The information systems security officer's guide : establishing and managing a cyber security program /

The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face. This entirely updated edition presents practical advice on estab...

Full description

Saved in:
Bibliographic Details
Main Authors: Kovacich, Gerald L.
Corporate Authors: Elsevier Science & Technology.
Published: Butterworth-Heinemann,
Publisher Address: Waltham, MA :
Publication Dates: 2016.
Literature type: eBook
Language: English
Edition: Third edition.
Subjects:
Online Access: http://www.sciencedirect.com/science/book/9780128021903
Summary: The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face. This entirely updated edition presents practical advice on establishing, managing, and evaluating a successful information protection program in a corporation or government agency, covering everything from effective communication to career guidance for the information security officer. The book outlines how to implement a new plan or evaluate an existing one, and is especially targeted to those who are new to the topic. It is the definitive resource for learning the key characteristics of an effective information systems security officer (ISSO), and paints a comprehensive portrait of an ISSO's duties, their challenges, and working environments, from handling new technologies and threats, to performing information security duties in a national security environment.
Item Description: Includes index.
Carrier Form: 1 online resource (360 pages)
Bibliography: Includes bibliographical references and index.
ISBN: 9780128023792
0128023791
Index Number: QA76
CLC: TP309-532
Contents: Front Cover; The Information Systems Security Officer's Guide; Copyright; Dedication; Contents; ABOUT THE AUTHOR; OTHER BOOKS AUTHORED OR COAUTHORED BY DR. GERALD L. KOVACICH; Preface; Acknowledgments; INTRODUCTION; WHAT OTHER CYBER SECURITY PROFESSIONALS HAVE TO SAY; William C. Boni; Ed Halibozek; Dr. Andy Jones; Steve Lutz; I -- The Working Environment of the Cyber Security Officer; 1 -- Understanding the Past and Present Cyber-Information World Environment; AH, THE GOOD OL' DAYS!; Understanding Your Information-Driven Environment; GLOBAL INFORMATION INFRASTRUCTURE.
NATIONAL INFORMATION INFRASTRUCTURE"Future Shock"; Road Map for the Internet; The Internet: No Traffic Controls; What Has Been the Impact of the Internet?; Organizational Impacts; Using the Internet to Share Information; CHANGING CRIMINAL JUSTICE SYSTEMS; THE HUMAN FACTOR; Laws, Regulations, Standards, and Legal Issues; SUMMARY; 2 -- Understanding the Past and Present Global Business and Management Environment; THE CHANGING BUSINESS AND GOVERNMENT ENVIRONMENTS; UNDERSTANDING THE BUSINESS ENVIRONMENT; MANAGEMENT RESPONSIBILITIES AND COMMUNICATING WITH MANAGEMENT.
CREATING A COMPETITIVE ADVANTAGE THROUGH A CYBER SECURITY PROGRAMThe Cyber Security Officer as a Business Manager; SERVICE, SUPPORT, AND A BUSINESS ORIENTATION; BUSINESS MANAGERS AND CYBER SECURITY; WHAT COMPANY MANAGERS SHOULD ASK OF THEIR CYBER SECURITY PROFESSIONALS; WHAT CYBER SECURITY PROFESSIONALS SHOULD DO; QUESTIONS TO CONSIDER; SUMMARY; 3 -- An Overview of Related World Views of Cyber Security; EVOLUTION OF LAWS, STANDARDS, POLICIES, AND PROCEDURES; GLOBAL VIA THE UN; THE EU; International Security in Cyberspace; Internet Governance Developments in 2015.
U.S.-EU Cyber Security-Related CooperationASIA; SOUTH AMERICA; AFRICA; UNITED STATES; CNCI Initiative Details; SUMMARY; 4 -- A Glimpse at the History of Technology; WHAT IS TECHNOLOGY?; FROM CAVE MAN TO CYBER SECURITY PROFESSIONAL AND INFORMATION WARRIOR; REVOLUTIONS AND EVOLUTIONS IN HIGH TECHNOLOGY; FROM THE TWENTIETH CENTURY TO TODAY: TECHNOLOGY AND THE ADVENT/ F HIGH TECHNOLOGY; Other Significant Twentieth-Century Technological Developments and Events; High-Tech: A Product, a Process, or Both?; The Trade Association: AEA; The Consulting Group: RFA; Information Provider: One Source.
The Research Group: BLSThe Microprocessor; Moore's Law; Other Significant Twentieth Century High-Technology/ evelopments and Events; THE INTERNET; THE HIGH-TECHNOLOGY-DRIVEN PHENOMENON; FASTER AND MORE MASSIVE HIGH-TECHNOLOGY-DRIVEN COMMUNICATIONS; THE BENEFICIAL EFFECT OF HACKER TOOLS AND OTHER MALICIOUS SOFTWARE ON/ ETWORK SECURITY WITH DUAL ROLES AS CYBER SECURITY TOOLS; OTHER HIGH-TECHNOLOGY TOOLS IN CYBER SECURITY; WELCOME TO THE TWENTY-FIRST-CENTURY TECHNOLOGY; SUMMARY; 5 -- Understanding Today's Threats in the Cyber Vapor-"War Stories" from the Front Lines1.