Cyberwar, Cyberterror, Cybercrime and Cyberactivism: An In-depth Guide to the Role of Security Standards in the Cybersecurity Environment. 2nd Edition

  • 3h 42m
  • Julie E. Mehan
  • IT Governance
  • 2014

Develop better cybersecurity by taking a wider view of the threats

Many books on cybersecurity focus on technical responses to the cybercriminal, the cyberactivist and the state-sponsored hacker. As important as this is, relatively inexperienced hackers can still break into systems that have not taken account of human fallibility and other known vulnerabilities.

Cyber security is much more than technology

CyberWar, CyberTerror, CyberCrime and CyberActivism encourages cybersecurity professionals to take a wider view of what cybersecurity means, and to make the most of international standards and best practice to create a culture of cybersecurity awareness that complements technology-based defenses.

This second edition analyses the changing threats in the cyber landscape, and includes an updated body of knowledge that describes how to acquire, develop, and sustain a secure information environment that goes beyond technology and create a cyber-aware organisational culture that is more robust and better able to deal with a wider range of threats.

About the Author

Dr Julie Mehan is the Founder and President of JEMStone Strategies and a Principal in a strategic consulting firm in the State of Virginia. She has delivered cybersecurity and related privacy services to senior commercial, department of defence and federal government clients working in Italy, Australia, Canada, Belgium, and the United States. Dr Mehan is also an Associate Professor at the University of Maryland University College, specializing in courses in Cybersecurity, Cyberterror, IT in Organizations and Ethics in an Internet Society.

In this Book

  • Cyberwar, Cyberterror, Cybercrime and Cyberactivism—An In-depth Guide to the Role of Security Standards in the Cybersecurity Environment. 2nd Edition
  • Preface
  • Introduction
  • Technology is a Double-Edged Sword
  • Cyber Attack—It’s a Dangerous World for Information Systems
  • The Human Factor—The Underrated Threat
  • Transition from an Environment of ‘FUD’ to a Standards-Based Environment
  • Establishing a Culture of Cybersecurity
  • Increasing Internationalism—Governance, Laws, and Ethics
  • Standards—What Are They and Why Should We Care?
  • From Reaction to Proaction—Applying Standards in an Environment of Change and Danger
  • Conclusion—Where Do We Go From Here?
  • Gap Analysis Areas of Interest
  • Standards Crosswalk
SHOW MORE
FREE ACCESS

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 79 users Rating 4.5 of 79 users (79)
Rating 4.4 of 2703 users Rating 4.4 of 2703 users (2703)