Assessing information security: strategies, tactics, logic and framework
The activities of cyber criminals can be compared to military operations. People in business understand that insights from the classics of military strategy are as relevant to modern commerce as they are to war. Organisations need to develop a view of cybersecurity that goes beyond technology: all s...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The activities of cyber criminals can be compared to military operations. People in business understand that insights from the classics of military strategy are as relevant to modern commerce as they are to war. Organisations need to develop a view of cybersecurity that goes beyond technology: all staff in the organisation have a role to play, and it is the senior managers who must ensure, like generals marshalling their forces, that all staff know the cyber security policies that explain what to do when under attack. The authors have drawn on the work of Clausewitz and Sun Tzu, and applied it to the understanding of information security that they have built up through their extensive experience in the field. The result is expert guidance on information security, underpinned by a profound understanding of human conflict. This edition covers developments in the threat landscape and best-practice advice available in the latest version of ISO 27001:2103. -- |
---|