Atnaujinkite slapukų nuostatas

El. knyga: Cyber Security Management: A Governance, Risk and Compliance Framework

  • Formatas: 262 pages
  • Išleidimo metai: 13-May-2016
  • Leidėjas: Routledge
  • Kalba: eng
  • ISBN-13: 9781317155256
  • Formatas: 262 pages
  • Išleidimo metai: 13-May-2016
  • Leidėjas: Routledge
  • Kalba: eng
  • ISBN-13: 9781317155256

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

Cyber Security Management: A Governance, Risk and Compliance Framework by Peter Trim and Yang-Im Lee has been written for a wide audience. Derived from research, it places security management in a holistic context and outlines how the strategic marketing approach can be used to underpin cyber security in partnership arrangements. The book is unique because it integrates material that is of a highly specialized nature but which can be interpreted by those with a non-specialist background in the area. Indeed, those with a limited knowledge of cyber security will be able to develop a comprehensive understanding of the subject and will be guided into devising and implementing relevant policy, systems and procedures that make the organization better able to withstand the increasingly sophisticated forms of cyber attack. The book includes a sequence-of-events model; an organizational governance framework; a business continuity management planning framework; a multi-cultural communication model; a cyber security management model and strategic management framework; an integrated governance mechanism; an integrated resilience management model; an integrated management model and system; a communication risk management strategy; and recommendations for counteracting a range of cyber threats. Cyber Security Management: A Governance, Risk and Compliance Framework simplifies complex material and provides a multi-disciplinary perspective and an explanation and interpretation of how managers can manage cyber threats in a pro-active manner and work towards counteracting cyber threats both now and in the future.

Recenzijos

Cyberattacks are growing in volume and sophistication and will continue to do so. The authors believe that attacks will increase in severity before adequate solutions can be developed and deployed. The book will be most valuable to those implementing a cybersecurity program who need a strategic overview of what is required, and to those who have implemented such a program and wish to validate it. Security Management, August 2015

List of Figures and Diagrams
xi
List of Tables
xiii
List of Appendices
xv
About the Authors xvii
Preface xix
Foreword xxi
Mike Popham
Chapter 1 Introduction and Background to the Research
1(16)
1.0 Introduction
1(1)
1.1 Placing Cyber Threats and the Research in Context
1(3)
1.2 Promoting a Holistic View of Security
4(2)
1.3 Research Plan
6(1)
1.4 Methodological Approach and Data Collection Process
7(1)
1.5 Conclusion
8(9)
References
9(1)
Websites
9(8)
Chapter 2 Sequence-of-Events Model
17(26)
2.0 Introduction
17(1)
2.1 Cyber Security Analysis
17(2)
2.2 Corporate Security and Corporate Intelligence
19(1)
2.3 Cyber Security Threats
20(4)
2.4 Issues, Developments and Considerations Needing Answers
24(3)
2.5 Enterprise Risk Management (ERM)
27(2)
2.6 Issues for Commerce, Industry and Government
29(2)
2.7 Building Trust Based Relationships
31(1)
2.8 The Protective Umbrella
32(1)
2.9 Justifying the Approach
32(1)
2.10 Sequence-of-Events Model
33(3)
2.11 Conclusion
36(7)
References
36(2)
Television Programme
38(5)
Chapter 3 Organizational Strategic Governance Framework
43(12)
3.0 Introduction
43(1)
3.1 Setting the Scene
43(2)
3.2 Inter-organizational Development
45(3)
3.3 An Organizational Strategic Governance Framework
48(2)
3.4 Conclusion
50(5)
References
50(5)
Chapter 4 Business Continuity Management Planning Framework
55(22)
4.0 Introduction
55(1)
4.1 Business Continuity Management
55(2)
4.2 Dependency Modelling
57(1)
4.3 IT and Risk Management
58(2)
4.4 Business Continuity in the Context of IT
60(5)
4.5 The Relevance of Strategic Purchasing
65(3)
4.6 A Nine Stage Business Continuity Planning Process
68(1)
4.7 Education and Training
69(1)
4.8 A Business Continuity Management Planning Framework
70(3)
4.9 Conclusion
73(4)
References
73(4)
Chapter 5 Communication Risk Management Strategy
77(8)
5.0 Introduction
77(1)
5.1 Culture and Communication
77(3)
5.2 Business Continuity Management Planning Revisited
80(1)
5.3 Communication Risk Management Strategy
81(1)
5.4 Conclusion
81(4)
References
82(3)
Chapter 6 Risk Assessment Policy and its Strategic Context
85(16)
6.0 Introduction
85(1)
6.1 Understanding what Risk Involves
85(1)
6.2 Defining the Term Vulnerability
86(1)
6.3 Risk Assessment Policy
86(6)
6.4 Strategic Management Framework
92(3)
6.5 Cyber Security Strategy
95(1)
6.6 Cloud Computing
95(2)
6.7 Conclusion
97(4)
References
98(3)
Chapter 7 Resilience Policy and Strategy Mapping
101(14)
7.0 Introduction
101(1)
7.1 Risk and Resilience Defined
101(1)
7.2 Examples Underpinning the Need for Resilience
102(6)
7.3 Resilience Policy
108(1)
7.4 Promoting Resilience
108(2)
7.5 Resilience Domains and Features
110(2)
7.6 Conclusion
112(3)
References
112(3)
Chapter 8 Integrated Resilience Management Model
115(8)
8.0 Introduction
115(1)
8.1 Setting the Scene
115(1)
8.2 Formulating a Resilience Policy
116(1)
8.3 Security Awareness and Organizational Learning
117(1)
8.4 Working with the Workforce
118(2)
8.5 Conclusion
120(3)
References
120(3)
Chapter 9 Integrated Management Model and System
123(8)
9.0 Introduction
123(1)
9.1 Placing the Material in a Security Context
123(1)
9.2 Security Management
124(4)
9.3 Conclusion
128(3)
References
129(2)
Chapter 10 Integrated Governance Mechanism
131(10)
10.0 Introduction
131(1)
10.1 Placing Corporate Governance in Context
131(3)
10.2 Harnessing Appropriate Technology
134(2)
10.3 Organizational Commitment to Corporate Governance
136(2)
10.4 Corporate Governance Revisited
138(1)
10.5 Conclusion
138(3)
References
138(1)
Website
139(2)
Chapter 11 Threat Identification
141(12)
11.0 Introduction
141(1)
11.1 UK Cyber Security Strategy and Changing Threats
141(1)
11.2 Cloud Computing: Opportunities and Threats
142(2)
11.3 Insights into Counteracting Cyber Attacks
144(3)
11.4 The International Context
147(2)
11.5 Organizational Considerations
149(1)
11.6 Conclusion
150(3)
References
150(3)
Chapter 12 Competitor and Marketing Analysis
153(20)
12.0 Introduction
153(1)
12.1 Proteus's Capabilities
153(3)
12.2 Consumerization of IT
156(1)
12.3 Consideration of Current Cyber Security Issues and Challenges
157(1)
12.4 Preventing Cyber Attacks
158(1)
12.5 Mapping of Key Variables and Characteristics
159(1)
12.6 South Korean Security Market
160(1)
12.7 Conclusion
161(12)
References
162(11)
Chapter 13 Governance and Compliance Decision Making Process
173(16)
13.0 Introduction
173(1)
13.1 Linking Organizational Resilience with Corporate Governance
173(2)
13.2 Organizational Decision Making Approach
175(1)
13.3 New Business Models
175(2)
13.4 Future Impacts
177(3)
13.5 Information Security Governance
180(5)
13.6 Lessons Learned
185(1)
13.7 Conclusion
185(4)
References
186(3)
Chapter 14 Integrated Security Mechanism
189(20)
14.0 Introduction
189(1)
14.1 Security Concerns
189(3)
14.2 Consumerization of IT
192(1)
14.3 The Proteus Envelope
193(2)
14.4 Integrating Security with Intelligence
195(1)
14.5 The Benefits of Cloud Computing
196(1)
14.6 Safeguarding Data
197(1)
14.7 Future Working Practices
197(1)
14.8 Issues and Concerns to be Researched
198(4)
14.9 Issues Related to Using Cloud Computing
202(4)
14.10 Conclusion
206(3)
References
207(1)
Websites
208(1)
Chapter 15 Modified and Extended Generic Cyber Security Management Model (MEGCSMM) and Strategic Management Framework, and Project Liaison Team Management
209(12)
15.0 Introduction
209(1)
15.1 Strategic Security Framework
210(1)
15.2 Impact Analysis
210(1)
15.3 Corporate Governance
211(1)
15.4 Modified and Extended Generic Cyber Security Management Model (MEGCSMM) and Strategic Management Framework
212(4)
15.5 Learning Organization
216(1)
15.6 Project Liaison Team Management
216(3)
15.7 Conclusion
219(2)
References
219(2)
Chapter 16 Recommendations for Counteracting Cyber Threats
221(10)
16.0 Introduction
221(1)
16.1 Thinking Through the Complexities of Security and Intelligence
221(1)
16.2 Recommendations
222(6)
16.3 Conclusion
228(3)
References
228(3)
Index 231
Peter Trim is a Senior Lecturer in Management and Director of the Centre for Advanced Management and Interdisciplinary Studies at Birkbeck, University of London. He is co-author of Cyber Security Culture: Counteracting Cyber Threats through Organizational Learning and Training and has published widely in the areas of strategic marketing and corporate intelligence. He has been involved in two network security projects funded by the Technology Strategy Board, one of which was also funded by SEEDA. Yang-Im Lee is a Senior Lecturer in Marketing at Westminster Business School, University of Westminster. She has studied at several institutions including SOAS and Stirling University. She has published widely in the areas of culture, strategic marketing, and international management and has worked on two network security projects funded by the Technology Strategy Board, one of which was also funded by SEEDA.