Buch, Englisch, 448 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 1003 g
Prioritize Threats, Identify Vulnerabilities and Apply Controls
Buch, Englisch, 448 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 1003 g
ISBN: 978-1-3986-1349-2
Verlag: Kogan Page
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Angewandte Informatik Wirtschaftsinformatik
- Wirtschaftswissenschaften Betriebswirtschaft Management Risikomanagement
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
- Wirtschaftswissenschaften Betriebswirtschaft Wirtschaftsinformatik, SAP, IT-Management
Weitere Infos & Material
- Section - PART ONE: Contextualizing cybersecurity risk;
- Chapter - 01: Why now? The only constant is change;
- Chapter - 02: Technologies and security challenges;
- Chapter - 03: Data breaches;
- Section - PART TWO: Cybersecurity programme management;
- Chapter - 04: What are cybersecurity and cybercrime?;
- Chapter - 05: Establishing a cybersecurity programme;
- Section - PART THREE: Actors, events and vulnerabilities;
- Chapter - 06: Threat actors;
- Chapter - 07: Threat events;
- Chapter - 08: Vulnerabilities;
- Chapter - 09: Controls;
- Section - PART FOUR: Conclusion: the cybersecurity risk equation explained;
- Chapter - 10: Cyber risk management: a conclusion;




