Cyber Security Policy Guidebook

Cyber Security Policy Guidebook
ISBN-10
1118241320
ISBN-13
9781118241325
Category
Computers
Pages
288
Language
English
Published
2012-03-28
Publisher
John Wiley & Sons
Authors
Joseph Weiss, Jennifer L. Bayuk, Jason Healey

Description

Drawing upon a wealth of experience from academia, industry, andgovernment service, Cyber Security Policy Guidebook detailsand dissects, in simple language, current organizational cybersecurity policy issues on a global scale—taking great care toeducate readers on the history and current approaches to thesecurity of cyberspace. It includes thorough descriptions—aswell as the pros and cons—of a plethora of issues, anddocuments policy alternatives for the sake of clarity with respectto policy alone. The Guidebook also delves into organizationalimplementation issues, and equips readers with descriptions of thepositive and negative impact of specific policy choices. Inside are detailed chapters that: Explain what is meant by cyber security and cyber securitypolicy Discuss the process by which cyber security policy goals areset Educate the reader on decision-making processes related tocyber security Describe a new framework and taxonomy for explaining cybersecurity policy issues Show how the U.S. government is dealing with cyber securitypolicy issues With a glossary that puts cyber security language in layman'sterms—and diagrams that help explain complextopics—Cyber Security Policy Guidebook gives students,scholars, and technical decision-makers the necessary knowledge tomake informed decisions on cyber security policy.

Other editions

Similar books

  • A Fierce Domain: Conflict in Cyberspace, 1986 to 2012
    By Jason Healey, Karl Grindal

    A two-year study, resulting in the new book -- A Fierce Domain: Cyber Conflict, 1986 to 2012 -- has made the following conclusions, which are very different from those that policymakers are usually told: Cyber conflict has changed only ...

  • Enterprise Information Security and Privacy
    By Jennifer L. Bayuk, C. Warren Axelrod, Daniel Schutzer

    The book examines the effectiveness and weaknesses of current approaches and guides you towards practical methods and doable processes that can bring about real improvement in the overall security environment.

  • The Cybersecurity Self-Help Guide
    By Arun Soni

    His vast international exposure in cybersecurity and writing make this book special. This book will be a tremendous help to everybody and will be considered a bible on cybersecurity.

  • CyberForensics: Understanding Information Security Investigations
    By Jennifer Bayuk

    This book sheds light on those activities in a way that is comprehensible not only to technology professionals but also to the technology hobbyist and those simply curious about the ?eld.

  • Cyber Security and IT Infrastructure Protection
    By John R. Vacca

    It is up to the policy of the application if it treats out-of-date certificates as invalid, or treats it as a warning case that can be overridden by the user. Applications may also treat certificates that are not yet valid differently ...

  • Cyber Privacy: Who Has Your Data and Why You Should Care
    By April Falcon Doss

    It's high time to rethink notions of privacy and what, if anything, limits the power of those who are constantly watching, listening, and learning about us. This book is for readers who want answers to three questions: Who has your data?

  • Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data
    By Jason Martin, Mark Talabis, Robert McPherson

    Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covered in this book, you will be able to gain security insights into unstructured big data of any type.

  • Security Operations Center Guidebook: A Practical Guide for a Successful SOC
    By Scott McCoy, Gregory Jarpey

    This comprehensive text also covers more advanced topics, such as the most common Underwriter Laboratory (UL) listings that can be acquired, how and why they can help a company, and what additional activities and services an SOC can provide ...

  • Data Analysis for Network Cyber-Security
    By Niall Adams, Nicholas Heard

    Sequential Analysis: Hypothesis Testing and Change-Point Detection, Statistics (Chapman & Hall/CRC, Boca Raton, FL). Tartakovsky, A. G., Pollak, M. and Polunchenko, A. S. (2012). Third-order asymptotic optimality of the generalized ...

  • Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation
    By Ted G. Lewis

    ... DHS, NCS, Hughes, Intelsat, Communication Workers of America, Comcast, Cox Communications, Cingular, and Cable & Wireless. Congress President NSTAC FCC Dept Commerce DHS ' L m. DHS, NCS, NCC, AND NCC—ISAC 333.