Enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Donaldson, Scott E. (VerfasserIn), Siegel, Stanley G. (VerfasserIn), Williams, Chris K. (VerfasserIn), Aslam, Abdul (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: New York, NY Apress [2018]
Schriftenreihe:The expert's voice in cybersecurity
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-047607106
003 DE-627-1
005 20240228120450.0
007 cr uuu---uuuuu
008 191023s2018 xx |||||o 00| ||eng c
020 |a 9781484232583  |c electronic bk.  |9 978-1-4842-3258-3 
020 |a 1484232585  |c electronic bk.  |9 1-4842-3258-5 
020 |a 1484232593  |9 1-4842-3259-3 
020 |a 1484246284  |9 1-4842-4628-4 
035 |a (DE-627-1)047607106 
035 |a (DE-599)KEP047607106 
035 |a (ORHE)9781484232583 
035 |a (DE-627-1)047607106 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
072 7 |a COM  |2 bisacsh 
072 7 |a UR  |2 bicssc 
082 0 |a 005.8  |2 23 
100 1 |a Donaldson, Scott E.  |e VerfasserIn  |4 aut 
245 1 0 |a Enterprise cybersecurity study guide  |b how to build a successful cyberdefense program against advanced threats  |c Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam 
264 1 |a New York, NY  |b Apress  |c [2018] 
264 4 |c ©2018 
300 |a 1 online resource 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 0 |a The expert's voice in cybersecurity 
500 |a Includes index. - Online resource; title from PDF title page (EBSCO, viewed March 28, 2018) 
520 |a Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats. The study guide will help you understand the book's ideas and put them to work. The guide can be used for self-study or in the classroom. Enterprise cybersecurity is about implementing a cyberdefense program that will succeed in defending against real-world attacks. While we often know what should be done, the resources to do it often are not sufficient. The reality is that the Cybersecurity Conundrum--what the defenders request, what the frameworks specify, and what the budget allows versus what the attackers exploit--gets in the way of what needs to be done. Cyberattacks in the headlines affecting millions of people show that this conundrum fails more often than we would prefer. Cybersecurity professionals want to implement more than what control frameworks specify, and more than what the budget allows. Ironically, another challenge is that even when defenders get everything that they want, clever attackers are extremely effective at finding and exploiting the gaps in those defenses, regardless of their comprehensiveness. Therefore, the cybersecurity challenge is to spend the available budget on the right protections, so that real-world attacks can be thwarted without breaking the bank. People involved in or interested in successful enterprise cybersecurity can use this study guide to gain insight into a comprehensive framework for coordinating an entire enterprise cyberdefense program. What You'll Learn: Know the methodology of targeted attacks and why they succeed Master the cybersecurity risk management process Understand why cybersecurity capabilities are the foundation of effective cyberdefenses Organize a cybersecurity program's policy, people, budget, technology, and assessment Assess and score a cybersecurity program Report cybersecurity program status against compliance and regulatory frameworks Use the operational processes and supporting information systems of a successful cybersecurity program Create a data-driven and objectively managed cybersecurity program Discover how cybersecurity is evolving and will continue to evolve over the next decade. 
650 0 |a Computer security 
650 0 |a Computer crimes  |x Prevention 
650 2 |a Computer Security 
650 4 |a Sécurité informatique 
650 4 |a Coding theory & cryptology 
650 4 |a Computer security 
650 4 |a COMPUTERS ; Data Processing 
650 4 |a Computer crimes ; Prevention 
650 4 |a Computer security 
700 1 |a Siegel, Stanley G.  |e VerfasserIn  |4 aut 
700 1 |a Williams, Chris K.  |e VerfasserIn  |4 aut 
700 1 |a Aslam, Abdul  |e VerfasserIn  |4 aut 
776 1 |z 9781484232576 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9781484232576 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781484232583/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-047607106
_version_ 1818767308016844800
adam_text
any_adam_object
author Donaldson, Scott E.
Siegel, Stanley G.
Williams, Chris K.
Aslam, Abdul
author_facet Donaldson, Scott E.
Siegel, Stanley G.
Williams, Chris K.
Aslam, Abdul
author_role aut
aut
aut
aut
author_sort Donaldson, Scott E.
author_variant s e d se sed
s g s sg sgs
c k w ck ckw
a a aa
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)047607106
(DE-599)KEP047607106
(ORHE)9781484232583
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04589cam a22005892 4500</leader><controlfield tag="001">ZDB-30-ORH-047607106</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120450.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484232583</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4842-3258-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484232585</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4842-3258-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484232593</subfield><subfield code="9">1-4842-3259-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484246284</subfield><subfield code="9">1-4842-4628-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047607106</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047607106</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781484232583</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047607106</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Donaldson, Scott E.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Enterprise cybersecurity study guide</subfield><subfield code="b">how to build a successful cyberdefense program against advanced threats</subfield><subfield code="c">Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Apress</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The expert's voice in cybersecurity</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Online resource; title from PDF title page (EBSCO, viewed March 28, 2018)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats. The study guide will help you understand the book's ideas and put them to work. The guide can be used for self-study or in the classroom. Enterprise cybersecurity is about implementing a cyberdefense program that will succeed in defending against real-world attacks. While we often know what should be done, the resources to do it often are not sufficient. The reality is that the Cybersecurity Conundrum--what the defenders request, what the frameworks specify, and what the budget allows versus what the attackers exploit--gets in the way of what needs to be done. Cyberattacks in the headlines affecting millions of people show that this conundrum fails more often than we would prefer. Cybersecurity professionals want to implement more than what control frameworks specify, and more than what the budget allows. Ironically, another challenge is that even when defenders get everything that they want, clever attackers are extremely effective at finding and exploiting the gaps in those defenses, regardless of their comprehensiveness. Therefore, the cybersecurity challenge is to spend the available budget on the right protections, so that real-world attacks can be thwarted without breaking the bank. People involved in or interested in successful enterprise cybersecurity can use this study guide to gain insight into a comprehensive framework for coordinating an entire enterprise cyberdefense program. What You'll Learn: Know the methodology of targeted attacks and why they succeed Master the cybersecurity risk management process Understand why cybersecurity capabilities are the foundation of effective cyberdefenses Organize a cybersecurity program's policy, people, budget, technology, and assessment Assess and score a cybersecurity program Report cybersecurity program status against compliance and regulatory frameworks Use the operational processes and supporting information systems of a successful cybersecurity program Create a data-driven and objectively managed cybersecurity program Discover how cybersecurity is evolving and will continue to evolve over the next decade.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory &amp; cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Data Processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes ; Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Siegel, Stanley G.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Williams, Chris K.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aslam, Abdul</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781484232576</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781484232576</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781484232583/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-047607106
illustrated Not Illustrated
indexdate 2024-12-18T08:47:49Z
institution BVB
isbn 9781484232583
1484232585
1484232593
1484246284
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource
psigel ZDB-30-ORH
publishDate 2018
publishDateSearch 2018
publishDateSort 2018
publisher Apress
record_format marc
series2 The expert's voice in cybersecurity
spelling Donaldson, Scott E. VerfasserIn aut
Enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam
New York, NY Apress [2018]
©2018
1 online resource
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
The expert's voice in cybersecurity
Includes index. - Online resource; title from PDF title page (EBSCO, viewed March 28, 2018)
Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats. The study guide will help you understand the book's ideas and put them to work. The guide can be used for self-study or in the classroom. Enterprise cybersecurity is about implementing a cyberdefense program that will succeed in defending against real-world attacks. While we often know what should be done, the resources to do it often are not sufficient. The reality is that the Cybersecurity Conundrum--what the defenders request, what the frameworks specify, and what the budget allows versus what the attackers exploit--gets in the way of what needs to be done. Cyberattacks in the headlines affecting millions of people show that this conundrum fails more often than we would prefer. Cybersecurity professionals want to implement more than what control frameworks specify, and more than what the budget allows. Ironically, another challenge is that even when defenders get everything that they want, clever attackers are extremely effective at finding and exploiting the gaps in those defenses, regardless of their comprehensiveness. Therefore, the cybersecurity challenge is to spend the available budget on the right protections, so that real-world attacks can be thwarted without breaking the bank. People involved in or interested in successful enterprise cybersecurity can use this study guide to gain insight into a comprehensive framework for coordinating an entire enterprise cyberdefense program. What You'll Learn: Know the methodology of targeted attacks and why they succeed Master the cybersecurity risk management process Understand why cybersecurity capabilities are the foundation of effective cyberdefenses Organize a cybersecurity program's policy, people, budget, technology, and assessment Assess and score a cybersecurity program Report cybersecurity program status against compliance and regulatory frameworks Use the operational processes and supporting information systems of a successful cybersecurity program Create a data-driven and objectively managed cybersecurity program Discover how cybersecurity is evolving and will continue to evolve over the next decade.
Computer security
Computer crimes Prevention
Computer Security
Sécurité informatique
Coding theory & cryptology
COMPUTERS ; Data Processing
Computer crimes ; Prevention
Siegel, Stanley G. VerfasserIn aut
Williams, Chris K. VerfasserIn aut
Aslam, Abdul VerfasserIn aut
9781484232576
Erscheint auch als Druck-Ausgabe 9781484232576
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781484232583/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Donaldson, Scott E.
Siegel, Stanley G.
Williams, Chris K.
Aslam, Abdul
Enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats
Computer security
Computer crimes Prevention
Computer Security
Sécurité informatique
Coding theory & cryptology
COMPUTERS ; Data Processing
Computer crimes ; Prevention
title Enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats
title_auth Enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats
title_exact_search Enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats
title_full Enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam
title_fullStr Enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam
title_full_unstemmed Enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam
title_short Enterprise cybersecurity study guide
title_sort enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats
title_sub how to build a successful cyberdefense program against advanced threats
topic Computer security
Computer crimes Prevention
Computer Security
Sécurité informatique
Coding theory & cryptology
COMPUTERS ; Data Processing
Computer crimes ; Prevention
topic_facet Computer security
Computer crimes Prevention
Computer Security
Sécurité informatique
Coding theory & cryptology
COMPUTERS ; Data Processing
Computer crimes ; Prevention
url https://learning.oreilly.com/library/view/-/9781484232583/?ar
work_keys_str_mv AT donaldsonscotte enterprisecybersecuritystudyguidehowtobuildasuccessfulcyberdefenseprogramagainstadvancedthreats
AT siegelstanleyg enterprisecybersecuritystudyguidehowtobuildasuccessfulcyberdefenseprogramagainstadvancedthreats
AT williamschrisk enterprisecybersecuritystudyguidehowtobuildasuccessfulcyberdefenseprogramagainstadvancedthreats
AT aslamabdul enterprisecybersecuritystudyguidehowtobuildasuccessfulcyberdefenseprogramagainstadvancedthreats