CYBER RISK MANAGEMENT : Prioritize threats, identify vulnerabilities and apply controls / Christopher J Hodson.
Publisher: London : KoganPage, 2019Copyright date: ©2019Edition: 1st EditionDescription: ix, 394 pages : illustrations. 24 cmContent type:- text
- unmediated
- volume
- 9780749498788 (hardback) :
- 9780749484125 (pbk.) :
- 005.8 23
Item type | Current library | Shelving location | Call number | URL | Status | Notes | Date due | Barcode | Course reserves | |
---|---|---|---|---|---|---|---|---|---|---|
BOOK GPS | FRANCIS LIGHT LIBRARY | Link to resource | Not for loan | |||||||
ACADEMIC | FRANCIS LIGHT LIBRARY | SHELVES 1 | 005.8 HOD (Browse shelf(Opens below)) | Available | DCS2323 (Cyber Risk Management (elective)) | 00000574 |
Section - ONE: Contextualizing cybersecurity risk;Chapter - 01: Why now? The only constant is change;Chapter - 02: Technologies and security challenges;Chapter - 03: Data breaches;Section - TWO: Cybersecurity programme management;Chapter - 04: What are cybersecurity and cybercrime?;Chapter - 05: Establishing a cybersecurity programme;Section - THREE: Actors, events and vulnerabilities;Chapter - 06: Threat actors;Chapter - 07: Threat events;Chapter - 08: Vulnerabilities;Chapter - 09: Controls;Section - FOUR: Conclusion - The cybersecurity risk equation explained;Chapter - 10: Cyber risk management - A conclusion
Learn how to prioritize threats, implement a cyber security programme and effectively communicate risks.
There are no comments on this title.