Fr. 67.00

Information Systems Security Officer''s Guide - Establishing and Managing a Cyber Security Program

English · Paperback / Softback

Shipping usually within 1 to 3 weeks (not available at short notice)

Description

Read more

The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face. This entirely updated edition presents practical advice on establishing, managing, and evaluating a successful information protection program in a corporation or government agency, covering everything from effective communication to career guidance for the information security officer.
The book outlines how to implement a new plan or evaluate an existing one, and is especially targeted to those who are new to the topic. It is the definitive resource for learning the key characteristics of an effective information systems security officer (ISSO), and paints a comprehensive portrait of an ISSO's duties, their challenges, and working environments, from handling new technologies and threats, to performing information security duties in a national security environment.

List of contents

SECTION I: THE WORKING ENVIRONMENT OF THE CYBER SECURITY OFFICER1. Understanding the Past and Present Cyber-Information World Environment 2. Understanding the Past and Present Global Business and Management Environment3. An Overview of Related World Views of Cyber Security4. A Glimpse at the History of Technology5. Understanding Today's Threats in the Cyber Vapor - "War Stories" from the Front Lines
SECTION II: THE DUTIES AND RESPONSIBILITIES OF A CYBER SECURITY OFFICER6. The Cyber Security Officer's Position, Duties and Responsibilities 7. The Cyber Security Strategic, Tactical, and Annual Plans 8. Establishing a Cyber Security Program and Cyber Security Organization 9. Determining and Establishing Cyber Security Functions 10. Establishing a Metrics Management System 11. Annual Re-Evaluation and Future Plan12. High Technology Fraud and Other Crimes' Investigative Support
SECTION III: GLOBAL, PROFESSIONAL, AND PERSONAL CHALLENGES OF A CYBER SECURITY OFFICER13. Introduction to Global Information Warfare14. The Cyber Security Officer, and Privacy, Ethical, Liability Issues 15. Cyber Security Officer Career Development: Marketing Yourself, Lecturing, and Consulting 16. 21st Century Challenges for the Cyber Security Officer

About the author

Dr. Gerald L. Kovacich has more than 40 years of experience in industrial, business and government security, investigations, information systems security, and information warfare, both in the U.S. Government as a special agent, in international corporations, and subsequently as an international consultant and lecturer. He retired as the Information Warfare Technologist, Northrop Grumman Corporation to pursue a career as an international consultant, lecturer and writer.

Report

"...this book is not just for aspiring cyber security officers - it's also a great read for other professionals in management positions as they should know what cyber security officers do and struggle with." --Help Net Security

Product details

Authors Gerald Kovacich, Gerald L. Kovacich
Publisher ELSEVIER SCIENCE BV
 
Languages English
Product format Paperback / Softback
Released 25.01.2016
 
EAN 9780128021903
ISBN 978-0-12-802190-3
No. of pages 360
Subjects Natural sciences, medicine, IT, technology > IT, data processing > Data communication, networks
Social sciences, law, business > Business > Advertising, marketing

COMPUTERS / Security / General, Network Security, Computer security, COMPUTERS / Security / Network Security

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.