Cyber Essentials A Guide to the Cyber Essentials and Cyber Essentials Plus Certifications

Understand how your organisation can implement Cyber Essentials and Cyber Essentials Plus with this guide!.

Detalles Bibliográficos
Otros Autores: Calder, Alan, author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Ely : IT Governance Ltd 2023.
Edición:1st ed
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009852235306719
Tabla de Contenidos:
  • Cover
  • Title
  • Copyright
  • About The Author
  • Acknowledgements
  • Contents
  • Chapter 1: The Cyber Essentials scheme
  • Why get certified?
  • Which contracts require Cyber Essentials?
  • What am I protecting?
  • Beyond and outside Cyber Essentials
  • Structure of this book
  • Part 1: Requirements for basic technical protection from cyber attacks
  • Chapter 2: Types of attack
  • Social engineering
  • Denial of service (DoS)
  • Password attacks
  • Threats outside the perimeter
  • Misconfiguration and unpatched vulnerabilities
  • Ransomware
  • Scoping
  • Implementation and documentation
  • Chapter 3: Technical control themes
  • Technical control theme 1: Firewalls
  • Technical control theme 2: Secure configuration
  • Technical control theme 3: User access control
  • Technical control theme 4: Malware protection
  • Technical control theme 5: Security update management
  • Further guidance from Cyber Essentials
  • Part 2: Gaining cyber essentials certification
  • Chapter 4: Certification
  • Externally managed services and scope
  • Cyber Essentials checklist
  • Cyber Essentials certification process
  • Getting certified - Cyber Essentials Plus
  • Appendix 1: Further assistance
  • Practical help and consultancy
  • Useful documents and further information
  • The next step - cyber security standards
  • Staff training
  • Cyber resilience
  • Appendix 2: IT Governance resources
  • Certification only
  • Get A Little Help
  • Get A Lot Of Help
  • Cyber Essentials Plus Health Check
  • Penetration testing
  • Gap analysis
  • GRC eLearning courses
  • Further reading.