語系:
繁體中文
English
簡体中文
說明(常見問題)
登入
網路辦證
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cyber security. Simply. Make it happen. : leveraging digitization through IT security
紀錄類型:
書目-語言資料,印刷品 : 單行本
副題名:
leveraging digitization through IT security
其他作者:
AbolhassanFerri,
出版地:
Cham, Switzerland
出版者:
Springer;
出版年:
2017
面頁冊數:
xiii, 127 p.ill. : 24 cm.;
集叢名:
Management for professionals
標題:
Internet - Security measures -
標題:
Computer networks - Security measures. -
ISBN:
978-3-319-46528-9bound
內容註:
Foreword; Trust Is the Basis of Digitization; Digitization Offers Great Opportunities; Data Protection and Digital Business Models Are Not in Opposition; Security Has to Be Simple; Contents; 1: Security: The Real Challenge for Digitalization; 1.1Introduction; 1.2 Status Quo: The Cloud Is the Backbone of Digitalization; 1.3 Data Security: Only a Secure Cloud Will Lead to Secure Digitalization; 1.3.1 Risk Transformation: It Has to BeEasy to Get into the Cloud; 1.3.2 Risk of an Incident: Making Sure the Cloud Doesńt Crash 1.3.3 Risk of Technical/Physical Attack: A Castle Wall Alone Isńt Enough1.3.4 Risk of a Cyberattack: Ensuring Data and Devices Areńt Casualties; 1.4 Looking to the Future; 1.5 Conclusion; References; 2: Security Policy: Rules for Cyberspace;2.1 Taking Stock: Digital Warfare in the 21st Century; 2.2 Challenges for the Political Sphere: Rules, Resources and Expertise; 2.3 Outlook: A Strategy for the Digital Age; References; 3: Data Protection Empowerment; 3.1 Code Is Law; 3.2 Empowerment; 3.3 Information Technology and Social Values; References 4.4.6 Report4.5 Conclusion; References; 5: The Law and Its Contribution to IT Security: Legal Framework, Requirements, Limits; 5.1 Key Features of the Existing Legal Framework; 5.1.1 IT Compliance: A Challenge for Management Boards and Executives; 5.1.1.1 The Cornerstone of IT Compliance: IT Security; 5.1.1.2 Liability of the Management Board and Executives; 5.1.2 Who Is Responsible?; 5.1.2.1 Requirements for Software Manufacturers; 5.1.2.2 Requirements for Network and Platform Operators; 5.1.2.3 Legal Framework for Providers of IT Services 4: Red Teaming and Wargaming: How Can Management and Supervisory Board Members Become More Involved in Cybersecurity?4.1 Cybersecurity: A Management Board Issue; 4.2 Integrating the Management Board into Existing Cybersecurity Strategies; 4.3 Red Teaming and Wargaming; 4.3.1 Red Teaming Defined; 4.3.2 Wargaming Defined; 4.3.3 Differences Compared withMethods Currently in Use; 4.4 Use of Red Teaming in Combination with Wargaming at Companies; 4.4.1 Classification; 4.4.2 Definition of a Target; 4.4.3 Composition of the Teams; 4.4.4 Analysis: Data Collection and Evaluation; 4.4.5 Wargaming 5.1.3 Regulation on Determining Critical Infrastructure5.1.4 Controversial: Changes Affecting Telemedia Services; 5.2 International Issues: The European Unionś Directive on Security of Network and Information Systems (NIS Directive); 5.3 Data Protection and Data Security in the United States; 5.4 Data Exchange Between EU and US Companies; 5.4.1 Safe Harbor; 5.4.2 Privacy Shield; 5.5 Conclusion: Many Legal Issues to Consider; References; 6: IT Security: Stronger Together; 6.1 The Trinity ofIT Security; 6.2 CSSA
Cyber security. Simply. Make it happen. : leveraging digitization through IT security
Cyber security. Simply. Make it happen.
: leveraging digitization through IT security / Ferri Abolhassan, editor - Cham, Switzerland : Springer, 2017. - xiii, 127 p. ; ill. ; 24 cm.. - (Management for professionals).
Foreword; Trust Is the Basis of Digitization; Digitization Offers Great Opportunities; Data Protection and Digital Business Models Are Not in Opposition; Security Has to Be Simple; Contents; 1: Security: The Real Challenge for Digitalization; 1.1Introduction; 1.2 Status Quo: The Cloud Is the Backbone of Digitalization; 1.3 Data Security: Only a Secure Cloud Will Lead to Secure Digitalization; 1.3.1 Risk Transformation: It Has to BeEasy to Get into the Cloud; 1.3.2 Risk of an Incident: Making Sure the Cloud Doesńt Crash.
Includes bibliographical references..
ISBN 978-3-319-46528-9
InternetComputer networks -- Security measures -- Security measures.
Abolhassan, Ferri
Cyber security. Simply. Make it happen. : leveraging digitization through IT security
LDR
:03362nam0 2200193 450
001
322134
005
20170531222146.0
010
1
$a
978-3-319-46528-9
$b
bound
$d
NT$1596
100
$a
20170603d2017 u y1
101
0
$a
eng
102
$a
ch
105
$a
y 000yy
200
0
$a
Cyber security. Simply. Make it happen.
$e
leveraging digitization through IT security
$f
Ferri Abolhassan, editor
210
$a
Cham, Switzerland
$d
2017
$c
Springer
215
1
$a
xiii, 127 p.
$c
ill.
$d
24 cm.
225
2 #
$a
Management for professionals
320
$a
Includes bibliographical references.
327
0
$a
Foreword; Trust Is the Basis of Digitization; Digitization Offers Great Opportunities; Data Protection and Digital Business Models Are Not in Opposition; Security Has to Be Simple; Contents; 1: Security: The Real Challenge for Digitalization; 1.1Introduction; 1.2 Status Quo: The Cloud Is the Backbone of Digitalization; 1.3 Data Security: Only a Secure Cloud Will Lead to Secure Digitalization; 1.3.1 Risk Transformation: It Has to BeEasy to Get into the Cloud; 1.3.2 Risk of an Incident: Making Sure the Cloud Doesńt Crash
$a
1.3.3 Risk of Technical/Physical Attack: A Castle Wall Alone Isńt Enough1.3.4 Risk of a Cyberattack: Ensuring Data and Devices Areńt Casualties; 1.4 Looking to the Future; 1.5 Conclusion; References; 2: Security Policy: Rules for Cyberspace;2.1 Taking Stock: Digital Warfare in the 21st Century; 2.2 Challenges for the Political Sphere: Rules, Resources and Expertise; 2.3 Outlook: A Strategy for the Digital Age; References; 3: Data Protection Empowerment; 3.1 Code Is Law; 3.2 Empowerment; 3.3 Information Technology and Social Values; References
$a
4.4.6 Report4.5 Conclusion; References; 5: The Law and Its Contribution to IT Security: Legal Framework, Requirements, Limits; 5.1 Key Features of the Existing Legal Framework; 5.1.1 IT Compliance: A Challenge for Management Boards and Executives; 5.1.1.1 The Cornerstone of IT Compliance: IT Security; 5.1.1.2 Liability of the Management Board and Executives; 5.1.2 Who Is Responsible?; 5.1.2.1 Requirements for Software Manufacturers; 5.1.2.2 Requirements for Network and Platform Operators; 5.1.2.3 Legal Framework for Providers of IT Services
$a
4: Red Teaming and Wargaming: How Can Management and Supervisory Board Members Become More Involved in Cybersecurity?4.1 Cybersecurity: A Management Board Issue; 4.2 Integrating the Management Board into Existing Cybersecurity Strategies; 4.3 Red Teaming and Wargaming; 4.3.1 Red Teaming Defined; 4.3.2 Wargaming Defined; 4.3.3 Differences Compared withMethods Currently in Use; 4.4 Use of Red Teaming in Combination with Wargaming at Companies; 4.4.1 Classification; 4.4.2 Definition of a Target; 4.4.3 Composition of the Teams; 4.4.4 Analysis: Data Collection and Evaluation; 4.4.5 Wargaming
$a
5.1.3 Regulation on Determining Critical Infrastructure5.1.4 Controversial: Changes Affecting Telemedia Services; 5.2 International Issues: The European Unionś Directive on Security of Network and Information Systems (NIS Directive); 5.3 Data Protection and Data Security in the United States; 5.4 Data Exchange Between EU and US Companies; 5.4.1 Safe Harbor; 5.4.2 Privacy Shield; 5.5 Conclusion: Many Legal Issues to Consider; References; 6: IT Security: Stronger Together; 6.1 The Trinity ofIT Security; 6.2 CSSA
606
#
$a
Internet
$x
Security measures
$x
Social aspects.
$2
lc
$3
388138
606
#
$a
Computer networks
$x
Security measures.
$2
lc
$3
275074
676
$a
005.8
702
1 0
$a
Abolhassan
$b
Ferri
$4
editor
$3
388137
801
0
$a
tw
$b
嶺東科技大學圖書館
筆 0 讀者評論
全部
總館A區6F
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
359457
總館A區6F
一般流通
一般圖書
005.8 C994:3
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入