Cyber Essentials A Guide to the Cyber Essentials and Cyber Essentials Plus Certifications
Understand how your organisation can implement Cyber Essentials and Cyber Essentials Plus with this guide!.
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Ely :
IT Governance Ltd
2023.
|
Edición: | 1st ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009852235306719 |
Tabla de Contenidos:
- Cover
- Title
- Copyright
- About The Author
- Acknowledgements
- Contents
- Chapter 1: The Cyber Essentials scheme
- Why get certified?
- Which contracts require Cyber Essentials?
- What am I protecting?
- Beyond and outside Cyber Essentials
- Structure of this book
- Part 1: Requirements for basic technical protection from cyber attacks
- Chapter 2: Types of attack
- Social engineering
- Denial of service (DoS)
- Password attacks
- Threats outside the perimeter
- Misconfiguration and unpatched vulnerabilities
- Ransomware
- Scoping
- Implementation and documentation
- Chapter 3: Technical control themes
- Technical control theme 1: Firewalls
- Technical control theme 2: Secure configuration
- Technical control theme 3: User access control
- Technical control theme 4: Malware protection
- Technical control theme 5: Security update management
- Further guidance from Cyber Essentials
- Part 2: Gaining cyber essentials certification
- Chapter 4: Certification
- Externally managed services and scope
- Cyber Essentials checklist
- Cyber Essentials certification process
- Getting certified - Cyber Essentials Plus
- Appendix 1: Further assistance
- Practical help and consultancy
- Useful documents and further information
- The next step - cyber security standards
- Staff training
- Cyber resilience
- Appendix 2: IT Governance resources
- Certification only
- Get A Little Help
- Get A Lot Of Help
- Cyber Essentials Plus Health Check
- Penetration testing
- Gap analysis
- GRC eLearning courses
- Further reading.