Language:
English
簡体中文
繁體中文
Help
Login
Create an account
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cyber security. Simply. Make it happen. : leveraging digitization through IT security
Record Type:
Language materials, printed : monographic
Title Information:
leveraging digitization through IT security
Secondary Intellectual Responsibility:
AbolhassanFerri,
Place of Publication:
Cham, Switzerland
Published:
Springer;
Year of Publication:
2017
Description:
xiii, 127 p.ill. : 24 cm.;
Series:
Management for professionals
Subject:
Internet - Security measures -
Subject:
Computer networks - Security measures. -
ISBN:
978-3-319-46528-9bound
Content Note:
Foreword; Trust Is the Basis of Digitization; Digitization Offers Great Opportunities; Data Protection and Digital Business Models Are Not in Opposition; Security Has to Be Simple; Contents; 1: Security: The Real Challenge for Digitalization; 1.1Introduction; 1.2 Status Quo: The Cloud Is the Backbone of Digitalization; 1.3 Data Security: Only a Secure Cloud Will Lead to Secure Digitalization; 1.3.1 Risk Transformation: It Has to BeEasy to Get into the Cloud; 1.3.2 Risk of an Incident: Making Sure the Cloud Doesńt Crash 1.3.3 Risk of Technical/Physical Attack: A Castle Wall Alone Isńt Enough1.3.4 Risk of a Cyberattack: Ensuring Data and Devices Areńt Casualties; 1.4 Looking to the Future; 1.5 Conclusion; References; 2: Security Policy: Rules for Cyberspace;2.1 Taking Stock: Digital Warfare in the 21st Century; 2.2 Challenges for the Political Sphere: Rules, Resources and Expertise; 2.3 Outlook: A Strategy for the Digital Age; References; 3: Data Protection Empowerment; 3.1 Code Is Law; 3.2 Empowerment; 3.3 Information Technology and Social Values; References 4.4.6 Report4.5 Conclusion; References; 5: The Law and Its Contribution to IT Security: Legal Framework, Requirements, Limits; 5.1 Key Features of the Existing Legal Framework; 5.1.1 IT Compliance: A Challenge for Management Boards and Executives; 5.1.1.1 The Cornerstone of IT Compliance: IT Security; 5.1.1.2 Liability of the Management Board and Executives; 5.1.2 Who Is Responsible?; 5.1.2.1 Requirements for Software Manufacturers; 5.1.2.2 Requirements for Network and Platform Operators; 5.1.2.3 Legal Framework for Providers of IT Services 4: Red Teaming and Wargaming: How Can Management and Supervisory Board Members Become More Involved in Cybersecurity?4.1 Cybersecurity: A Management Board Issue; 4.2 Integrating the Management Board into Existing Cybersecurity Strategies; 4.3 Red Teaming and Wargaming; 4.3.1 Red Teaming Defined; 4.3.2 Wargaming Defined; 4.3.3 Differences Compared withMethods Currently in Use; 4.4 Use of Red Teaming in Combination with Wargaming at Companies; 4.4.1 Classification; 4.4.2 Definition of a Target; 4.4.3 Composition of the Teams; 4.4.4 Analysis: Data Collection and Evaluation; 4.4.5 Wargaming 5.1.3 Regulation on Determining Critical Infrastructure5.1.4 Controversial: Changes Affecting Telemedia Services; 5.2 International Issues: The European Unionś Directive on Security of Network and Information Systems (NIS Directive); 5.3 Data Protection and Data Security in the United States; 5.4 Data Exchange Between EU and US Companies; 5.4.1 Safe Harbor; 5.4.2 Privacy Shield; 5.5 Conclusion: Many Legal Issues to Consider; References; 6: IT Security: Stronger Together; 6.1 The Trinity ofIT Security; 6.2 CSSA
Cyber security. Simply. Make it happen. : leveraging digitization through IT security
Cyber security. Simply. Make it happen.
: leveraging digitization through IT security / Ferri Abolhassan, editor - Cham, Switzerland : Springer, 2017. - xiii, 127 p. ; ill. ; 24 cm.. - (Management for professionals).
Foreword; Trust Is the Basis of Digitization; Digitization Offers Great Opportunities; Data Protection and Digital Business Models Are Not in Opposition; Security Has to Be Simple; Contents; 1: Security: The Real Challenge for Digitalization; 1.1Introduction; 1.2 Status Quo: The Cloud Is the Backbone of Digitalization; 1.3 Data Security: Only a Secure Cloud Will Lead to Secure Digitalization; 1.3.1 Risk Transformation: It Has to BeEasy to Get into the Cloud; 1.3.2 Risk of an Incident: Making Sure the Cloud Doesńt Crash.
Includes bibliographical references..
ISBN 978-3-319-46528-9
InternetComputer networks -- Security measures -- Security measures.
Abolhassan, Ferri
Cyber security. Simply. Make it happen. : leveraging digitization through IT security
LDR
:03362nam0 2200193 450
001
322134
005
20170531222146.0
010
1
$a
978-3-319-46528-9
$b
bound
$d
NT$1596
100
$a
20170603d2017 u y1
101
0
$a
eng
102
$a
ch
105
$a
y 000yy
200
0
$a
Cyber security. Simply. Make it happen.
$e
leveraging digitization through IT security
$f
Ferri Abolhassan, editor
210
$a
Cham, Switzerland
$d
2017
$c
Springer
215
1
$a
xiii, 127 p.
$c
ill.
$d
24 cm.
225
2 #
$a
Management for professionals
320
$a
Includes bibliographical references.
327
0
$a
Foreword; Trust Is the Basis of Digitization; Digitization Offers Great Opportunities; Data Protection and Digital Business Models Are Not in Opposition; Security Has to Be Simple; Contents; 1: Security: The Real Challenge for Digitalization; 1.1Introduction; 1.2 Status Quo: The Cloud Is the Backbone of Digitalization; 1.3 Data Security: Only a Secure Cloud Will Lead to Secure Digitalization; 1.3.1 Risk Transformation: It Has to BeEasy to Get into the Cloud; 1.3.2 Risk of an Incident: Making Sure the Cloud Doesńt Crash
$a
1.3.3 Risk of Technical/Physical Attack: A Castle Wall Alone Isńt Enough1.3.4 Risk of a Cyberattack: Ensuring Data and Devices Areńt Casualties; 1.4 Looking to the Future; 1.5 Conclusion; References; 2: Security Policy: Rules for Cyberspace;2.1 Taking Stock: Digital Warfare in the 21st Century; 2.2 Challenges for the Political Sphere: Rules, Resources and Expertise; 2.3 Outlook: A Strategy for the Digital Age; References; 3: Data Protection Empowerment; 3.1 Code Is Law; 3.2 Empowerment; 3.3 Information Technology and Social Values; References
$a
4.4.6 Report4.5 Conclusion; References; 5: The Law and Its Contribution to IT Security: Legal Framework, Requirements, Limits; 5.1 Key Features of the Existing Legal Framework; 5.1.1 IT Compliance: A Challenge for Management Boards and Executives; 5.1.1.1 The Cornerstone of IT Compliance: IT Security; 5.1.1.2 Liability of the Management Board and Executives; 5.1.2 Who Is Responsible?; 5.1.2.1 Requirements for Software Manufacturers; 5.1.2.2 Requirements for Network and Platform Operators; 5.1.2.3 Legal Framework for Providers of IT Services
$a
4: Red Teaming and Wargaming: How Can Management and Supervisory Board Members Become More Involved in Cybersecurity?4.1 Cybersecurity: A Management Board Issue; 4.2 Integrating the Management Board into Existing Cybersecurity Strategies; 4.3 Red Teaming and Wargaming; 4.3.1 Red Teaming Defined; 4.3.2 Wargaming Defined; 4.3.3 Differences Compared withMethods Currently in Use; 4.4 Use of Red Teaming in Combination with Wargaming at Companies; 4.4.1 Classification; 4.4.2 Definition of a Target; 4.4.3 Composition of the Teams; 4.4.4 Analysis: Data Collection and Evaluation; 4.4.5 Wargaming
$a
5.1.3 Regulation on Determining Critical Infrastructure5.1.4 Controversial: Changes Affecting Telemedia Services; 5.2 International Issues: The European Unionś Directive on Security of Network and Information Systems (NIS Directive); 5.3 Data Protection and Data Security in the United States; 5.4 Data Exchange Between EU and US Companies; 5.4.1 Safe Harbor; 5.4.2 Privacy Shield; 5.5 Conclusion: Many Legal Issues to Consider; References; 6: IT Security: Stronger Together; 6.1 The Trinity ofIT Security; 6.2 CSSA
606
#
$a
Internet
$x
Security measures
$x
Social aspects.
$2
lc
$3
388138
606
#
$a
Computer networks
$x
Security measures.
$2
lc
$3
275074
676
$a
005.8
702
1 0
$a
Abolhassan
$b
Ferri
$4
editor
$3
388137
801
0
$a
tw
$b
嶺東科技大學圖書館
based on 0 review(s)
ALL
總館A區6F
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
359457
總館A區6F
一般流通
一般圖書
005.8 C994:3
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login