Information Asset Management for Cyber
Organizations cannot control how or when a cyberattack will occur. They can, however, control the speed and effectiveness of their response. In developing effective, integrated response plans that lead to successful crisis management, companies should follow three main principles: a documented conti...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buchkapitel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Organizations cannot control how or when a cyberattack will occur. They can, however, control the speed and effectiveness of their response. In developing effective, integrated response plans that lead to successful crisis management, companies should follow three main principles: a documented contingency plan, war game‐style training, and a crisis action officer to execute the plans. Computer network operations refers broadly to actions that an entity takes to increase their own information security, while denying security to their enemies. It has three components: computer network defense (CND), computer network exploitation (CNE), and computer network attack (CNA). |
---|---|
DOI: | 10.1002/9781119309741.ch19 |