Normal view MARC view ISBD view

Cyber Security. Simply. Make it Happen. : Leveraging Digitization Through IT Security.

By: Abolhassan, Ferri.
Material type: TextTextSeries: eBooks on Demand.Management for Professionals: Publisher: Cham : Springer International Publishing, 2017Copyright date: ©2017Description: 1 online resource (136 pages).Content type: text Media type: computer Carrier type: online resourceISBN: 9783319465296.Subject(s): Computer simulationGenre/Form: Electronic books.Additional physical formats: Print version:: Cyber Security. Simply. Make it Happen. : Leveraging Digitization Through IT SecurityDDC classification: 650 Online resources: Click here to view this ebook.
Contents:
"Foreword" -- "Trust Is the Basis of Digitization" -- "Digitization Offers Great Opportunities" -- "Data Protection and Digital Business Models Are Not in Opposition" -- "Security Has to Be Simple" -- "Contents" -- "1: Security: The Real Challenge for Digitalization" -- "1.1 Introduction" -- "1.2 Status Quo: The Cloud Is the Backbone of Digitalization" -- "1.3 Data Security: Only a Secure Cloud Will Lead to Secure Digitalization" -- "1.3.1 Risk Transformation: It Has to Be Easy to Get into the Cloud" -- "1.3.2 Risk of an Incident: Making Sure the Cloud Doesn´t Crash" -- "1.3.3 Risk of Technical/Physical Attack: A Castle Wall Alone Isn´t Enough" -- "1.3.4 Risk of a Cyberattack: Ensuring Data and Devices Aren´t Casualties" -- "1.4 Looking to the Future" -- "1.5 Conclusion" -- "References" -- "2: Security Policy: Rules for Cyberspace" -- "2.1 Taking Stock: Digital Warfare in the 21st Century" -- "2.2 Challenges for the Political Sphere: Rules, Resources and Expertise" -- "2.3 Outlook: A Strategy for the Digital Age" -- "References" -- "3: Data Protection Empowerment" -- "3.1 Code Is Law" -- "3.2 Empowerment" -- "3.3 Information Technology and Social Values" -- "References" -- "4: Red Teaming and Wargaming: How Can Management and Supervisory Board Members Become More Involved in Cybersecurity?" -- "4.1 Cybersecurity: A Management Board Issue" -- "4.2 Integrating the Management Board into Existing Cybersecurity Strategies" -- "4.3 Red Teaming and Wargaming" -- "4.3.1 Red Teaming Defined" -- "4.3.2 Wargaming Defined" -- "4.3.3 Differences Compared with Methods Currently in Use" -- "4.4 Use of Red Teaming in Combination with Wargaming at Companies" -- "4.4.1 Classification" -- "4.4.2 Definition of a Target" -- "4.4.3 Composition of the Teams" -- "4.4.4 Analysis: Data Collection and Evaluation" -- "4.4.5 Wargaming" -- "4.4.6 Report".
"4.5 Conclusion" -- "References" -- "5: The Law and Its Contribution to IT Security: Legal Framework, Requirements, Limits" -- "5.1 Key Features of the Existing Legal Framework" -- "5.1.1 IT Compliance: A Challenge for Management Boards and Executives" -- "5.1.1.1 The Cornerstone of IT Compliance: IT Security" -- "5.1.1.2 Liability of the Management Board and Executives" -- "5.1.2 Who Is Responsible?" -- "5.1.2.1 Requirements for Software Manufacturers" -- "5.1.2.2 Requirements for Network and Platform Operators" -- "5.1.2.3 Legal Framework for Providers of IT Services" -- "5.1.3 Regulation on Determining Critical Infrastructure" -- "5.1.4 Controversial: Changes Affecting Telemedia Services" -- "5.2 International Issues: The European Union´s Directive on Security of Network and Information Systems (NIS Directive)" -- "5.3 Data Protection and Data Security in the United States" -- "5.4 Data Exchange Between EU and US Companies" -- "5.4.1 Safe Harbor" -- "5.4.2 Privacy Shield" -- "5.5 Conclusion: Many Legal Issues to Consider" -- "References" -- "6: IT Security: Stronger Together" -- "6.1 The Trinity of IT Security" -- "6.2 CSSA - Security Through Collaboration" -- "6.2.1 Targeted Interaction" -- "6.2.2 Network of Trust" -- "6.3 The Six Elements of an Integrated Defense Strategy" -- "6.3.1 Prevention Is Better Than the Cure" -- "6.3.2 Knowledge Is Power" -- "6.3.3 IT Security Is Not an End in Itself" -- "6.3.4 It´s Only a Matter of Time: Incident Management" -- "6.3.5 Fitness Training: Prepare for Emergencies" -- "6.3.6 Stronger Together" -- "6.4 Conclusion" -- "References" -- "7: The German Security Market: Searching for the Complete Peace-of-Mind Service" -- "7.1 Challenges for IT Security Managers" -- "7.2 Choosing the Right Protection in a Fragmented Market" -- "7.2.1 Data Leakage/Loss Prevention (DLP)".
"7.2.2 Security Information and Event Management (SIEM)" -- "7.2.3 Email/Web/Collaboration Security" -- "7.2.4 Endpoint Security" -- "7.2.5 Identity and Access Management (IAM)" -- "7.2.6 Mobile Security - Are Employees Really the Biggest Risk?" -- "7.2.7 Network Security" -- "7.2.8 Conclusion" -- "7.3 Security from a Single Source: Managed Security Services" -- "7.3.1 Managed Service or Cloud Solution?" -- "7.3.2 Selection Criteria" -- "7.3.3 Assessment of Deutsche Telekom/T-Systems as a Managed Security Services Provider" -- "7.3.4 Specialized Managed Security Services" -- "8: CSP, not 007: Integrated Cybersecurity Skills Training" -- "8.1 The New Profession of Cybersecurity Specialist: From IT Worker to IT Security Expert" -- "8.2 Hands-on Experience in All-Round Security" -- "8.3 Cybersecurity Expertise for Managers, too" -- "8.4 Conclusion" -- "Reference" -- "9: Human Factors in IT Security" -- "9.1 IT Security Is Just Not Very People-Centric" -- "9.1.1 The Thing with Passwords" -- "9.1.2 The ``Security versus Productivity´´ Dilemma" -- "9.2 Social Engineering" -- "9.3 Human ``Weaknesses´´ Are Often Social Norms or Simple Instincts" -- "9.3.1 Would You Mind Installing This Malware on Your Computer?" -- "9.3.2 Excuse Me, What Exactly Is Your Password?" -- "9.4 Would You Please Transfer Me a Few Million?" -- "9.5 Defensive Measures" -- "9.5.1 Recognizing Social Engineering" -- "9.5.2 The Learning Objective: Reporting Suspicious Activity" -- "9.5.3 Practice Makes Perfect" -- "9.6 Conclusion: IT Must Work for and Not against Users" -- "Reference" -- "10: Secure and Simple: Plug-and-Play Security" -- "10.1 Data Security in the Danger Zone" -- "10.2 Digitalization Needs New Security Concepts" -- "10.3 Digital Identity Is the New Currency" -- "10.4 Does Absolute Protection Exist?" -- "10.5 This Is What Attack Scenarios Look Like Today".
"10.6 In Need of Improvement: Security at SMEs" -- "10.7 Expensive Does Not Necessarily Mean Secure: Gaps in Security at Large Companies" -- "10.8 The ``Made in Germany´´ Stamp of Quality" -- "10.9 Companies Want the Cloud - But Securely" -- "References" -- "11: Cybersecurity - What's Next?" -- "11.1 The Motives of Attackers Are Becoming More Malicious with Each Passing Generation" -- "11.2 Cybersecurity - The Sleeping Giant in the Company" -- "11.3 What Will Protect Us?" -- "11.4 Conclusion" -- "References" -- "12: Conclusion" -- "12.1 The Internet Has Become Ubiquitous" -- "12.2 Good Internet, Bad Internet" -- "12.3 Cyberhare vs. Cybertortoise" -- "12.4 Simple and Secure Is the Motto" -- "References" -- "Appendix" -- "Eleven Rules for a Secure Internet of Things (IoT)" -- "The Magenta Security Portfolio" -- "Technical Literature" -- "Practical Report from the Graduates" -- "Practical Projects as the Focus of Instruction" -- "Virtual Detective Work as Final Module Assignment" -- "Cyber Security Professional Training for Jobs of the Future".
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
HF4999.2-6182 (Browse shelf) http://ebookcentral.proquest.com/lib/uttyler/detail.action?docID=4850782 Available EBC4850782

"Foreword" -- "Trust Is the Basis of Digitization" -- "Digitization Offers Great Opportunities" -- "Data Protection and Digital Business Models Are Not in Opposition" -- "Security Has to Be Simple" -- "Contents" -- "1: Security: The Real Challenge for Digitalization" -- "1.1 Introduction" -- "1.2 Status Quo: The Cloud Is the Backbone of Digitalization" -- "1.3 Data Security: Only a Secure Cloud Will Lead to Secure Digitalization" -- "1.3.1 Risk Transformation: It Has to Be Easy to Get into the Cloud" -- "1.3.2 Risk of an Incident: Making Sure the Cloud Doesn´t Crash" -- "1.3.3 Risk of Technical/Physical Attack: A Castle Wall Alone Isn´t Enough" -- "1.3.4 Risk of a Cyberattack: Ensuring Data and Devices Aren´t Casualties" -- "1.4 Looking to the Future" -- "1.5 Conclusion" -- "References" -- "2: Security Policy: Rules for Cyberspace" -- "2.1 Taking Stock: Digital Warfare in the 21st Century" -- "2.2 Challenges for the Political Sphere: Rules, Resources and Expertise" -- "2.3 Outlook: A Strategy for the Digital Age" -- "References" -- "3: Data Protection Empowerment" -- "3.1 Code Is Law" -- "3.2 Empowerment" -- "3.3 Information Technology and Social Values" -- "References" -- "4: Red Teaming and Wargaming: How Can Management and Supervisory Board Members Become More Involved in Cybersecurity?" -- "4.1 Cybersecurity: A Management Board Issue" -- "4.2 Integrating the Management Board into Existing Cybersecurity Strategies" -- "4.3 Red Teaming and Wargaming" -- "4.3.1 Red Teaming Defined" -- "4.3.2 Wargaming Defined" -- "4.3.3 Differences Compared with Methods Currently in Use" -- "4.4 Use of Red Teaming in Combination with Wargaming at Companies" -- "4.4.1 Classification" -- "4.4.2 Definition of a Target" -- "4.4.3 Composition of the Teams" -- "4.4.4 Analysis: Data Collection and Evaluation" -- "4.4.5 Wargaming" -- "4.4.6 Report".

"4.5 Conclusion" -- "References" -- "5: The Law and Its Contribution to IT Security: Legal Framework, Requirements, Limits" -- "5.1 Key Features of the Existing Legal Framework" -- "5.1.1 IT Compliance: A Challenge for Management Boards and Executives" -- "5.1.1.1 The Cornerstone of IT Compliance: IT Security" -- "5.1.1.2 Liability of the Management Board and Executives" -- "5.1.2 Who Is Responsible?" -- "5.1.2.1 Requirements for Software Manufacturers" -- "5.1.2.2 Requirements for Network and Platform Operators" -- "5.1.2.3 Legal Framework for Providers of IT Services" -- "5.1.3 Regulation on Determining Critical Infrastructure" -- "5.1.4 Controversial: Changes Affecting Telemedia Services" -- "5.2 International Issues: The European Union´s Directive on Security of Network and Information Systems (NIS Directive)" -- "5.3 Data Protection and Data Security in the United States" -- "5.4 Data Exchange Between EU and US Companies" -- "5.4.1 Safe Harbor" -- "5.4.2 Privacy Shield" -- "5.5 Conclusion: Many Legal Issues to Consider" -- "References" -- "6: IT Security: Stronger Together" -- "6.1 The Trinity of IT Security" -- "6.2 CSSA - Security Through Collaboration" -- "6.2.1 Targeted Interaction" -- "6.2.2 Network of Trust" -- "6.3 The Six Elements of an Integrated Defense Strategy" -- "6.3.1 Prevention Is Better Than the Cure" -- "6.3.2 Knowledge Is Power" -- "6.3.3 IT Security Is Not an End in Itself" -- "6.3.4 It´s Only a Matter of Time: Incident Management" -- "6.3.5 Fitness Training: Prepare for Emergencies" -- "6.3.6 Stronger Together" -- "6.4 Conclusion" -- "References" -- "7: The German Security Market: Searching for the Complete Peace-of-Mind Service" -- "7.1 Challenges for IT Security Managers" -- "7.2 Choosing the Right Protection in a Fragmented Market" -- "7.2.1 Data Leakage/Loss Prevention (DLP)".

"7.2.2 Security Information and Event Management (SIEM)" -- "7.2.3 Email/Web/Collaboration Security" -- "7.2.4 Endpoint Security" -- "7.2.5 Identity and Access Management (IAM)" -- "7.2.6 Mobile Security - Are Employees Really the Biggest Risk?" -- "7.2.7 Network Security" -- "7.2.8 Conclusion" -- "7.3 Security from a Single Source: Managed Security Services" -- "7.3.1 Managed Service or Cloud Solution?" -- "7.3.2 Selection Criteria" -- "7.3.3 Assessment of Deutsche Telekom/T-Systems as a Managed Security Services Provider" -- "7.3.4 Specialized Managed Security Services" -- "8: CSP, not 007: Integrated Cybersecurity Skills Training" -- "8.1 The New Profession of Cybersecurity Specialist: From IT Worker to IT Security Expert" -- "8.2 Hands-on Experience in All-Round Security" -- "8.3 Cybersecurity Expertise for Managers, too" -- "8.4 Conclusion" -- "Reference" -- "9: Human Factors in IT Security" -- "9.1 IT Security Is Just Not Very People-Centric" -- "9.1.1 The Thing with Passwords" -- "9.1.2 The ``Security versus Productivity´´ Dilemma" -- "9.2 Social Engineering" -- "9.3 Human ``Weaknesses´´ Are Often Social Norms or Simple Instincts" -- "9.3.1 Would You Mind Installing This Malware on Your Computer?" -- "9.3.2 Excuse Me, What Exactly Is Your Password?" -- "9.4 Would You Please Transfer Me a Few Million?" -- "9.5 Defensive Measures" -- "9.5.1 Recognizing Social Engineering" -- "9.5.2 The Learning Objective: Reporting Suspicious Activity" -- "9.5.3 Practice Makes Perfect" -- "9.6 Conclusion: IT Must Work for and Not against Users" -- "Reference" -- "10: Secure and Simple: Plug-and-Play Security" -- "10.1 Data Security in the Danger Zone" -- "10.2 Digitalization Needs New Security Concepts" -- "10.3 Digital Identity Is the New Currency" -- "10.4 Does Absolute Protection Exist?" -- "10.5 This Is What Attack Scenarios Look Like Today".

"10.6 In Need of Improvement: Security at SMEs" -- "10.7 Expensive Does Not Necessarily Mean Secure: Gaps in Security at Large Companies" -- "10.8 The ``Made in Germany´´ Stamp of Quality" -- "10.9 Companies Want the Cloud - But Securely" -- "References" -- "11: Cybersecurity - What's Next?" -- "11.1 The Motives of Attackers Are Becoming More Malicious with Each Passing Generation" -- "11.2 Cybersecurity - The Sleeping Giant in the Company" -- "11.3 What Will Protect Us?" -- "11.4 Conclusion" -- "References" -- "12: Conclusion" -- "12.1 The Internet Has Become Ubiquitous" -- "12.2 Good Internet, Bad Internet" -- "12.3 Cyberhare vs. Cybertortoise" -- "12.4 Simple and Secure Is the Motto" -- "References" -- "Appendix" -- "Eleven Rules for a Secure Internet of Things (IoT)" -- "The Magenta Security Portfolio" -- "Technical Literature" -- "Practical Report from the Graduates" -- "Practical Projects as the Focus of Instruction" -- "Virtual Detective Work as Final Module Assignment" -- "Cyber Security Professional Training for Jobs of the Future".

Description based on publisher supplied metadata and other sources.

There are no comments for this item.

Log in to your account to post a comment.