Book description
Cyber security is more essential today than ever, not just in the workplace but at home too. This book covers the various types of cyber threat and explains what you can do to mitigate these risks and keep your data secure.
Table of contents
- Front Cover
- Half-Title Page
- BCS, THE CHARTERED INSTITUTE FOR IT
- Title Page
- Copyright Page
- Contents
- List of figures and tables
- Author
- Acknowledgements
- Abbreviations
- Preface
- Glossary
- PART I CYBER SECURITY PROBLEMS
- 1. INTRODUCTION
- Background
- The expectations of users and organisations
- Cyber security in the wider context
- 2. THE BIG ISSUES
- Cybercrime
- Cyber harassment or cyber bullying
- Cyber warfare
- Cyber surveillance
- Why we should care
- What makes cyber security difficult?
- 3. CYBER TARGETS
- Individual targets
- Business targets
- Critical national infrastructure targets
- Building targets
- Academia and research targets
- Manufacturing and industry targets
- 4. CYBER VULNERABILITIES AND IMPACTS
- Cyber vulnerabilities
- Cyber impacts
- 5. CYBER THREATS
- Types of attacker
- Motives – what drives an attacker
- Means
- Cyber-attack methods
- Types of cyber-attack and attack vectors
- The risks of conducting a cyber-attack
- PART II IMPROVING CYBER SECURITY
- 6. RISK MANAGEMENT OVERVIEW
- A general view of risk
- Assets
- Vulnerabilities
- Likelihood or probability
- Qualitative and quantitative assessments
- The risk management process
- 7. BUSINESS CONTINUITY AND DISASTER RECOVERY
- Business continuity
- Disaster recovery
- 8. BASIC CYBER SECURITY STEPS
- General security advice
- Technical security advice
- Mobile working
- 9. ORGANISATIONAL SECURITY STEPS
- Security policies overview
- Directive policies
- Administrative policies
- Communal policies
- Technical policies
- 10. AWARENESS AND TRAINING
- Awareness
- Training
- 11. INFORMATION SHARING
- Trust
- Information classification
- Protection of shared information
- Anonymisation of shared information
- Routes to information sharing
- PART III APPENDICES
- APPENDIX A – STANDARDS
- Cyber security standards
- ISO/IEC 27000 series standards
- Other relevant ISO standards
- Business continuity standards
- National Institute of Standards and Technology (NIST) standards
- APPENDIX B – GOOD PRACTICE GUIDELINES
- General cyber security advice
- UK government cyber security advice
- APPENDIX C – CYBER SECURITY LAW
- UK law
- EU directives and regulations
- Other relevant legislation
- APPENDIX D – CYBER SECURITY TRAINING
- APPENDIX E – LINKS TO OTHER USEFUL ORGANISATIONS
- Further reading
- Index
Product information
- Title: Cyber Security
- Author(s):
- Release date: July 2017
- Publisher(s): BCS, The Chartered Institute for IT
- ISBN: 9781780173429
You might also like
book
Cyber Security, 2nd Edition
Cyber security has never been more essential than it is today, it’s not a case of …
book
Cyber Security Essentials
This volume provides a clear understanding of the concepts behind cyber-prevalent threats, tactics, and procedures. The …
book
The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks
This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual …
book
Cyber Security and Network Security
CYBER SECUTIRY AND NETWORK SECURITY Written and edited by a team of experts in the field, …