Contrast
  • Contrast Style 4
  • Contrast Style 3
  • Contrast Style 2
  • Contrast Style 1
Text size

Cyber Security

A practitioner's guide

David Sutton (author)

UK Price: £24.99 £18.74 EU Price: €31.99 €23.99 ROW (USD) Price: $34.99 $26.24 
ISBN: 9781780173405
Format: Paperback
Dimensions: 170 x 244
Number of pages: 200
Publication date: 09 AUG 2017




Nearly every day we hear news that customer data has been compromised or new bugs have been discovered, leaving personal details open to the risk of falling into the wrong hands. Cyber security is more essential today than ever, not just in the workplace but at home too. This book covers the various types of cyber threat and explains what you can do to mitigate these risks and keep your data secure. Examples of good and bad practices in cyber security are also provided. This book is crucial reading for businesses wanting to better understand security risks and ensure the safety of personal data but will also be valuable to anyone concerned with data protection.
David Sutton's career in IT spans nearly 50 years and includes voice and data networking, information security and critical information infrastructure protection. He delivers an annual lecture on business continuity at Royal Holloway University of London from where he holds an MSc in Information Security. He is also the author of Information Risk Management and a co-author of Information Security Management Principles (2nd edition).
Preface

1. Introduction
 Background
 Cyber security terminology
 Cyber Security in the wider context
 A very brief history of the internet
 Overview of this book

 2. The Big Issues
Cyber crime
Cyber warfare
Cyber surveillance 
Why we should care
What makes cyber security difficult?

 3. Cyber targets
 Individual targets
Business targets
Critical infrastructure targets
Building targets
Academia & research targets
Industry targets

4. Cyber vulnerabilities and impacts
Cyber vulnerabilies
Cyber impacts

5. Cyber threats Motives – what drives an attacker
Means - types of attacker
Cyber-attack tools and skills
Cyber-attack methods
Types of cyber-attack and attack vectors
The risks of conducting a cyber-attack

6. Risk management overview
Assets
Vulnerabilities
Likelihood or probability
The risk management process

7. Business Continuity & Disaster Recovery
Business continuity
Disaster recovery

8. Basic cyber security steps
Physical security
Technical security
User-related activities
Security of stored and shared information
Mobile working

9. Organisational security steps
Security policies and operations

10. Awareness and training
Awareness Training

11. Information sharing
Trust Information classification
Protection of shared information
Anonymisation of shared information
Routes to information sharing

Appendix A Bibliography

Appendix B Reference material
Standards
Good practice guidelines
UK Government cyber security advice
Cyber security law
Links to other useful organisations

Add a review

Post a review

Reviews are subject to approval by the moderator

Your Name *


Your Email Address (Not Published) *


Your Comments *


Rating


Please type the character "j" *


* = required field