Data Breach Preparation and Response: Breaches are Certain, Impact is Not
Autor Kevvie Fowleren Limba Engleză Paperback – 8 iun 2016
- Discusses the cyber criminals behind data breaches and the underground dark web forums they use to trade and sell stolen data
- Features never-before published techniques to qualify and discount a suspected breach or to verify and precisely scope a confirmed breach
- Helps identify your sensitive data, and the commonly overlooked data sets that, if stolen, can result in a material breach
- Defines breach response plan requirements and describes how to develop a plan tailored for effectiveness within your organization
- Explains strategies for proactively self-detecting a breach and simplifying a response
- Covers critical first-responder steps and breach management practices, including containing a breach and getting the scope right, the first time
- Shows how to leverage threat intelligence to improve breach response and management effectiveness
- Offers guidance on how to manage internal and external breach communications, restore trust, and resume business operations after a breach, including the critical steps after the breach to reduce breach-related litigation and regulatory fines
- Illustrates how to define your cyber-defensible position to improve data protection and demonstrate proper due diligence practices
Preț: 284.60 lei
Preț vechi: 355.75 lei
-20% Nou
Puncte Express: 427
Preț estimativ în valută:
54.48€ • 56.85$ • 45.67£
54.48€ • 56.85$ • 45.67£
Carte tipărită la comandă
Livrare economică 06-20 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780128034514
ISBN-10: 0128034513
Pagini: 254
Dimensiuni: 191 x 235 x 26 mm
Greutate: 0.48 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 0128034513
Pagini: 254
Dimensiuni: 191 x 235 x 26 mm
Greutate: 0.48 kg
Editura: ELSEVIER SCIENCE
Cuprins
1. Data breaches defined
2. Impact of a data breach
3. Data breach preparedness
4. Identifying a data breach
5. Managing notification: Who do you tell and when?
6. Investigating a suspected breach
7. Narrowly scoping confirmed breaches
2. Impact of a data breach
3. Data breach preparedness
4. Identifying a data breach
5. Managing notification: Who do you tell and when?
6. Investigating a suspected breach
7. Narrowly scoping confirmed breaches
Recenzii
"The topic is covered beautifully and thoroughly, and approached from many different angles…Rare are the authors that know how to explain complex topics in a simple manner and know how to avoid boring the reader, but these authors belong to that category." --Help Net Security
"This book provides a thorough grounding in all the aspects of preparing for, dealing with and mopping up after a data breach and is likely to present issues you hadn’t considered." --Network Security
"This book provides a thorough grounding in all the aspects of preparing for, dealing with and mopping up after a data breach and is likely to present issues you hadn’t considered." --Network Security