Cyber threat ! - How to Manage the Growing Risk of Cyber Attacks -... - Librairie Eyrolles

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Cyber threat !
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Cyber threat !

Cyber threat !

How to Manage the Growing Risk of Cyber Attacks

MacDonnell Ulsch

202 pages, parution le 01/09/2014

Résumé

Conquering cyber attacks requires a multi-sector, multi-modal approach Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences. Much more than just cyber security, the necessary solutions require government and industry to work cooperatively and intelligently. This resource reveals the extent of the problem, and provides a plan to change course and better manage and protect critical information.

Recent news surrounding cyber hacking operations show how intellectual property theft is now a matter of national security, as well as economic and commercial security. Consequences are far-reaching, and can have enormous effects on national economies and international relations. Aggressive cyber forces in China, Russia, Eastern Europe and elsewhere, the rise of global organized criminal networks, and inattention to vulnerabilities throughout critical infrastructures converge to represent an abundantly clear threat. Managing the threat and keeping information safe is now a top priority for global businesses and government agencies. Cyber Threat! breaks the issue down into real terms, and proposes an approach to effective defense. Topics include:

The information at risk
The true extent of the threat
The potential consequences across sectors

Sommaire

  • Foreword
  • Preface
  • Acknowledgments
  • Introduction: What Every Current and Future Senior Executive Must Know about the Cyber Threat: A Perfect Digital Storm Is Forming
  • What Factors Create a Perfect Storm?
  • Increasingly Sophisticated Attacks
  • Mobile Devices at Higher Risk
  • Sometimes Security Just Doesn't Take Hold
  • It Wasn't Always Like This
  • Without a Bang
  • A Board Issue
  • The Cyber Frankenstein Cometh
  • Defining Success
  • Notes
  • PART I: THE CYBER THREAT TO THE CORPORATE BRAND: HOW IT WILL IMPACT YOUR COMPANY
  • Chapter 1: The Rise of Cyber Organized Crime and Its Global Impact
  • Is Nothing Sacred?
  • The Liberty Reserve Case: Money Laundering in the Digital Age
  • The Corruption Factor
  • Information Threat, Physical Threat
  • Notes
  • Chapter 2: The Emergence of the Cyber Nation-State and Technology Espionage: Red China Rising and Its Global Cyber Theft Strategy
  • A Case of Cyber Espionage Conspiracy?
  • According to the Select Committee . . .
  • Notes
  • Chapter 3: Cyber Al Qaeda Poses a Threat to Critical Infrastructure
  • A Disabled America
  • A New Age: Inspiring Terrorists and Terrorism
  • A Call Heard Vaguely
  • Attack upon Attack, No Peace in Sight
  • Notes
  • PART II: CORPORATE VULNERABILITIES IN THE DIGITAL SOCIETY: PREPARE TO DEFEND YOURSELF AND YOUR BRAND
  • Chapter 4: What Is the True Cost of a Cyber Attack?
  • Cyber Attack Detection Sometimes Takes Years
  • One of the First Questions: "How Much Will This Cost?"
  • A Few Common Cost Factors
  • What about Unreported Breaches?
  • Cyber Attacks Result in a Wider Impact: The Community
  • Notes
  • Chapter 5: U.S. Cyber Public Policy: Don't Rely on It to Protect the Brand
  • No Guarantees with This Executive Order
  • Government-Industry Cooperation: No Silver Bullet
  • The Challenge of Defining Cyber Public Policy
  • Cold War II: The Cyber Chapter
  • Is There a Silver Lining in an Attack?
  • Notes
  • Chapter 6: Four Trends Driving Cyber Breaches and Increasing Corporate Risk: Technological, Cultural, Economic, and Geopolitical Shifts
  • Technology Trend
  • Loss of Situational Awareness: Distraction
  • Culture
  • Technology Is a Double-Edged Sword
  • Notes
  • Chapter 7: Social Media and Digital Protest
  • Social Media: A Tool for Disruption, a Model for Change
  • The Hacker Group Anonymous
  • Anarchaos: In the Image of Anonymous
  • Notes
  • PART III: PROTECTING THE BRAND: ACTIONS EXECUTIVE MANAGEMENT MUST TAKE TO REDUCE CYBER RISK
  • Chapter 8: Managing the Brand When the Worst Occurs
  • Be Prepared
  • Chapter 9: Managing the Big Risk: Third-Party Vendors
  • Background Investigation Suggestions to Improve Process
  • Risk-Reinforced Service Level Agreements
  • Clouds Fill the Horizon
  • Notes
  • Chapter 10: Creating Executive Cyber Risk Councils
  • The Goal of the Executive Cyber Risk Council
  • Who Should Be Included in the Executive Risk Council?
  • Chapter 11: Early Warnings: Something Bad Is on the Way
  • Technical Signals Are There-But You've Got to Look
  • Know Who's Inside the Enterprise
  • What a Web We Weave . . . When Surfing
  • About the Author
  • Index
Voir tout
Replier

Caractéristiques techniques

  PAPIER
Éditeur(s) Wiley
Auteur(s) MacDonnell Ulsch
Parution 01/09/2014
Nb. de pages 202
Format 16 x 23.5
Couverture Relié
Intérieur Noir et Blanc
EAN13 9781118836354
ISBN13 978-1-118-83635-4

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription