Building an Effective Security Program

ยท ยท
ยท Walter de Gruyter GmbH & Co KG
ืกืคืจ ื“ื™ื’ื™ื˜ืœื™
444
ื“ืคื™ื
ื”ื‘ื™ืงื•ืจื•ืช ื•ื”ื“ื™ืจื•ื’ื™ื ืœื ืžืื•ืžืชื™ืย ืžื™ื“ืข ื ื•ืกืฃ

ืžื™ื“ืข ืขืœ ื”ืกืคืจ ื”ื“ื™ื’ื™ื˜ืœื™ ื”ื–ื”

Building an Effective Security Program provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security awareness, and training. This program will establish and maintain effective security protections for the confidentiality, availability, and integrity of organization information. In this book, the authors take a pragmatic approach to building organization cyberdefenses that are effective while also remaining affordable.

This book is intended for business leaders, IT professionals, cybersecurity personnel, educators, and students interested in deploying real-world cyberdefenses against todayโ€™s persistent and sometimes devastating cyberattacks. It includes detailed explanation of the following IT security topics:

  • IT Security Mindsetโ€”Think like an IT security professional, and consider how your IT environment can be defended against potential cyberattacks.
  • Risk Managementโ€”Identify the assets, vulnerabilities and threats that drive IT risk, along with the controls that can be used to mitigate such risk.
  • Effective Cyberdefenseโ€”Consider the components of an effective organization cyberdefense to successfully protect computers, devices, networks, accounts, applications and data.
  • Cyber Operationsโ€”Operate cyberdefense capabilities and controls so that assets are protected, and intruders can be detected and repelled before significant damage can be done.
  • IT Security Awareness and Trainingโ€”Promote effective cybersecurity practices at work, on travel, and at home, among your organizationโ€™s business leaders, IT professionals, and staff.
  • Resilient IT Securityโ€”Implement, operate, monitor, assess, and improve your cybersecurity program on an ongoing basis to defend against the cyber threats of today and the future.

ืขืœ ื”ืžื—ื‘ืจ

Chris K. Williams, Leidos, USA; Scott E. Donaldson, Johns Hopkins University, USA; Stanley G. Siegel, Johns Hopkins University, USA

ืจื•ืฆื” ืœื“ืจื’ ืืช ื”ืกืคืจ ื”ื“ื™ื’ื™ื˜ืœื™ ื”ื–ื”?

ื ืฉืžื— ืœืฉืžื•ืข ืžื” ื“ืขืชืš.

ืื™ืš ืงื•ืจืื™ื ืืช ื”ืกืคืจ

ืกืžืืจื˜ืคื•ื ื™ื ื•ื˜ืื‘ืœื˜ื™ื
ื›ืœ ืžื” ืฉืฆืจื™ืš ืœืขืฉื•ืช ื”ื•ื ืœื”ืชืงื™ืŸ ืืช ื”ืืคืœื™ืงืฆื™ื” ืฉืœ Google Play Books ืœ-Android ืื• ืœ-iPad/iPhoneโ€. ื”ื™ื ืžืกืชื ื›ืจื ืช ื‘ืื•ืคืŸ ืื•ื˜ื•ืžื˜ื™ ืขื ื”ื—ืฉื‘ื•ืŸ ืฉืœืš ื•ืžืืคืฉืจืช ืœืš ืœืงืจื•ื ืžื›ืœ ืžืงื•ื, ื’ื ืœืœื ื—ื™ื‘ื•ืจ ืœืื™ื ื˜ืจื ื˜.
ืžื—ืฉื‘ื™ื ื ื™ื™ื“ื™ื ื•ืฉื•ืœื—ื ื™ื™ื
ื ื™ืชืŸ ืœื”ืื–ื™ืŸ ืœืกืคืจื™ ืื•ื“ื™ื• ืฉื ืจื›ืฉื• ื‘-Google Play ื‘ืืžืฆืขื•ืช ื“ืคื“ืคืŸ ื”ืื™ื ื˜ืจื ื˜ ืฉืœ ื”ืžื—ืฉื‘.
eReaders ื•ืžื›ืฉื™ืจื™ื ืื—ืจื™ื
ื›ื“ื™ ืœืงืจื•ื ื‘ืžื›ืฉื™ืจื™ื ืขื ืชืฆื•ื’ืช ื“ื™ื• ืืœืงื˜ืจื•ื ื™ (e-ink) ื›ืžื• ื”ืงื•ืจืื™ื ื”ืืœืงื˜ืจื•ื ื™ื™ื ืฉืœ Kobo, ืฆืจื™ืš ืœื”ื•ืจื™ื“ ืงื•ื‘ืฅ ื•ืœื”ืขื‘ื™ืจ ืื•ืชื• ืœืžื›ืฉื™ืจ. ื™ืฉ ืœืคืขื•ืœ ืœืคื™ ื”ื”ื•ืจืื•ืช ื”ืžืคื•ืจื˜ื•ืช ื‘ืžืจื›ื– ื”ืขื–ืจื” ื›ื“ื™ ืœื”ืขื‘ื™ืจ ืืช ื”ืงื‘ืฆื™ื ืœืงื•ืจืื™ื ืืœืงื˜ืจื•ื ื™ื™ื ื ืชืžื›ื™ื.