Implementing Cybersecurity, The Cybersecurity Body of Knowledge, How to Build a Cyber-Resilient Organization, and Supply Chain Risk Management Set: Security, Audit and Leadership Series
Autor Anne Kohnke, Ken Sigler, Dan Shoemakeren Limba Engleză Paperback – 14 oct 2024
The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area that collectively capture the cybersecurity body of knowledge to provide a complete picture of the field.
How to Build a Cyber-Resilient Organization presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient architecture for a given organization as well as how to maintain a state of cyber-resilience in its day-to-day operation. Readers will know how to establish a state of systematic cyber-resilience within this structure and how to evolve the protection to correctly address the threat environment. This revolves around the steps to perform strategic cyber-resilience planning, implementation and evolution. Readers will know how to perform the necessary activities to identify, prioritize and deploy targeted controls and maintain a persistent and reliable reporting system.
Supply Chain Risk Management presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply chain and how to build auditable trust into the products and services acquired by the organization. It details a capability maturity development process that will install an increasingly competent process and an attendant set of activities and tasks within the technology acquisition process. It defines a complete and correct set of processes, activities, tasks and monitoring and reporting systems.
Din seria Security, Audit and Leadership Series
- 20% Preț: 246.63 lei
- Preț: 347.16 lei
- 20% Preț: 323.24 lei
- 20% Preț: 430.33 lei
- 20% Preț: 316.05 lei
- 20% Preț: 347.59 lei
- 20% Preț: 544.97 lei
- 20% Preț: 167.22 lei
- 20% Preț: 317.29 lei
- 20% Preț: 298.56 lei
- Preț: 348.10 lei
- 20% Preț: 260.17 lei
- 20% Preț: 302.79 lei
- 20% Preț: 415.62 lei
- 20% Preț: 266.51 lei
- 8% Preț: 474.66 lei
- 20% Preț: 396.30 lei
- 20% Preț: 289.74 lei
- 20% Preț: 297.34 lei
- 20% Preț: 319.45 lei
- 20% Preț: 176.97 lei
- 20% Preț: 316.83 lei
- 20% Preț: 316.59 lei
- Preț: 274.03 lei
- 20% Preț: 233.85 lei
- 20% Preț: 875.81 lei
- 30% Preț: 261.35 lei
- 31% Preț: 340.53 lei
- 20% Preț: 264.17 lei
- 20% Preț: 936.95 lei
- 20% Preț: 482.57 lei
- 20% Preț: 413.14 lei
- 20% Preț: 234.33 lei
- 20% Preț: 516.60 lei
- 20% Preț: 513.00 lei
- 31% Preț: 731.18 lei
- 20% Preț: 1281.72 lei
- 20% Preț: 232.82 lei
- 20% Preț: 479.27 lei
- 20% Preț: 262.58 lei
- 20% Preț: 293.27 lei
- 20% Preț: 759.26 lei
- 34% Preț: 216.03 lei
- 20% Preț: 457.75 lei
Preț: 716.23 lei
Preț vechi: 1007.08 lei
-29% Nou
Puncte Express: 1074
Preț estimativ în valută:
137.08€ • 142.56$ • 114.71£
137.08€ • 142.56$ • 114.71£
Carte tipărită la comandă
Livrare economică 14-28 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781032946627
ISBN-10: 1032946628
Pagini: 1572
Ilustrații: 191
Dimensiuni: 156 x 234 mm
Greutate: 2.91 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
Seria Security, Audit and Leadership Series
Locul publicării:Boca Raton, United States
ISBN-10: 1032946628
Pagini: 1572
Ilustrații: 191
Dimensiuni: 156 x 234 mm
Greutate: 2.91 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
Seria Security, Audit and Leadership Series
Locul publicării:Boca Raton, United States
Public țintă
Professional Practice & DevelopmentCuprins
Implementing Cybersecurity
Introduction to Organizational Security Risk Management. Survey of Existing Risk Management Models. Step 1 – Categorize Information and Information Systems. Step 2 – Select Security Controls. Step 3 – Implement Security Controls. Step 4 – Assess Security Controls. Step 5 – Authorize Information Systems. Step 6 – Monitor Security State. Practical Application to the Implementation of the NIST Risk Management Framework.
The Cybersecurity Body of Knowledge
Foreword 1. Foreword 2. Author Biographies. Introduction. Chapter 1 Securing Cyberspace Is Everybody’s Business. Chapter 2 The Cybersecurity Body of Knowledge. Chapter 3 Data Security. Chapter 4 Software Security. Chapter 5 Component Security. Chapter 6 Connection Security. Chapter 7 System Security. Chapter 8 Human Security. Chapter 9 Organizational Security. Chapter 10 Societal Security. Index.
How to Build a Cyber-Resilient Organization
1. It’s Time for a New Paradigm 2. Asset Identification and Classification 3. Establishing the Risk Status of the Corporate Infrastructure 4. Prioritization of Assets and Establishing a Plan for Resilient Change 5. Control Design and Deployment 6. Control Assessment and Assurance 7. Recovering the Non-Priority Assets 8. Ensuring a Continuously Cyber-Resilient Organization
Supply Chain Risk Management
What Product Risk Is and Why It Needs to be Managed. The Three Constituencies of Product Trust. Building a Standard Acquisition Infrastructure. Risk Management in the ICT Product Chain. Control Formulation and Implementation. Control Sustainment and Operational Assurance. A Capability Maturity Model for Secure Product Acquisition.
Introduction to Organizational Security Risk Management. Survey of Existing Risk Management Models. Step 1 – Categorize Information and Information Systems. Step 2 – Select Security Controls. Step 3 – Implement Security Controls. Step 4 – Assess Security Controls. Step 5 – Authorize Information Systems. Step 6 – Monitor Security State. Practical Application to the Implementation of the NIST Risk Management Framework.
The Cybersecurity Body of Knowledge
Foreword 1. Foreword 2. Author Biographies. Introduction. Chapter 1 Securing Cyberspace Is Everybody’s Business. Chapter 2 The Cybersecurity Body of Knowledge. Chapter 3 Data Security. Chapter 4 Software Security. Chapter 5 Component Security. Chapter 6 Connection Security. Chapter 7 System Security. Chapter 8 Human Security. Chapter 9 Organizational Security. Chapter 10 Societal Security. Index.
How to Build a Cyber-Resilient Organization
1. It’s Time for a New Paradigm 2. Asset Identification and Classification 3. Establishing the Risk Status of the Corporate Infrastructure 4. Prioritization of Assets and Establishing a Plan for Resilient Change 5. Control Design and Deployment 6. Control Assessment and Assurance 7. Recovering the Non-Priority Assets 8. Ensuring a Continuously Cyber-Resilient Organization
Supply Chain Risk Management
What Product Risk Is and Why It Needs to be Managed. The Three Constituencies of Product Trust. Building a Standard Acquisition Infrastructure. Risk Management in the ICT Product Chain. Control Formulation and Implementation. Control Sustainment and Operational Assurance. A Capability Maturity Model for Secure Product Acquisition.
Notă biografică
Dan Shoemaker, PhD, is full professor, senior research scientist, and program director at the University of Detroit Mercy’s Center for Cyber Security and Intelligence Studies. Dan is a former chair of the Cybersecurity & Information Systems Department and has authored numerous books and journal articles focused on cybersecurity.
Anne Kohnke, PhD, is an associate professor of cybersecurity and the principle investigator of the Center for Academic Excellence in Cyber Defence at the University of Detroit Mercy. Anne’s research is focused in cybersecurity, risk management, threat modeling, and mitigating attack vectors.
Ken Sigler, MS, is a faculty member of the Computer Information Systems (CIS) program at the Auburn Hills campus of Oakland Community College in Michigan. Ken’s research is in the areas of software management, software assurance, and cybersecurity.
Anne Kohnke, PhD, is an associate professor of cybersecurity and the principle investigator of the Center for Academic Excellence in Cyber Defence at the University of Detroit Mercy. Anne’s research is focused in cybersecurity, risk management, threat modeling, and mitigating attack vectors.
Ken Sigler, MS, is a faculty member of the Computer Information Systems (CIS) program at the Auburn Hills campus of Oakland Community College in Michigan. Ken’s research is in the areas of software management, software assurance, and cybersecurity.
Descriere
The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk managemen