Cyber Security Policy Guidebook
Home > Computing and Information Technology > Computer security > Cyber Security Policy Guidebook
Cyber Security Policy Guidebook

Cyber Security Policy Guidebook

|
     0     
5
4
3
2
1




International Edition


About the Book

Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current approaches to the security of cyberspace. It includes thorough descriptions—as well as the pros and cons—of a plethora of issues, and documents policy alternatives for the sake of clarity with respect to policy alone. The Guidebook also delves into organizational implementation issues, and equips readers with descriptions of the positive and negative impact of specific policy choices. Inside are detailed chapters that: Explain what is meant by cyber security and cyber security policy Discuss the process by which cyber security policy goals are set Educate the reader on decision-making processes related to cyber security Describe a new framework and taxonomy for explaining cyber security policy issues Show how the U.S. government is dealing with cyber security policy issues With a glossary that puts cyber security language in layman's terms—and diagrams that help explain complex topics—Cyber Security Policy Guidebook gives students, scholars, and technical decision-makers the necessary knowledge to make informed decisions on cyber security policy.

Table of Contents:
Foreword ix Preface xi Acknowledgments xv 1 Introduction 1 1.1 What Is Cyber Security? 1 1.2 What Is Cyber Security Policy? 3 1.3 Domains of Cyber Security Policy 7 1.3.1 Laws and Regulations 7 1.3.2 Enterprise Policy 9 1.3.3 Technology Operations 10 1.3.4 Technology Configuration 10 1.4 Strategy versus Policy 11 2 Cyber Security Evolution 15 2.1 Productivity 15 2.2 Internet 21 2.3 e-Commerce 28 2.4 Countermeasures 34 2.5 Challenges 37 3 Cyber Security Objectives 39 3.1 Cyber Security Metrics 40 3.2 Security Management Goals 45 3.3 Counting Vulnerabilities 49 3.4 Security Frameworks 51 3.4.1 e-Commerce Systems 52 3.4.2 Industrial Control Systems 57 3.4.3 Personal Mobile Devices 62 3.5 Security Policy Objectives 67 4 Guidance for Decision Makers 69 4.1 Tone at the Top 69 4.2 Policy as a Project 71 4.3 Cyber Security Management 73 4.3.1 Arriving at Goals 74 4.3.2 Cyber Security Documentation 77 4.4 Using the Catalog 79 5 The Catalog Approach 83 5.1 Catalog Format 87 5.2 Cyber Security Policy Taxonomy 89 6 Cyber Security Policy Catalog 93 6.1 Cyber Governance Issues 94 6.1.1 Net Neutrality 95 6.1.2 Internet Names and Numbers 96 6.1.3 Copyrights and Trademarks 103 6.1.4 Email and Messaging 107 6.2 Cyber User Issues 112 6.2.1 Malvertising 116 6.2.2 Impersonation 117 6.2.3 Appropriate Use 121 6.2.4 Cyber Crime 125 6.2.5 Geolocation 136 6.2.6 Privacy 138 6.3 Cyber Conflict Issues 140 6.3.1 Intellectual Property Theft 144 6.3.2 Cyber Espionage 145 6.3.3 Cyber Sabotage 150 6.3.4 Cyber Warfare 150 6.4 Cyber Management Issues 155 6.4.1 Fiduciary Responsibility 162 6.4.2 Risk Management 163 6.4.3 Professional Certification 171 6.4.4 Supply Chain 172 6.4.5 Security Principles 175 6.4.6 Research and Development 185 6.5 Cyber Infrastructure Issues 186 6.5.1 Banking and Finance 190 6.5.2 Health Care 194 6.5.3 Industrial Control Systems 197 7 One Government’s Approach to Cyber Security Policy 211 7.1 U.S. Federal Cyber Security Strategy 211 7.2 A Brief History of Cyber Security Public Policy Development in the U.S. Federal Government 212 7.2.1 The Bombing of New York’s World Trade Center on February 26, 1993 212 7.2.2 Cyber Attacks against the United States Air Force, March–May 1994: Targeting the Pentagon 213 7.2.3 The Citibank Caper, June–October, 1994: How to Catch a Hacker 214 7.2.4 Murrah Federal Building, Oklahoma City—April 19, 1995: Major Terrorism Events and Their U.S. Outcomes 215 7.2.5 President’s Commission on Critical Infrastructure Protection— 1996 216 7.2.6 Presidential Decision Directive 63—1998 218 7.2.7 National Infrastructure Protection Center (NIPC) and ISACs— 1998 219 7.2.8 Eligible Receiver— 1997 219 7.2.9 Solar Sunrise— 1998 220 7.2.10 Joint Task Force—Computer Network Defense (JTF-CND)— 1998 221 7.2.11 Terrorist Attacks against the United States—September 11, 2001 Effects of Catastrophic Events on Transportation System Management and Operations 222 7.2.12 U.S. Government Response to the September 11, 2001 Terrorist Attacks 224 7.2.13 Homeland Security Presidential Directives 226 7.2.14 National Strategies 227 7.3 The Rise of Cyber Crime 230 7.4 Espionage and Nation-State Actions 232 7.5 Policy Response to Growing Espionage Threats: U.S. Cyber Command 233 7.6 Congressional Action 235 7.7 Summary 236 8 Conclusion 239 Glossary 243 References 255 Index 267


Best Sellers


Product Details
  • ISBN-13: 9781118027806
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Height: 241 mm
  • No of Pages: 288
  • Returnable: N
  • Weight: 616 gr
  • ISBN-10: 1118027809
  • Publisher Date: 15 May 2012
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Spine Width: 20 mm
  • Width: 191 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Cyber Security Policy Guidebook
John Wiley & Sons Inc -
Cyber Security Policy Guidebook
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cyber Security Policy Guidebook

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!