Browse Results

Showing 23,476 through 23,500 of 100,000 results

Cyber & You: Book 2 (Smart Skills)

by Maureen Kendal

Cyber & You is a fascinating look at our lives today and what our lives will be like in the future. The focus is on the development of human interaction, how humans are impacted by technology, and the affect cyberspace interactions have on the minds of individuals and on society as a whole.The book addresses areas such as: access and modes of communication, Virtual Community, Virtual self, Economic Divide, and Block Chains. It also covers:Morals and Ethics: Behavioural development, personal characteristics, and redefining relationshipsThe Future: Consumer landscape, Technology and the workforce, Cyber learning and education and Lifestyle disruptions.

Cyber Breach at Target

by Lynn S. Paine Suraj Srinivasan Neeraj Goyal

In November and December of 2013, Target Corporation suffered one of the largest cyber breaches till date. The breach that occurred during the busy holiday shopping season resulted in personal and credit card information of about 110 million Target customers to be compromised. The case describes the details of the breach, circumstances that lead to it, consequences for customers and for Target, and the company's response. The case then discusses the role of management and the board of directors in cyber security at Target. Target's board of directors was subject to intense criticism by shareholders and governance experts such as the leading proxy advisor Institutional Shareholder Services (ISS). The case discusses the critique and defense of the board's role. The case is designed to allow for a discussion of the causes and consequences of the cyber breach and accountability of directors in cyber security.

Cyber CISO Marksmanship: Hitting the Mark in Cybersecurity Leadership

by James Johnson Ken Dunham Joseph McComb Jason Elrod

Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively bring together the "best of the best" on what works and what doesn’t, as a CISO, in a unique storytelling format. This book is designed for a Chief Information Security Officer (CISO) or an individual seeking this role and also has value to other types of cyber leaders. Knowledge and understanding of traditional books can only get you so far – Cyber CISO Marksmanship has powerful perspectives, real-world accounts, and insights you won’t find anywhere else!Key features included with Cyber CISO Marksmanship: Over a century of CISO experience is represented by the authors of this book Unique storytelling format based upon real-world accounts from leading CISOs Sharpshooter perspectives from multiple CISOs for each story Bottom Line Up Front (BLUF) for quick reference on outcomes for each story Sharpshooter icon for what works Misfire icon for pitfalls to avoid All book owners are invited to participate in online content at CyberCISOMarksmanship.com and face-to-face events Book owners who are CISOs qualify to join, for free, a private CISO online community (by CISOs for CISOs) While this book is written for CISOs or those desiring to be in that role soon, it is also helpful to other cyber leaders.

Cyber Careers: The Basics of Information Technology and Deciding on a Career Path

by Pee Vululleh

The approach taken in this book emphasizes the basics of information technology and helps students decide whether to pursue an information technology career. Most students fail to pursue an IT career because of their limited knowledge (sometimes no knowledge) about the area. Similarly, most students pursuing a career in IT do not research the field before their pursuit. This book is purposely designed for students in this category. The book may be offered as a required text for an elective or core course to all bachelor's degree students regardless of specialization. Compared to other textbooks, this text guides students pursuing or wanting to pursue an IT degree/career. Most students often begin their study of IT without knowing the outside and inside of the area. Most of these students can change their minds to pursue a different career path after spending several semesters of studies, a waste of their time. If students are taught from the onset about what an IT career entails and what it takes to become successful, it will significantly help students and not waste their time. This book addresses the issue.

Cyber Consumer Law and Unfair Trading Practices (Markets and the Law)

by Cristina Coteanu

Of great interest to practitioners, policymakers and academics - as well as to consumers and traders in general - this timely work addresses all important legal and practical issues that arise in connection with online trading. This important work outlines the existing legislation and legal jurisprudence in the EU and the US and exposes the potential for unfair commercial practices to arise from online contracts, electronic agents, disclosure of information, online advertising and online dispute resolution in cross-border transactions. The continuing prevalence of unfair commercial practices will ensure this book remains in great demand.

Cyber Crime, Security and Digital Intelligence: Vulnerabilities Risks Threat Actors And Controls In The Information Age

by Mark Johnson

Today's digital economy is uniquely dependent on the Internet, yet few users or decision makers have more than a rudimentary understanding of the myriad of online risks that threaten us. Cyber crime is one of the main threats to the integrity and availability of data and systems. From insiders to complex external attacks and industrial worms, modern business faces unprecedented challenges; and while cyber security and digital intelligence are the necessary responses to this challenge, they are understood by only a tiny minority. In his second book on high-tech risks, Mark Johnson goes far beyond enumerating past cases and summarising legal or regulatory requirements. He describes in plain, non-technical language how cyber crime has evolved and the nature of the very latest threats. He confronts issues that are not addressed by codified rules and practice guidelines, supporting this with over 30 valuable illustrations and tables. Written for the non-technical layman and the high tech risk manager alike, the book also explores countermeasures, penetration testing, best practice principles, cyber conflict and future challenges. A discussion of Web 2.0 risks delves into the very real questions facing policy makers, along with the pros and cons of open source data. In a chapter on Digital Intelligence readers are provided with an exhaustive guide to practical, effective and ethical online investigations. Cyber Crime, Security and Digital Intelligence is an important work of great relevance in today's interconnected world and one that nobody with an interest in either risk or technology should be without.

Cyber Forensics

by Frederic Guillossou Albert J. Marcella Jr.

An explanation of the basic principles of dataThis book explains the basic principles of data as building blocks of electronic evidential matter, which are used in a cyber forensics investigations. The entire text is written with no reference to a particular operation system or environment, thus it is applicable to all work environments, cyber investigation scenarios, and technologies. The text is written in a step-by-step manner, beginning with the elementary building blocks of data progressing upwards to the representation and storage of information. It inlcudes practical examples and illustrations throughout to guide the reader.

Cyber Fraud: Tactics, Techniques and Procedures

by Rick Howard

With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. Arguably one of the most important challenges of the 21st century, with millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. This volume explores the state of threats present in the cyber fraud underground. It discusses phishing/pharming, trojans/toolkits, direct threats, and pump-and-dump scams. By examining the operations of the cyber criminal, the book provides perspective into the general incentives, risks, and behavioral patterns of the fraudsters. Armed with this information, organizations and individuals are better able to develop countermeasures and crafting tactics to disrupt the fraud underground and secure their systems.

Cyber Guardians: Empowering Board Members for Effective Cybersecurity

by Bart R. McDonough

A comprehensive overview for directors aiming to meet their cybersecurity responsibilities In Cyber Guardians: Empowering Board Members for Effective Cybersecurity, veteran cybersecurity advisor Bart McDonough delivers a comprehensive and hands-on roadmap to effective cybersecurity oversight for directors and board members at organizations of all sizes. The author includes real-world case studies, examples, frameworks, and blueprints that address relevant cybersecurity risks, including the industrialized ransomware attacks so commonly found in today’s headlines. In the book, you’ll explore the modern cybersecurity landscape, legal and regulatory requirements, risk management and assessment techniques, and the specific role played by board members in developing and promoting a culture of cybersecurity. You’ll also find: Examples of cases in which board members failed to adhere to regulatory and legal requirements to notify the victims of data breaches about a cybersecurity incident and the consequences they faced as a result Specific and actional cybersecurity implementation strategies written for readers without a technical background What to do to prevent a cybersecurity incident, as well as how to respond should one occur in your organizationA practical and accessible resource for board members at firms of all shapes and sizes, Cyber Guardians is relevant across industries and sectors and a must-read guide for anyone with a stake in robust organizational cybersecurity.

Cyber Intelligence-Driven Risk: How to Build and Use Cyber Intelligence for Business Risk Decisions

by Richard O. Moore III

Turn cyber intelligence into meaningful business decisions and reduce losses from cyber events Cyber Intelligence-Driven Risk provides a solution to one of the most pressing issues that executives and risk managers face: How can we weave information security into our business decisions to minimize overall business risk? In today's complex digital landscape, business decisions and cyber event responses have implications for information security that high-level actors may be unable to foresee. What we need is a cybersecurity command center capable of delivering, not just data, but concise, meaningful interpretations that allow us to make informed decisions. Building, buying, or outsourcing a CI-DR™ program is the answer. In his work with executives at leading financial organizations and with the U.S. military, author Richard O. Moore III has tested and proven this next-level approach to Intelligence and Risk. This book is a guide to: Building, buying, or outsourcing a cyber intelligence–driven risk program Understanding the functional capabilities needed to sustain the program Using cyber intelligence to support Enterprise Risk Management Reducing loss from cyber events by building new organizational capacities Supporting mergers and acquisitions with predictive analytics Each function of a well-designed cyber intelligence-driven risk program can support informed business decisions in the era of increased complexity and emergent cyber threats.

Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions

by Daniel Lohrmann Shamane Tan

Successfully lead your company through the worst crises with this first-hand look at emergency leadership Cyber security failures made for splashy headlines in recent years, giving us some of the most spectacular stories of the year. From the Solar Winds hack to the Colonial Pipeline ransomware event, these incidents highlighted the centrality of competent crisis leadership. Cyber Mayday and the Day After offers readers a roadmap to leading organizations through dramatic emergencies by mining the wisdom of C-level executives from around the globe. It’s loaded with interviews with managers and leaders who've been through the crucible and survived to tell the tale. From former FBI agents to Chief Information Security Officers, these leaders led their companies and agencies through the worst of times and share their hands-on wisdom. In this book, you’ll find out: What leaders wish they'd known before an emergency and how they've created a crisis game plan for future situations How executive-level media responses can maintain – or shatter – consumer and public trust in your firm How to use communication, coordination, teamwork, and partnerships with vendors and law enforcement to implement your crisis response Cyber Mayday and the Day After is a must-read experience that offers managers, executives, and other current or aspiring leaders a first-hand look at how to lead others through rapidly evolving crises.

Cyber Risk Management in Practice: A Guide to Real-World Solutions (Security, Audit and Leadership Series)

by Carlos Morales

Cyber Risk Management in Practice: A Guide to Real-World Solutions is your companion in the ever-changing landscape of cybersecurity. Whether you're expanding your knowledge or looking to sharpen your existing skills, this book demystifies the complexities of cyber risk management, offering clear, actionable strategies to enhance your organization's security posture. With a focus on real-world solutions, this guide balances practical application with foundational knowledge.Key Features: Foundational Insights: Explore fundamental concepts, frameworks, and required skills that form the backbone of a strong and pragmatic cyber risk management program tailored to your organization’s unique needs. It covers everything from basic principles and threat modeling to developing a security-first culture that drives change within your organization. You’ll also learn how to align cybersecurity practices with business objectives to ensure a solid approach to risk management. Practical Application: Follow a hands-on step-by-step implementation guide through the complete cyber risk management cycle, from business context analysis to developing and implementing effective treatment strategies. This book includes templates, checklists, and practical advice to execute your cyber risk management implementation, making complex processes manageable and straightforward. Real-world scenarios illustrate common pitfalls and effective solutions. Advanced Strategies: Go beyond the basics to achieve cyber resilience. Explore topics like third-party risk management, integrating cybersecurity with business continuity, and managing the risks of emerging technologies like AI and quantum computing. Learn how to build a proactive defense strategy that evolves with emerging threats and keeps your organization secure. “Cyber Risk Management in Practice: A Guide to Real-World Solutions by Carlos Morales serves as a beacon for professionals involved not only in IT or cybersecurity but across executive and operational roles within organizations. This book is an invaluable resource that I highly recommend for its practical insights and clear guidance” – José Antonio Fernández Carbajal. Executive Chairman and CEO of FEMSA

Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls

by Christopher Hodson

Most organizations are undergoing a digital transformation of some sort and are looking to embrace innovative technology, but new ways of doing business inevitably lead to new threats which can cause irreparable financial, operational and reputational damage. In an increasingly punitive regulatory climate, organizations are also under pressure to be more accountable and compliant. Cyber Risk Management clearly explains the importance of implementing a cyber security strategy and provides practical guidance for those responsible for managing threat events, vulnerabilities and controls, including malware, data leakage, insider threat and Denial-of-Service. Examples and use cases including Yahoo, Facebook and TalkTalk, add context throughout and emphasize the importance of communicating security and risk effectively, while implementation review checklists bring together key points at the end of each chapter. Cyber Risk Management analyzes the innate human factors around risk and how they affect cyber awareness and employee training, along with the need to assess the risks posed by third parties. Including an introduction to threat modelling, this book presents a data-centric approach to cyber risk management based on business impact assessments, data classification, data flow modelling and assessing return on investment. It covers pressing developments in artificial intelligence, machine learning, big data and cloud mobility, and includes advice on responding to risks which are applicable for the environment and not just based on media sensationalism.

Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls

by Christopher J Hodson

How can you manage the complex threats that can cause financial, operational and reputational damage to the business? This practical guide shows how to implement a successful cyber security programme. The second edition of Cyber Risk Management covers the latest developments in cyber security for those responsible for managing threat events, vulnerabilities and controls. These include the impact of Web3 and the metaverse on cyber security, supply-chain security in the gig economy and exploration of the global, macroeconomic conditions that affect strategies. It explains how COVID-19 and remote working changed the cybersecurity landscape.Cyber Risk Management presents a data-centric approach to cyber risk management based on business impact assessments, data classification, data flow modelling and assessing return on investment. It covers pressing developments in artificial intelligence, machine learning, big data and cloud mobility, and includes advice on dealing with malware, data leakage, insider threat and Denial-of-Service. With analysis on the innate human factors affecting cyber risk and awareness and the importance of communicating security effectively, this book is essential reading for all risk and cybersecurity professionals.

Cyber Risks for Business Professionals

by Rupert Kendrick

Realise the benefits of Internet technologies, while ensuring your company is protected from the associated risks!An effective risk management strategy is vital to your company's survival Internet technologies have revolutionised the way that business is conducted. However, these innovations expose your business to various risks. Inadequate security can lead to the theft of customer data and, in the event of technological failure or a cyberattack, your business could lose its ability to function altogether. An effective risk management strategy is, therefore, vital to your company's survival. Understand the origins of cyber risks and develop suitable strategies for their management Cyber Risks for Business Professionals: A Management Guide is a general guide to the origins of cyber risks and to developing suitable strategies for their management. It provides a breakdown of the main risks involved and shows you how to manage them. Covering the relevant legislation on information security and data protection, the author combines his legal expertise with a solid, practical grasp of the latest developments in IT to offer a comprehensive overview of a highly complex subject. Expert guidance examining the operational and technological risks Drawing on interviews with experts from Clifford Chance, Capgemini and Morgan Stanley amongst others, the book examines the operational and technological risks alongside the legal and compliance issues. This book will be invaluable to lawyers and accountants, as well as to company directors and business professionals. Benefits to business include: * Understand and manage the technological risks This book looks at the security issues surrounding Cloud computing, and highlights the problems that have arisen as a result of the use of laptop computers and memory sticks for remote working. Implementing a risk management framework will offer reassurance to your existing customers and improve your chances of winning new business. * Familiarise yourself with the legal issues You need to be aware of the laws that govern your activities when you do business online. The author offers you a guide to the most important aspects of IT law, and outlines the implications of recent legislation. The author also looks at the compliance requirements of PCI DSS (the Payment Card Industry Data Security Standard). * Control employee use of Web 2. 0 technologies While sites such as Facebook and LinkedIn help people to develop business contacts, employee misuse of social networking sites also causes problems, ranging from damage to the company's reputation to breaches of commercial confidentiality. This book offers advice on the right policy to adopt to ensure your staff use Web 2. 0 technologies responsibly. * Use technology to address the risks This book introduces you to IT solutions that you can deploy to improve your information security, such as encryption and digital watermarking. It also looks at how you can monitor and control e-mail to prevent the leaking of sensitive information.

Cyber Rules: Strategies for Excelling at E-Business

by Thomas M. Siebel Pat House

The book is about the dos and don'ts when doing the business through the Internet. It also has an overview of how the Internet opens new possibilities for business, in a nontechnical language.

Cyber Security Essentials

by Richard Howard James Graham Ryan Olson

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish

Cyber Security Foundations: Fundamentals, Technology and Society

by Keith Martin Konstantinos Mersinas Guido Schmitz Jassim Happa

Cyber Security Foundations introduces the core topics that all cyber security students and future professionals need to understand the cyber security landscape. It is a key textbook for postgraduate and undergraduate students taking modules related to cyber security and information security, as well as for general readers seeking to deepen their understanding of technical and human-centred digital security concepts.Features include:- Chapters on core areas such as cryptography, computer security, cyber security management, cybercrime and privacy, informed by the CyBOK knowledge areas- Demonstration of how the many facets of the discipline interrelate, allowing readers to gain a comprehensive understanding of the cyber security landscape- Real-world examples to illustrate the application of ideas- Learning outcomes and activities to help reinforce learning and exploration beyond the core text, and a glossary to equip readers with the language necessary to make sense of each topic

Cyber Security Management and Strategic Intelligence

by Peter Trim Yang-Im Lee

Within the organization, the cyber security manager fulfils an important and policy-oriented role. Working alongside the risk manager, the Information Technology (IT) manager, the security manager and others, the cyber security manager’s role is to ensure that intelligence and security manifest in a robust cyber security awareness programme and set of security initiatives that when implemented help strengthen the organization’s defences and those also of its supply chain partners.Cyber Security Management and Strategic Intelligence emphasizes the ways in which intelligence work can be enhanced and utilized, guiding the reader on how to deal with a range of cyber threats and strategic issues. Throughout the book, the role of the cyber security manager is central, and the work undertaken is placed in context with that undertaken by other important staff, all of whom deal with aspects of risk and need to coordinate the organization’s defences thus ensuring that a collectivist approach to cyber security management materializes. Real-world examples and cases highlight the nature and form that cyber-attacks may take, and reference to the growing complexity of the situation is made clear. In addition, various initiatives are outlined that can be developed further to make the organization less vulnerable to attack. Drawing on theory and practice, the authors outline proactive, and collectivist approaches to counteracting cyber-attacks that will enable organizations to put in place more resilient cyber security management systems, frameworks and planning processes.Cyber Security Management and Strategic Intelligence references the policies, systems and procedures that will enable advanced undergraduate and postgraduate students, researchers and reflective practitioners to understand the complexity associated with cyber security management and apply a strategic intelligence perspective. It will help the cyber security manager to promote cyber security awareness to a number of stakeholders and turn cyber security management initiatives into actionable policies of a proactive nature.

Cyber Security Management: A Governance, Risk and Compliance Framework

by Peter Trim Yang-Im Lee

Cyber Security Management: A Governance, Risk and Compliance Framework by Peter Trim and Yang-Im Lee has been written for a wide audience. Derived from research, it places security management in a holistic context and outlines how the strategic marketing approach can be used to underpin cyber security in partnership arrangements. The book is unique because it integrates material that is of a highly specialized nature but which can be interpreted by those with a non-specialist background in the area. Indeed, those with a limited knowledge of cyber security will be able to develop a comprehensive understanding of the subject and will be guided into devising and implementing relevant policy, systems and procedures that make the organization better able to withstand the increasingly sophisticated forms of cyber attack. The book includes a sequence-of-events model; an organizational governance framework; a business continuity management planning framework; a multi-cultural communication model; a cyber security management model and strategic management framework; an integrated governance mechanism; an integrated resilience management model; an integrated management model and system; a communication risk management strategy; and recommendations for counteracting a range of cyber threats. Cyber Security Management: A Governance, Risk and Compliance Framework simplifies complex material and provides a multi-disciplinary perspective and an explanation and interpretation of how managers can manage cyber threats in a pro-active manner and work towards counteracting cyber threats both now and in the future.

Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation (CSS Studies in Security and International Relations)

by Myriam Dunn Cavelty and Andreas Wenger

This book examines new and challenging political aspects of cyber security and presents it as an issue defined by socio-technological uncertainty and political fragmentation. Structured along two broad themes and providing empirical examples for how socio-technical changes and political responses interact, the first part of the book looks at the current use of cyber space in conflictual settings, while the second focuses on political responses by state and non-state actors in an environment defined by uncertainties. Within this, it highlights four key debates that encapsulate the complexities and paradoxes of cyber security politics from a Western perspective – how much political influence states can achieve via cyber operations and what context factors condition the (limited) strategic utility of such operations; the role of emerging digital technologies and how the dynamics of the tech innovation process reinforce the fragmentation of the governance space; how states attempt to uphold stability in cyberspace and, more generally, in their strategic relations; and how the shared responsibility of state, economy, and society for cyber security continues to be re-negotiated in an increasingly trans-sectoral and transnational governance space. This book will be of much interest to students of cyber security, global governance, technology studies, and international relations.

Cyber Security and Business Intelligence: Innovations and Machine Learning for Cyber Risk Management (Routledge Studies in Innovation, Organizations and Technology)

by Petr Hajek Mohammad Zoynul Abedin

To cope with the competitive worldwide marketplace, organizations rely on business intelligence to an increasing extent. Cyber security is an inevitable practice to protect the entire business sector and its customer. This book presents the significance and application of cyber security for safeguarding organizations, individuals’ personal information, and government. The book provides both practical and managerial implications of cyber security that also supports business intelligence and discusses the latest innovations in cyber security. It offers a roadmap to master degree students and PhD researchers for cyber security analysis in order to minimize the cyber security risk and protect customers from cyber-attack. The book also introduces the most advanced and novel machine learning techniques including, but not limited to, Support Vector Machine, Neural Networks, Extreme Learning Machine, Ensemble Learning, and Deep Learning Approaches, with a goal to apply those to cyber risk management datasets. It will also leverage real-world financial instances to practise business product modelling and data analysis. The contents of this book will be useful for a wide audience who are involved in managing network systems, data security, data forecasting, cyber risk modelling, fraudulent credit risk detection, portfolio management, and data regulatory bodies. It will be particularly beneficial to academics as well as practitioners who are looking to protect their IT system, and reduce data breaches and cyber-attack vulnerabilities.

Cyber Security and Business Intelligence: Innovations and Machine Learning for Cyber Risk Management (Routledge Studies in Innovation, Organizations and Technology)

by Petr Hajek Mohammad Zoynul Abedin

To cope with the competitive worldwide marketplace, organizations rely on business intelligence to an increasing extent. Cyber security is an inevitable practice to protect the entire business sector and its customer. This book presents the significance and application of cyber security for safeguarding organizations, individuals’ personal information, and government.The book provides both practical and managerial implications of cyber security that also supports business intelligence and discusses the latest innovations in cyber security. It offers a roadmap to master degree students and PhD researchers for cyber security analysis in order to minimize the cyber security risk and protect customers from cyber-attack. The book also introduces the most advanced and novel machine learning techniques including, but not limited to, Support Vector Machine, Neural Networks, Extreme Learning Machine, Ensemble Learning, and Deep Learning Approaches, with a goal to apply those to cyber risk management datasets. It will also leverage real-world financial instances to practise business product modelling and data analysis.The contents of this book will be useful for a wide audience who are involved in managing network systems, data security, data forecasting, cyber risk modelling, fraudulent credit risk detection, portfolio management, and data regulatory bodies. It will be particularly beneficial to academics as well as practitioners who are looking to protect their IT system, and reduce data breaches and cyber-attack vulnerabilities.

Cyber Security and Operations Management for Industry 4.0

by Ahmed A Elngar

This book seamlessly connects the topics of Industry 4.0 and cyber security. It discusses the risks and solutions of using cyber security techniques for Industry 4.0.Cyber Security and Operations Management for Industry 4.0 covers the cyber security risks involved in the integration of Industry 4.0 into businesses and highlights the issues and solutions. The book offers the latest theoretical and practical research in the management of cyber security issues common in Industry 4.0 and also discusses the ethical and legal perspectives of incorporating cyber security techniques and applications into the day-to-day functions of an organization. Industrial management topics related to smart factories, operations research, and value chains are also discussed.This book is ideal for industry professionals, researchers, and those in academia who are interested in learning more about how cyber security and Industry 4.0 are related and can work together.

Cyber Security. Simply. Make it Happen.: Leveraging Digitization Through IT Security (Management for Professionals)

by Ferri Abolhassan

This book provides a practical and strategic perspective on IT and cyber security for corporations and other businesses. Leading experts from industry, politics and research discuss the status quo and future prospects of corporate cyber security. They answer questions such as: How much will IT security cost? Who will provide IT security? Can security even be fun? The book claims that digitization will increasingly pervade all areas of the economy, as well as our daily professional and personal lives. It will produce speed, agility and cost efficiency, but also increasing vulnerability in the context of public, corporate and private life. Consequently, cyber security is destined to become the great facilitator of digitization, providing maximum protection for data, networks, data centres and terminal devices.

Refine Search

Showing 23,476 through 23,500 of 100,000 results