Contrast
  • Contrast Style 4
  • Contrast Style 3
  • Contrast Style 2
  • Contrast Style 1
Text size

Cyber Security

A practitioner's guide

David Sutton (author)

UK Price: £24.99 EU Price: €31.99 ROW (USD) Price: $34.99 
add to basket

Buy this eBook

BCS eBooks are available in a variety of formats, including Kindle, ePub and PDF. You can purchase this title from a number of online retailers (including those listed below).

ISBN: 9781780173405
Format: Paperback
Dimensions: 170 x 244
Number of pages: 193
Publication date: 10 JUL 2017
Publisher: BCS, The Chartered Institute for IT




Nearly every day we hear news that customer data has been compromised or new bugs have been discovered, leaving personal details open to the risk of falling into the wrong hands. Cyber security is more essential today than ever, not just in the workplace but at home too. This book covers the various types of cyber threat and explains what you can do to mitigate these risks and keep your data secure. The book is crucial reading for businesses wanting to better understand security risks and ensure the safety of organisational and customer data but will also be valuable to anyone concerned with data protection.
David Sutton's career in IT spans nearly 50 years and includes voice and data networking, information security and critical information infrastructure protection. He has delivered lectures on information risk management and business continuity at Royal Holloway University of London from where he holds an MSc in Information Security. He is also the author of Information Risk Management and a co-author of Information Security Management Principles (2nd edition).
''The BCS Cyber Security book is well written and easy to read, which is unusual in a book addressing this subject matter. The author takes the time to describe his interpretation of “Cyber” as this term is often misused both within and outside the industry. The book makes many references to real world examples and their consequences. This helps to illuminate the threats and vulnerabilities and helps us understand the possible actions that should be taken. The book is well structured with two major sections; Cyber Security Problems - encompassing Cyber Security Issues, Targets, Vulnerabilities, Threats and Impacts and Improving Cyber Security - encompassing Risk Management, Business Continuity, Disaster Recovery and risk mitigations. The final part of the book is a comprehensive analysis of applicable standards, good practice guidelines and the law. This practitioners guide is a must have for those with an interest in information security, either as a potential career or to expand their general business knowledge. Highly recommended!''
Terry Neal, InfoSec Skills Limited, CEO, FBCS, CITP

''David takes the reader on an engaging and informative journey covering the major topics that make up cyber security. Highly recommended for anyone interested in learning at a high level what cyber security is, what it means and why it is important.''
Adrian Davis, (ISC)² Inc., Managing Director EMEA

''The book is well informed, elegantly composed and an intriguing read.... Simply exemplary!''
Emmanuel Ojo Ademola FBCS, Subject matter expert
Preface
Who should read this book?
What exactly do we mean by cyber?
Terminology and definitions
Overview of this book

1. Introduction
 Background
The expectations of users and organisations
 Cyber Security in the wider context

 2. The Big Issues
Cyber crime
Cyber harassment or cyber bullying
Cyber warfare
Cyber surveillance 
Why we should care
What makes cyber security difficult?

 3. Cyber targets
 Individual targets
Business targets
Critical infrastructure targets
Building targets
Academia & research targets
Manufacturing and industry targets

4. Cyber vulnerabilities and impacts
Cyber vulnerabilities
Cyber impacts

5. Cyber threats
Types of attacker
Motives - what drives an attacker?
Means
Cyber-attack methods
Types of cyber-attack and attack vectors
The risks of conducting a cyber-attack

6. Risk management overview
A general view of risk
Assets
Vulnerabilities
Likelihood or probability
Qualitative and quantitative assessments
The risk management process

7. Business Continuity & Disaster Recovery
Business continuity
Disaster recovery

8. Basic cyber security steps
General security advice
Technical security advice
Mobile working

9. Organisational security steps
Security policies overview
Directive policies
Administrative policies
Communal policies
Technical policies

10. Awareness and training
Awareness
Training

11. Information sharing
Trust
Information classification
Protection of shared information
Anonymisation of shared information
Routes to information sharing

Bibliography

Appendix A - Standards
Cyber security standards
ISO/IEC 27000 series standards
Other relevant ISO standards
Business continuity standards
National Institute of Standards and Technology (NIST) standards

Appendix B - Good Practice Guidelines
General cyber security advice
UK Government cyber security advice

Appendix C - Cyber Security Law
UK law
EU directives and regulations
Other relevant legislation

Appendix D - Cyber Security Training

Appendix E - Links to Other Useful Organisations

Add a review

Post a review

Reviews are subject to approval by the moderator

Your Name *


Your Email Address (Not Published) *


Your Comments *


Rating


Please type the character "h" *


* = required field