Welcome to Francis Light Library | francislightlibrary@peninsulamalaysia.edu.my | +604-545 600 EXt:8004

CYBER RISK MANAGEMENT : Prioritize threats, identify vulnerabilities and apply controls /

Hodson, Christopher,

CYBER RISK MANAGEMENT : Prioritize threats, identify vulnerabilities and apply controls / Christopher J Hodson. - 1st Edition - ix, 394 pages : illustrations. 24 cm

Section - ONE: Contextualizing cybersecurity risk;Chapter - 01: Why now? The only constant is change;Chapter - 02: Technologies and security challenges;Chapter - 03: Data breaches;Section - TWO: Cybersecurity programme management;Chapter - 04: What are cybersecurity and cybercrime?;Chapter - 05: Establishing a cybersecurity programme;Section - THREE: Actors, events and vulnerabilities;Chapter - 06: Threat actors;Chapter - 07: Threat events;Chapter - 08: Vulnerabilities;Chapter - 09: Controls;Section - FOUR: Conclusion - The cybersecurity risk equation explained;Chapter - 10: Cyber risk management - A conclusion

Learn how to prioritize threats, implement a cyber security programme and effectively communicate risks.

9780749498788 (hardback) : RM189.99 9780749484125 (pbk.) :

GBB960843 bnb

019345655 Uk


Computer networks--Security measures.
Risk management.

005.8

The Ship Campus, No.1 Education Boulevard,One Auto Hub, Batu Kawan Industrial Park,14110, Bandar Cassia, Penang,Malaysia.Phone: +604 585 5000 Fax: +604 585 5009 | Email: noorshahidah@penisulacollege.edu.my 

Powered by KOHA |© Maintained by WISERF