Cyber threat! how to manage the growing risk of cyber attacks

"Conquering cyber attacks requires a multi-sector, multi-modal approachCyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain...

Descripción completa

Detalles Bibliográficos
Otros Autores: Ulsch, N. MacDonnell, 1951- author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Hoboken, New Jersey : Wiley 2014.
Edición:1st edition
Colección:Wiley corporate F & A series.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629383306719
Tabla de Contenidos:
  • Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks; Contents; Foreword; Preface; Acknowledgments; Introduction: What Every Current and Future Senior Executive Must Know about the Cyber Threat: A Perfect Digital Storm Is Forming; What Factors Create a Perfect Storm?; Industry Vulnerability; Threat Intensification; Inadequate Government Preparedness; Low Level of Awareness; Inadequate Risk Assessments; Offshoring of Data; Insider Threat; Denial of Vulnerability; Increasingly Sophisticated Attacks; Mobile Devices at Higher Risk; Sometimes Security Just Doesn't Take Hold
  • It Wasn't Always Like ThisWithout a Bang; A Board Issue; The Cyber Frankenstein Cometh; Defining Success; Notes; Part I: The Cyber Threat to the Corporate Brand: How It Will Impact Your Company; Chapter 1: The Rise of Cyber Organized Crime and Its Global Impact; Is Nothing Sacred?; The Liberty Reserve Case: Money Laundering in the Digital Age; The Corruption Factor; Information Threat, Physical Threat; Notes; Chapter 2: The Emergence of the Cyber Nation-State and Technology Espionage: Red China Rising and Its Global Cyber Theft Strategy; A Case of Cyber Espionage Conspiracy?
  • According to the Select Committee . . .Notes; Chapter 3: Cyber Al Qaeda Poses a Threat to Critical Infrastructure; A Disabled America; A New Age: Inspiring Terrorists and Terrorism; A Call Heard Vaguely; Attack upon Attack, No Peace in Sight; Notes; Part II: Corporate Vulnerabilitiesin the Digital Society: Prepare to Defend Yourself and Your Brand; Chapter 4: What Is the True Cost of a Cyber Attack?; Cyber Attack Detection Sometimes Takes Years; One of the First Questions: "How Much Will This Cost?"; A Few Common Cost Factors; What about Unreported Breaches?
  • Cyber Attacks Result in a Wider Impact: The CommunityNotes; Chapter 5: U.S. Cyber Public Policy: Don't Rely on It to Protect the Brand; No Guarantees with This Executive Order; Government-Industry Cooperation: No Silver Bullet; The Challenge of Defining Cyber Public Policy; Cold War II: The Cyber Chapter; Is There a Silver Lining in an Attack?; Notes; Chapter 6: Four Trends Driving Cyber Breaches and Increasing Corporate Risk: Technological, Cultural, Economic, and Geopolitical Shifts; Technology Trend; Loss of Situational Awareness: Distraction; Culture; Technology Is a Double-Edged Sword
  • NotesChapter 7: Social Media and Digital Protest; Social Media: A Tool for Disruption, a Model for Change; The Hacker Group Anonymous; Anonymous Is an "Anti" Outfit of Malcontents; In Reckless Move, Anonymous Targeted Law Enforcement; Anonymous: Making All Information Free for All; In Pursuit of the Anonymous Definition of Civil Liberties; Anarchaos: In the Image of Anonymous; Notes; Part III: Protecting the Brand: Actions Executive Management Must Take to Reduce Cyber Risk; Chapter 8: Managing the Brand When the Worst Occurs; Be Prepared; 1. Initiation
  • 2. Discovery and Forensic Evidence Capture