Combatting cyber terrorism a guide to understanding the cyber threat landscape and incident response planning

Increasingly, cyber security practitioners are confronted with a stark phrase: cyber terrorism. For many, it conveys fear and hopelessness. What is this thing called ‘cyber terrorism’ and what can we begin to do about it? Malicious-minded ICT users, programmers and even programs (including much AI-p...

Descripción completa

Detalles Bibliográficos
Otros Autores: Bingley, Richard, author (author)
Formato: Grabación no musical
Idioma:Inglés
Publicado: [Place of publication not identified] : IT Governance Publishing [2024]
Edición:[First edition]
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009859319006719
Descripción
Sumario:Increasingly, cyber security practitioners are confronted with a stark phrase: cyber terrorism. For many, it conveys fear and hopelessness. What is this thing called ‘cyber terrorism’ and what can we begin to do about it? Malicious-minded ICT users, programmers and even programs (including much AI-powered software) have all been instrumental in recruiting, inspiring, training, executing and amplifying acts of terrorism. This has resulted in the loss of life and/or life-changing physical injuries that could never have occurred without support and facilitation from the cyber sphere. These types of attacks can be encapsulated by the phrase ‘cyber terrorism’. This book recounts case studies to show the types of threats we face and provides a comprehensive coverage of risk management tactics and strategies to protect yourself against such nefarious threat actors. These include key mitigation and controls for information security or security and HR-related professionals.
Descripción Física:1 online resource (1 sound file (6 hr., 17 min.))
ISBN:9781787785229