Cyber Security: The complete guide to cyber threats and protection, 2nd Edition
- Length: 222 pages
- Edition: 2
- Language: English
- Publisher: BCS
- Publication Date: 2022-12-12
- ISBN-10: 1780175957
- ISBN-13: 9781780175959
- Sales Rank: #0 (See Top 100 Books)
Cyber security has never been more essential than it is today, it’s not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data secure. Cyber Security explains the fundamentals of information security, how to shape good organisational security practice, and how to recover effectively should the worst happen. Written in an accessible manner, Cyber Security provides practical guidance and actionable steps to better prepare your workplace and your home alike. This second edition has been updated to reflect the latest threats and vulnerabilities in the IT security landscape, and updates to standards, good practice guides and legislation. • A valuable guide to both current professionals at all levels and those wishing to embark on a cyber security profession • Offers practical guidance and actionable steps for individuals and businesses to protect themselves • Highly accessible and terminology is clearly explained and supported with current, real-world examples
Front Cover Half-Title Page BCS, The Chartered Institute for It Title Page Copyright Page Dedication Contents List of figures and tables Author Acknowledgements Preface Part I Cyber Security Issues 1. Introduction Background The expectations of users and organisations Cyber security in the wider context 2. The Big Issues Some thoughts on social, political and other issues Cybercrime Cyber harassment or cyber bullying Cyber warfare Cyber surveillance Why we should care What makes cyber security difficult? 3. Cyber Targets Individual targets Business targets Critical national infrastructure (CNI) targets Building targets Academia and research targets Manufacturing and industry targets 4. Cyber Vulnerabilities and Impacts Cyber vulnerabilities Cyber impacts 5. Cyber Threats Types of attacker Motives: what drives an attacker Means Cyber-attack methods Types of cyber-attack and attack vectors The risks of conducting a cyber-attack Part II Cyber Security Solutions 6. Information Risk Management Overview A general view of risk Assets Threats Vulnerabilities Likelihood or probability Qualitative and quantitative assessments The risk management process 7. Business Continuity and Disaster Recovery Failures Business continuity Disaster recovery 8. Basic Cyber Security Steps General security advice Technical security advice Mobile working 9. Organisational Security Steps Security policies overview Directive policies Administrative policies Communal policies Technical policies 10. Awareness and Training Awareness Training 11. Information Sharing Trust Information classification Protection of shared information Anonymisation of shared information Routes to information sharing Part III Appendices Appendix A – Standards Cyber security standards ISO/IEC 27000 series standards Other relevant ISO standards Business continuity standards National Institute of Standards and Technology (NIST) standards Appendix B – Good Practice Guidelines General cyber security advice UK government cyber security advice Appendix C – Cyber Security Law UK Law EU Directives and Regulations Appendix D – Training and Qualifications Generic cyber security training and qualifications Specific cyber security training and qualifications Appendix E – Links to Other Useful Organisations Appendix F – Further Reading Appendix G – Abbreviations and Glossary Abbreviations Glossary Index Back Cover
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.