- Table View
- List View
Cyber Rules: Strategies for Excelling at E-Business
by Thomas M. Siebel Pat HouseThe book is about the dos and don'ts when doing the business through the Internet. It also has an overview of how the Internet opens new possibilities for business, in a nontechnical language.
Cyber Security Essentials
by Richard Howard James Graham Ryan OlsonThe sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish
Cyber Security Foundations: Fundamentals, Technology and Society
by Keith Martin Konstantinos Mersinas Guido Schmitz Jassim HappaCyber Security Foundations introduces the core topics that all cyber security students and future professionals need to understand the cyber security landscape. It is a key textbook for postgraduate and undergraduate students taking modules related to cyber security and information security, as well as for general readers seeking to deepen their understanding of technical and human-centred digital security concepts.Features include:- Chapters on core areas such as cryptography, computer security, cyber security management, cybercrime and privacy, informed by the CyBOK knowledge areas- Demonstration of how the many facets of the discipline interrelate, allowing readers to gain a comprehensive understanding of the cyber security landscape- Real-world examples to illustrate the application of ideas- Learning outcomes and activities to help reinforce learning and exploration beyond the core text, and a glossary to equip readers with the language necessary to make sense of each topic
Cyber Security Management and Strategic Intelligence
by Peter Trim Yang-Im LeeWithin the organization, the cyber security manager fulfils an important and policy-oriented role. Working alongside the risk manager, the Information Technology (IT) manager, the security manager and others, the cyber security manager’s role is to ensure that intelligence and security manifest in a robust cyber security awareness programme and set of security initiatives that when implemented help strengthen the organization’s defences and those also of its supply chain partners.Cyber Security Management and Strategic Intelligence emphasizes the ways in which intelligence work can be enhanced and utilized, guiding the reader on how to deal with a range of cyber threats and strategic issues. Throughout the book, the role of the cyber security manager is central, and the work undertaken is placed in context with that undertaken by other important staff, all of whom deal with aspects of risk and need to coordinate the organization’s defences thus ensuring that a collectivist approach to cyber security management materializes. Real-world examples and cases highlight the nature and form that cyber-attacks may take, and reference to the growing complexity of the situation is made clear. In addition, various initiatives are outlined that can be developed further to make the organization less vulnerable to attack. Drawing on theory and practice, the authors outline proactive, and collectivist approaches to counteracting cyber-attacks that will enable organizations to put in place more resilient cyber security management systems, frameworks and planning processes.Cyber Security Management and Strategic Intelligence references the policies, systems and procedures that will enable advanced undergraduate and postgraduate students, researchers and reflective practitioners to understand the complexity associated with cyber security management and apply a strategic intelligence perspective. It will help the cyber security manager to promote cyber security awareness to a number of stakeholders and turn cyber security management initiatives into actionable policies of a proactive nature.
Cyber Security Management: A Governance, Risk and Compliance Framework
by Peter Trim Yang-Im LeeCyber Security Management: A Governance, Risk and Compliance Framework by Peter Trim and Yang-Im Lee has been written for a wide audience. Derived from research, it places security management in a holistic context and outlines how the strategic marketing approach can be used to underpin cyber security in partnership arrangements. The book is unique because it integrates material that is of a highly specialized nature but which can be interpreted by those with a non-specialist background in the area. Indeed, those with a limited knowledge of cyber security will be able to develop a comprehensive understanding of the subject and will be guided into devising and implementing relevant policy, systems and procedures that make the organization better able to withstand the increasingly sophisticated forms of cyber attack. The book includes a sequence-of-events model; an organizational governance framework; a business continuity management planning framework; a multi-cultural communication model; a cyber security management model and strategic management framework; an integrated governance mechanism; an integrated resilience management model; an integrated management model and system; a communication risk management strategy; and recommendations for counteracting a range of cyber threats. Cyber Security Management: A Governance, Risk and Compliance Framework simplifies complex material and provides a multi-disciplinary perspective and an explanation and interpretation of how managers can manage cyber threats in a pro-active manner and work towards counteracting cyber threats both now and in the future.
Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation (CSS Studies in Security and International Relations)
by Myriam Dunn Cavelty and Andreas WengerThis book examines new and challenging political aspects of cyber security and presents it as an issue defined by socio-technological uncertainty and political fragmentation. Structured along two broad themes and providing empirical examples for how socio-technical changes and political responses interact, the first part of the book looks at the current use of cyber space in conflictual settings, while the second focuses on political responses by state and non-state actors in an environment defined by uncertainties. Within this, it highlights four key debates that encapsulate the complexities and paradoxes of cyber security politics from a Western perspective – how much political influence states can achieve via cyber operations and what context factors condition the (limited) strategic utility of such operations; the role of emerging digital technologies and how the dynamics of the tech innovation process reinforce the fragmentation of the governance space; how states attempt to uphold stability in cyberspace and, more generally, in their strategic relations; and how the shared responsibility of state, economy, and society for cyber security continues to be re-negotiated in an increasingly trans-sectoral and transnational governance space. This book will be of much interest to students of cyber security, global governance, technology studies, and international relations.
Cyber Security and Business Intelligence: Innovations and Machine Learning for Cyber Risk Management (Routledge Studies in Innovation, Organizations and Technology)
by Petr Hajek Mohammad Zoynul AbedinTo cope with the competitive worldwide marketplace, organizations rely on business intelligence to an increasing extent. Cyber security is an inevitable practice to protect the entire business sector and its customer. This book presents the significance and application of cyber security for safeguarding organizations, individuals’ personal information, and government. The book provides both practical and managerial implications of cyber security that also supports business intelligence and discusses the latest innovations in cyber security. It offers a roadmap to master degree students and PhD researchers for cyber security analysis in order to minimize the cyber security risk and protect customers from cyber-attack. The book also introduces the most advanced and novel machine learning techniques including, but not limited to, Support Vector Machine, Neural Networks, Extreme Learning Machine, Ensemble Learning, and Deep Learning Approaches, with a goal to apply those to cyber risk management datasets. It will also leverage real-world financial instances to practise business product modelling and data analysis. The contents of this book will be useful for a wide audience who are involved in managing network systems, data security, data forecasting, cyber risk modelling, fraudulent credit risk detection, portfolio management, and data regulatory bodies. It will be particularly beneficial to academics as well as practitioners who are looking to protect their IT system, and reduce data breaches and cyber-attack vulnerabilities.
Cyber Security and Business Intelligence: Innovations and Machine Learning for Cyber Risk Management (Routledge Studies in Innovation, Organizations and Technology)
by Petr Hajek Mohammad Zoynul AbedinTo cope with the competitive worldwide marketplace, organizations rely on business intelligence to an increasing extent. Cyber security is an inevitable practice to protect the entire business sector and its customer. This book presents the significance and application of cyber security for safeguarding organizations, individuals’ personal information, and government.The book provides both practical and managerial implications of cyber security that also supports business intelligence and discusses the latest innovations in cyber security. It offers a roadmap to master degree students and PhD researchers for cyber security analysis in order to minimize the cyber security risk and protect customers from cyber-attack. The book also introduces the most advanced and novel machine learning techniques including, but not limited to, Support Vector Machine, Neural Networks, Extreme Learning Machine, Ensemble Learning, and Deep Learning Approaches, with a goal to apply those to cyber risk management datasets. It will also leverage real-world financial instances to practise business product modelling and data analysis.The contents of this book will be useful for a wide audience who are involved in managing network systems, data security, data forecasting, cyber risk modelling, fraudulent credit risk detection, portfolio management, and data regulatory bodies. It will be particularly beneficial to academics as well as practitioners who are looking to protect their IT system, and reduce data breaches and cyber-attack vulnerabilities.
Cyber Security and Operations Management for Industry 4.0
by Ahmed A ElngarThis book seamlessly connects the topics of Industry 4.0 and cyber security. It discusses the risks and solutions of using cyber security techniques for Industry 4.0.Cyber Security and Operations Management for Industry 4.0 covers the cyber security risks involved in the integration of Industry 4.0 into businesses and highlights the issues and solutions. The book offers the latest theoretical and practical research in the management of cyber security issues common in Industry 4.0 and also discusses the ethical and legal perspectives of incorporating cyber security techniques and applications into the day-to-day functions of an organization. Industrial management topics related to smart factories, operations research, and value chains are also discussed.This book is ideal for industry professionals, researchers, and those in academia who are interested in learning more about how cyber security and Industry 4.0 are related and can work together.
Cyber Security. Simply. Make it Happen.: Leveraging Digitization Through IT Security (Management for Professionals)
by Ferri AbolhassanThis book provides a practical and strategic perspective on IT and cyber security for corporations and other businesses. Leading experts from industry, politics and research discuss the status quo and future prospects of corporate cyber security. They answer questions such as: How much will IT security cost? Who will provide IT security? Can security even be fun? The book claims that digitization will increasingly pervade all areas of the economy, as well as our daily professional and personal lives. It will produce speed, agility and cost efficiency, but also increasing vulnerability in the context of public, corporate and private life. Consequently, cyber security is destined to become the great facilitator of digitization, providing maximum protection for data, networks, data centres and terminal devices.
Cyber Security: Power and Technology (Intelligent Systems, Control and Automation: Science and Engineering #93)
by Pekka Neittaanmäki Martti LehtoThis book gathers the latest research results of scientists from different countries who have made essential contributions to the novel analysis of cyber security. Addressing open problems in the cyber world, the book consists of two parts. Part I focuses on cyber operations as a new tool in global security policy, while Part II focuses on new cyber security technologies when building cyber power capabilities. The topics discussed include strategic perspectives on cyber security and cyber warfare, cyber security implementation, strategic communication, trusted computing, password cracking, systems security and network security among others.
Cyber Security: Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papers (Communications in Computer and Information Science #589)
by Kristin Haltinner Dilshani Sarathchandra Jim Alves-Foss Kevin Chang Daniel Conte de Leon Jia SongThis book constitutes the refereed proceedings of the Second International Symposium on Cyber Security, CSS 2015, held in Coeur d'Alene, ID, USA, in April 2015. The 9 revised full papers presented were carefully reviewed and selected from 20 papers. The papers reflect four areas of scholarly work: permissions and trust evaluation, implementation and management; cloud and device security and privacy; social implications of networked and mobile applications; system and process assessments for improved cybersecurity.
Cyber Situational Awareness in Public-Private-Partnerships: Organisationsübergreifende Cyber-Sicherheitsvorfälle effektiv bewältigen
by Florian Skopik Maria Leitner Tímea PáhiDigitale Dienste werden für unsere Gesellschaft immer wichtiger, daher gelangen sie auch stärker ins Visier von Wirtschaftskriminellen, Spionen, Terroristen oder staatsfeindlichen Gruppierungen. Wie schützen sich Unternehmen und Staaten vor solchen Cyber-Attacken? Ein wichtiger Grundstein ist die Schaffung von Behörden, wie sie die EU-Richtlinie über Maßnahmen zur Gewährleistung eines hohen gemeinsamen Sicherheitsniveaus von Netz- und Informationssystemen (NIS) vorsieht. Das Buch zeigt, wie sich die Zusammenarbeit von Unternehmen mit diesen NIS-Behörden gestaltet mit dem gemeinsamen Ziel, Cyber-Sicherheit zu etablieren und zu gewährleisten. Darüber hinaus legen die Autoren dar, wie sich die NIS-Richtlinie und die im Mai 2018 in Kraft getretene EU-Datenschutz-Grundverordnung (DSGVO) auf Security-Prozesse in Unternehmen auswirken können. Das Buch verknüpft technische, organisatorische und rechtliche Aspekte der Zusammenarbeit und spiegelt damit die Komplexität des Themas wider. Zugleich liefert es zahlreiche Vorschläge zur Umsetzung der EU-Richtlinie. Im Mittelpunkt steht dabei das Konzept der „Cyber Situational Awareness“ – das bewusste Erfassen der aktuellen Lage – und damit ein Instrument, mit dem sich die Reaktionsfähigkeit bei Cyber-Angriffen wesentlich erhöhen lässt. Folgende Themen werden erläutert: • Aufbau und Nutzung von Cyber Situational Awareness • Erstellung von Cyber-Lagebildern auf nationaler Ebene • Informations- und Datenquellen für Cyber-Lagebilder• Informationsaustausch zwischen Cyber-Lagezentren und Stakeholdern • Informations- und Meldepflichten von Unternehmen• Planspiel zur Bildung und Evaluierung von Cyber Situational Awareness
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)
by MacDonnell UlschConquering cyber attacks requires a multi-sector, multi-modal approach Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences. Much more than just cyber security, the necessary solutions require government and industry to work cooperatively and intelligently. This resource reveals the extent of the problem, and provides a plan to change course and better manage and protect critical information. Recent news surrounding cyber hacking operations show how intellectual property theft is now a matter of national security, as well as economic and commercial security. Consequences are far-reaching, and can have enormous effects on national economies and international relations. Aggressive cyber forces in China, Russia, Eastern Europe and elsewhere, the rise of global organized criminal networks, and inattention to vulnerabilities throughout critical infrastructures converge to represent an abundantly clear threat. Managing the threat and keeping information safe is now a top priority for global businesses and government agencies. Cyber Threat! breaks the issue down into real terms, and proposes an approach to effective defense. Topics include: The information at risk The true extent of the threat The potential consequences across sectors The multifaceted approach to defense The growing cyber threat is fundamentally changing the nation's economic, diplomatic, military, and intelligence operations, and will extend into future technological, scientific, and geopolitical influence. The only effective solution will be expansive and complex, encompassing every facet of government and industry. Cyber Threat! details the situation at hand, and provides the information that can help keep the nation safe.
Cyber Wars: Hacks that Shocked the Business World
by Charles ArthurCyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game changing hacks that make organizations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders and this book provides a deep insight into understanding how they work, how hackers think as well as giving invaluable advice on staying vigilant and avoiding the security mistakes and oversights that can lead to downfall. No organization is safe but by understanding the context within which we now live and what the hacks of the future might look like, you can minimize the threat. In Cyber Wars, you will learn how hackers in a TK Maxx parking lot managed to steal 94m credit card details costing the organization $1bn; how a 17 year old leaked the data of 157,000 TalkTalk customers causing a reputational disaster; how Mirai can infect companies' Internet of Things devices and let hackers control them; how a sophisticated malware attack on Sony caused corporate embarrassment and company-wide shut down; and how a phishing attack on Clinton Campaign Chairman John Podesta's email affected the outcome of the 2016 US election.
Cyber and the City: Securing London’s Banks in the Computer Age (History of Computing)
by Ashley SweetmanCyber security is the greatest risk faced by financial institutions today, a risk they have understood and managed for decades longer than is commonly understood. Ever since the major London banks purchased their first computers in the early 1960s, they have had to balance their dependence on those machines with the need to secure their operations and retain the trust of their customers. Technological change in the second half of the 20th century prompted British banks to reevaluate their function as trusted protectors of wealth. In the City of London, the capital’s oldest area and historically its business and commerce hub, the colossal clearing banks employed newly commercialised electronic computers—the processing power of which could transform the highly clerical clearing and settlement process. What unfolded over the following three decades was a relentless modernisation drive. Revolutionising the way that banks and other financial institutions conducted business and interacted with each other and permanently altering the speed and scale at which the United Kingdom’s financial sector functioned, this rapid modernisation thrust computer security into the consciousness of bank executives and their clients alike. Dependence on computers quickly grew, and the banks immediately realised the need to secure their new software and hardware. Focusing on the period 1960 to 1990, this book uses newly released and previously unexplored archival material to trace the origins of cyber security in the UK financial sector. Topics and features: Describes how institutions managed the evolving challenge of computer security in the second half of the 20th century Demonstrates continuity in banks' views of security through the prism of confidentiality, integrity and availability, and the concept of resilience Presents case studies of bank collaboration on computer security through creation of payment systems like SWIFT and CHAPS Outlines the shift from focusing on physical security measures to technical network-protection measures Explores the relationship between banks and the UK Government as bank operations became dependent on computer and network technology This work will be of value to students and academic researchers in the history of computing, financial history, and the history of intelligence and security, as well as the general reader interested in contemporary intelligence, cyber security, and finance.
Cyber-Physical Microgrids
by Yan LiThis textbook provides students with an overview of cyber-physical microgrid networks and an in-depth introduction to photovoltaics, batteries, flywheel, supercapacitor, micro-turbines, wind generation, power-electronic interfaces, modeling and stability analysis of microgrids, and cyber-communication networks and security. The text helps upper-level undergraduate and graduate students gain a foundational understanding of microgrids and renewable energy, and offers an introduction to the frontier of theoretical research and practical applications of cyber-physical systems, paving the way to uncover and understand the operational mechanism of cyber-physical microgrids. The book includes examples and test systems throughout for problem-solving and will be an essential resource for students, researchers, and professionals in power engineering.
Cyber-Physical Systems in the Construction Sector
by Wesam Salah AlaloulCyber-Physical Systems (CPSs) are mechanisms for monitoring and controlling processes using computer-based algorithms. In the construction industry, CPSs help to increase the viability of construction projects by reducing costs, time and management effort. This book aims to develop the fundamental concepts of construction project management associated with the CPSs and their applications within the modern construction industry in alignment with the scope of the Fourth Industrial Revolution (IR4.0). The book has been structured in a systematic way for easy understanding by construction industry researchers and academic faculty. The first part of the book helps readers to develop a basic understanding of the fundamental concepts of construction project management and CPSs. Followed by the second part about the CPSs implementation framework and understanding the operational concepts associated with the notion of IoT and Digital Twins within the construction industry. The third part of the book describes modelling/simulation techniques to develop the customised CPSs for construction project management. The concluding part provides an in-depth review of applications of CPSs, associated threats and security.
Cyber-Proletariat: Global Labour in the Digital Vortex
by Nick Dyer-WithefordThe utopian promise of the internet, much talked about even a few years ago, has given way to brutal realities: coltan mines in the Congo, electronics factories in China, devastated neighborhoods in Detroit. Cyber-Proletariat shows us the dark-side of the information revolution through an unsparing analysis of class power and computerization. Dyer-Witheford investigates how technology facilitates growing polarization between wealthy elites and precarious workers. He reveals the class domination behind everything from expanding online surveillance to intensifying robotization. At the same time, he looks at possibilities for information technology within radical movements.
CyberArk: Protecting the Keys to the IT Kingdom
by David B. Yoffie Raffaella Sadun Margot EiranCyberArk was the recognized leader in the Privileged Account Management (PAM) space, a cybersecurity sub-segment it had essentially created to secure organizations’ IT systems and sensitive data. Over 17 years the Israeli company had grown to a market capitalization of over $1.6 billion, with sales exceeding $217 million, and 900 global employees with a strong corporate culture. In May 2017, Udi Mokady, Founder, Chairman and CEO, debated how best to drive growth. He mulled over whether he should stay the course and remain focused on providing best of breed PAM for enterprises, both on-premise and in the cloud, or expand into new markets. Cyber threats were on the rise, which afforded numerous growth opportunities such as entering the broader identity management space, creating new products to protect critical infrastructure, and securing the burgeoning world of the Internet of Things (IoT). This case explores the company's competitive position, the challenges of sustaining its advantages in a highly competitive and consolidating industry, and whether it should pursue organic or inorganic growth, while maintaining company culture.
CyberArk: Protecting the Keys to the IT Kingdom
by David B. Yoffie Raffaella Sadun Margot EiranCyberArk was the recognized leader in the Privileged Account Management (PAM) space, a cybersecurity sub-segment it had essentially created to secure organizations' IT systems and sensitive data. Over 17 years the Israeli company had grown to a market capitalization of over $1.6 billion, with sales exceeding $217 million, and 900 global employees with a strong corporate culture. In May 2017, Udi Mokady, Founder, Chairman and CEO, debated how best to drive growth. He mulled over whether he should stay the course and remain focused on providing best of breed PAM for enterprises, both on-premise and in the cloud, or expand into new markets. Cyber threats were on the rise, which afforded numerous growth opportunities such as entering the broader identity management space, creating new products to protect critical infrastructure, and securing the burgeoning world of the Internet of Things (IoT). This case explores the company's competitive position, the challenges of sustaining its advantages in a highly competitive and consolidating industry, and whether it should pursue organic or inorganic growth, while maintaining company culture.
CyberForensics: Understanding Information Security Investigations (Springer’s Forensic Laboratory Science Series)
by Jennifer BayukThis fascinating and highly topical subject has a history dating back to the secret world of 1970s Cold War espionage, when the US military and Central intelligence agencies, aided by the latest mainframe systems, were the first to use computer forensics techniques in counterintelligence. In the decades since, cybercrime has emerged from the obscurity of low-level prosecution evidence to become a serious cross-border crime issue, while cyberforensic investigators have moved on from drug, murder, and child pornography crimes that were facilitated by computers, and are now tackling headline-grabbing cyber bank robbery, identity theft, and corporate spying. With little consensus as yet on the qualifications required to become a cyberforensic investigator, Cyberforensics: Understanding Information Security Investigations assembles the varying perspectives of pioneers and key figures in the field. All the authors have more than 10 years' experience in successfully investigating cybercrime, and some more than 20. Through real-life case studies the chapters introduce the reader to the field of cybersecurity, starting with corporate investigation, and progressing to analyze the issues in more detail. Taking us from accounting cyberforensics to unraveling the complexities of malware, the contributors explain the tools and techniques they use in a manner that allows us to map their methodology into a more generic understanding of what a cybersecurity investigation really is. Above all, Cyberforensics shows that there is a cohesive set of concepts that binds cybersecurity investigators to a shared vision. These core ideas are now gaining importance as a body of knowledge that cyberforensics professionals agree should be a prerequisite to the professional practice of information security.
CyberStrong: A Primer on Cyber Risk Management for Business Managers
by Ajay SinghCyber risk is one of the biggest challenges businesses face in the 21st Century. The increasing dependence and use of technology to run businesses combined with the spate of cyber-attacks and risk to reputational damage in recent times has made cybersecurity a top priority for corporates as well as big and small businesses Limited knowledge of cybersecurity among business leaders and managers is a major barrier for effective cyber risk management. This book empowers business managers to assess cyber threats, integrate cybersecurity strategy with business goals, and build appropriate response systems to deal with cyber risks.
CyberUnion: Empowering Labor Through Computer Technology
by Arthur B ShostackKey players in organized labour in the USA and abroad are busy modernizing their communications and making creative and effective use of computers and other technology. The author of this book argues that the road to CyberUnion has begun and that those unions are ensuring a future strength.
Cyberboss: The Rise of Algorithmic Management and the New Struggle for Control at Work
by Craig GentHow technologies of organization are redrawing the lines of class struggleAcross the world, algorithms are changing the nature of work. Nowhere is this clearer than in the logistics and distribution sectors, where workers are instructed, tracked and monitored by increasingly dystopian management technologies.In Cyberboss, Craig Gent takes us into workplaces where algorithms rule to excavate the politics behind the newest form of managerial power. Combining worker testimony and original research on companies such as Amazon, Uber, and Deliveroo, the cutting edge of algorithmic management technology, this book reveals the sometimes unexpected effects these new techniques have on work, workers and managers. Gent advances an alternative politics of resistance in the face of digital control.