Skip to Main Content
Cybersecurity Program Development for Business
book

Cybersecurity Program Development for Business

by Chris Moschovitis
May 2018
Beginner to intermediate content levelBeginner to intermediate
224 pages
6h 26m
English
Wiley
Audiobook available
Content preview from Cybersecurity Program Development for Business

INDEX

  •  
  • Accepted risk
  • Accounting application, business‐impact analysis table (example)
  • Activism, threat motive
  • Advanced persistent threat (APT)
  • Advance Research Projects Agency (ARPA)
  • Adware
  • Agenda, circulation
  • Air‐gapping
  • AlienVault's Open Threat Exchange
  • Alignment
    • problem, addressing
  • American National Standards Institute (ANSI) Z315.1‐2012 Tricycle Safety Requirements standard
  • Antivirus/antimalware applications
  • Applications, vulnerabilities
  • Architecture as a Service (AaaS)
  • Artificial intelligence (AI)
  • Artificial superintelligence
  • ASPCA, mission/vision
  • Assets
    • classification
      • vulnerability test vendor usage
    • metadata
    • valuations
    • vulnerabilities
      • comparison
      • testing
  • Atanasoff, John
  • Attacks
    • payload
    • process
    • progress
    • threat realization
    • types
    • vector
  • Attention, insistence
  • Attitude, adjustment
  • Attributions, low rates
  • Automatic Sequence Controlled Calculator
  • Availability
  •  
  • Babbage, Charles
  • Bardeen, John
  • Basic input output system (BIOS), infection
  • Bell, Alexander Graham
  • Bimodal IT (Gartner Research term)
  • Biocomputers, data
  • Bitcoin
  • Bitdefender, E‐Threats Landscape Reports
  • Blockchain
  • Born, Max
  • Bostrom, Nick
  • Botnet
  • Brattain, Walter
  • Bring‐your‐own‐device (BYOD)
    • IT model
    • mixtures
    • policy
    • risks
  • British Colossus
  • Brute force
    • attack
  • Buffer overflow
  • Business
    • continuity plan
    • digital transformation
    • functions
    • operations
    • results, improvement (case study)
    • risk, IT risk (connection)
    • stakeholders (Steering Committee)
    • strategy
  • Business continuity (BC)
  • Business‐impact analysis (BIA)
    • table, example ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Executive's Cybersecurity Program Handbook

Executive's Cybersecurity Program Handbook

Jason Brown

Publisher Resources

ISBN: 9781119429517Purchase book