
153 | (20) |
|
|
153 | (1) |
|
12.1 Proteus's Capabilities |
|
|
153 | (3) |
|
12.2 Consumerization of IT |
|
|
156 | (1) |
|
12.3 Consideration of Current Cyber Security Issues and Challenges |
|
|
157 | (1) |
|
12.4 Preventing Cyber Attacks |
|
|
158 | (1) |
|
12.5 Mapping of Key Variables and Characteristics |
|
|
159 | (1) |
|
12.6 South Korean Security Market |
|
|
160 | (1) |
|
|
161 | (12) |
|
|
162 | (11) |
|
Chapter 13 Governance and Compliance Decision Making Process |
|
|
173 | (16) |
|
|
173 | (1) |
|
13.1 Linking Organizational Resilience with Corporate Governance |
|
|
173 | (2) |
|
13.2 Organizational Decision Making Approach |
|
|
175 | (1) |
|
|
175 | (2) |
|
|
177 | (3) |
|
13.5 Information Security Governance |
|
|
180 | (5) |
|
|
185 | (1) |
|
|
185 | (4) |
|
|
186 | (3) |
|
Chapter 14 Integrated Security Mechanism |
|
|
189 | (20) |
|
|
189 | (1) |
|
|
189 | (3) |
|
14.2 Consumerization of IT |
|
|
192 | (1) |
|
14.3 The Proteus Envelope |
|
|
193 | (2) |
|
14.4 Integrating Security with Intelligence |
|
|
195 | (1) |
|
14.5 The Benefits of Cloud Computing |
|
|
196 | (1) |
|
|
197 | (1) |
|
14.7 Future Working Practices |
|
|
197 | (1) |
|
14.8 Issues and Concerns to be Researched |
|
|
198 | (4) |
|
14.9 Issues Related to Using Cloud Computing |
|
|
202 | (4) |
|
|
206 | (3) |
|
|
207 | (1) |
|
|
208 | (1) |
|
Chapter 15 Modified and Extended Generic Cyber Security Management Model (MEGCSMM) and Strategic Management Framework, and Project Liaison Team Management |
|
|
209 | (12) |
|
|
209 | (1) |
|
15.1 Strategic Security Framework |
|
|
210 | (1) |
|
|
210 | (1) |
|
15.3 Corporate Governance |
|
|
211 | (1) |
|
15.4 Modified and Extended Generic Cyber Security Management Model (MEGCSMM) and Strategic Management Framework |
|
|
212 | (4) |
|
15.5 Learning Organization |
|
|
216 | (1) |
|
15.6 Project Liaison Team Management |
|
|
216 | (3) |
|
|
219 | (2) |
|
|
219 | (2) |
|
Chapter 16 Recommendations for Counteracting Cyber Threats |
|
|
221 | (10) |
|
|
221 | (1) |
|
16.1 Thinking Through the Complexities of Security and Intelligence |
|
|
221 | (1) |
|
|
222 | (6) |
|
|
228 | (3) |
|
|
228 | (3) |
Index |
|
231 | |