000 02651nam a22002777a 4500
003 OSt
005 20220707192714.0
008 220504b |||||||| |||| 00| 0 eng d
020 _a9781787782617
040 _c0
082 _a005.8 CAL
092 _20
100 _aCalder, Alan
245 _aThe cyber security handbook :
_c Alan Calder
_bprepare for, respond to and recover from cyber attacks
260 _aEly
_b ITGP
_c2020
300 _a361 pages
_billus.
_c22 cm
504 _a Includes bibliographical references
520 _a"This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape.Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts: Part 1: Introduction. The world of cyber security and the approach taken in this book. Part 2: Threats and vulnerabilities. A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences. Part 3: The CRF processes. Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each. Part 4: Eight steps to implementing cyber security. Our eight-step approach to implementing the cyber security processes you need and maintaining them.Part 5: Reference frameworks. An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available.Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book. Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today's information age; it is an essential component of business success."--from the publisher.
650 _aComputer security
_vHandbooks, manuals, etc
650 _aBusiness enterprises
_vComputer networks
_xSecurity measures.
650 _aSécurité informatique
_xGuides, manuels, etc.
650 _a Security measures
843 _aPhotocopy
887 _2CamTech Library
942 _2ddc
_cBK
_n0
999 _c129
_d129