8 steps to better security a simple cyber resilience guide for business
"Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Hoboken, New Jersey :
John Wiley & Sons, Inc
[2022]
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009645677506719 |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- About the Author
- Acknowledgments
- Contents
- Foreword
- Introduction
- Chapter 1 Step 1: Foster a Strong Security Culture
- Kevin Mitnick, Human Hacker Extraordinaire
- The Importance of a Strong Security Culture
- Hackers Are the Bad Guys, Right?
- What Is Security Culture?
- How to Foster a Strong Security Culture
- Security Leaders on Security Culture
- What Makes a Good CISO?
- The Biggest Mistakes Businesses Make When It Comes to Cybersecurity
- The Psychological Phases of a Cybersecurity Professional
- Chapter 2 Step 2: Build a Security Team
- Why Step 2 Is Controversial
- How to Hire the Right Security Team. . .the Right Way
- Security Team Tips from Security Leaders
- The "Culture Fit"-Yuck!
- Cybersecurity Budgets
- Design Your Perfect Security Team
- Chapter 3 Step 3: Regulatory Compliance
- What Are Data Breaches, and Why Are They Bad?
- The Scary Truth Found in Data Breach Research
- An Introduction to Common Data Privacy Regulations
- The General Data Protection Regulation
- The California Consumer Privacy Act
- The Health Insurance Portability and Accountability Act
- The Gramm-Leach-Bliley Act
- Payment Card Industry Data Security Standard
- Governance, Risk Management, and Compliance
- More About Risk Management
- Threat Modeling
- Chapter 4 Step 4: Frequent Security Testing
- What Is Security Testing?
- Security Testing Types
- Security Audits
- Vulnerability Assessments Versus Penetration Testing
- Red Team Testing
- Bug Bounty Programs
- What's Security Maturity?
- The Basics of Security Audits and Vulnerability Assessments
- Log Early, Log Often
- Prepare for Vulnerability Assessments and Security Audits
- A Concise Guide to Penetration Testing
- Penetration Testing Based on Network Knowledge.
- Penetration Testing Based on Network Aspects
- Security Leaders on Security Maturity
- Security Testing Is Crucial
- Chapter 5 Step 5: Security Framework Application
- What Is Incident Response?
- Preparation
- Identification or Analysis
- Containment, Mitigation, or Eradication
- Recovery
- Post-incident
- Your Computer Security Incident Response Team
- Cybersecurity Frameworks
- NIST Cybersecurity Framework
- ISO 27000 Cybersecurity Frameworks
- CIS Controls
- COBIT Cybersecurity Framework
- Security Frameworks and Cloud Security
- Chapter 6 Step 6: Control Your Data Assets
- The CIA Triad
- Access Control
- Patch Management
- Physical Security and Your Data
- Malware
- Cryptography Basics
- Bring Your Own Device and Working from Home
- Managed Service Providers
- The Dark Web and Your Data
- Security Leaders on Cyber Defense
- Control Your Data
- Chapter 7 Step 7: Understand the Human Factor
- Social Engineering
- Phishing
- What Can NFTs and ABA Teach Us About Social Engineering?
- How to Prevent Social Engineering Attacks on Your Business
- UI and UX Design
- Internal Threats
- Hacktivism
- Chapter 8 Step 8: Build Redundancy and Resilience
- Understanding Data and Networks
- Building Capacity and Scalability with the Power of the Cloud
- Back It Up, Back It Up, Back It Up
- RAID
- What Ransomware Taught Business About Backups
- Business Continuity
- Disaster Recovery
- Chapter 9 Afterword
- Step 1
- The Most Notorious Cyberattacker Was Actually a Con Man
- A Strong Security Culture Requires All Hands on Deck
- Hackers Are the Good Guys, Actually
- What Is Security Culture?
- What Makes a Good CISO?
- The Psychological Phases of a Cybersecurity Professional
- Recommended Readings
- Step 2
- Tackling the Cybersecurity Skills Gap Myth
- Take "Culture Fit" Out of Your Vocabulary.
- Your Cybersecurity Budget
- Recommended Readings
- Step 3
- Data Breaches
- Data Privacy Regulations
- Risk Management
- Recommended Readings
- Step 4
- Security Audits
- Vulnerability Assessments
- Penetration Testing
- Bug Bounty Programs
- Recommended Reading
- Step 5
- Incident Response
- Cybersecurity Frameworks
- Recommended Reading
- Step 6
- The CIA Triad
- Access Control
- Patch Management
- Physical Security
- Malware
- Cryptography
- BYOD and Working from Home
- Data Loss Prevention
- Managed Service Providers
- Recommended Reading
- Step 7
- Social Engineering
- UI and UX Design
- Internal Threats
- Recommended Readings
- Step 8
- Cloud Networks
- Data Backups
- Business Continuity and Disaster Recovery
- Recommended Readings
- Keeping Your Business Cyber Secure
- Index
- EULA.