Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Copyright
CONTENTS
LIST OF FIGURES AND TABLES
AUTHOR
ACKNOWLEDGEMENTS
ABBREVIATIONS
PREFACE
GLOSSARY
PART I CYBER SECURITY PROBLEMS
1. INTRODUCTION
BACKGROUND
THE EXPECTATIONS OF USERS AND ORGANISATIONS
CYBER SECURITY IN THE WIDER CONTEXT
BACKGROUND
THE EXPECTATIONS OF USERS AND ORGANISATIONS
CYBER SECURITY IN THE WIDER CONTEXT
2. THE BIG ISSUES
CYBERCRIME
CYBER HARASSMENT OR CYBER BULLYING
CYBER WARFARE
CYBER SURVEILLANCE
WHY WE SHOULD CARE
WHAT MAKES CYBER SECURITY DIFFICULT?
CYBERCRIME
CYBER HARASSMENT OR CYBER BULLYING
CYBER WARFARE
CYBER SURVEILLANCE
WHY WE SHOULD CARE
WHAT MAKES CYBER SECURITY DIFFICULT?
3. CYBER TARGETS
INDIVIDUAL TARGETS
BUSINESS TARGETS
CRITICAL NATIONAL INFRASTRUCTURE TARGETS
BUILDING TARGETS
ACADEMIA AND RESEARCH TARGETS
MANUFACTURING AND INDUSTRY TARGETS
INDIVIDUAL TARGETS
BUSINESS TARGETS
CRITICAL NATIONAL INFRASTRUCTURE TARGETS
BUILDING TARGETS
ACADEMIA AND RESEARCH TARGETS
MANUFACTURING AND INDUSTRY TARGETS
4. CYBER VULNERABILITIES AND IMPACTS
CYBER VULNERABILITIES
CYBER IMPACTS
CYBER VULNERABILITIES
CYBER IMPACTS
5. CYBER THREATS
TYPES OF ATTACKER
MOTIVES – WHAT DRIVES AN ATTACKER
MEANS
CYBER-ATTACK METHODS
TYPES OF CYBER-ATTACK AND ATTACK VECTORS
THE RISKS OF CONDUCTING A CYBER-ATTACK
TYPES OF ATTACKER
MOTIVES – WHAT DRIVES AN ATTACKER
MEANS
CYBER-ATTACK METHODS
TYPES OF CYBER-ATTACK AND ATTACK VECTORS
THE RISKS OF CONDUCTING A CYBER-ATTACK
PART II IMPROVING CYBER SECURITY
6. RISK MANAGEMENT OVERVIEW
A GENERAL VIEW OF RISK
ASSETS
VULNERABILITIES
LIKELIHOOD OR PROBABILITY
QUALITATIVE AND QUANTITATIVE ASSESSMENTS
THE RISK MANAGEMENT PROCESS
A GENERAL VIEW OF RISK
ASSETS
VULNERABILITIES
LIKELIHOOD OR PROBABILITY
QUALITATIVE AND QUANTITATIVE ASSESSMENTS
THE RISK MANAGEMENT PROCESS
7. BUSINESS CONTINUITY AND DISASTER RECOVERY
BUSINESS CONTINUITY
DISASTER RECOVERY
BUSINESS CONTINUITY
DISASTER RECOVERY
8. BASIC CYBER SECURITY STEPS
GENERAL SECURITY ADVICE
TECHNICAL SECURITY ADVICE
MOBILE WORKING
GENERAL SECURITY ADVICE
TECHNICAL SECURITY ADVICE
MOBILE WORKING
9. ORGANISATIONAL SECURITY STEPS
SECURITY POLICIES OVERVIEW
DIRECTIVE POLICIES
ADMINISTRATIVE POLICIES
COMMUNAL POLICIES
TECHNICAL POLICIES
SECURITY POLICIES OVERVIEW
DIRECTIVE POLICIES
ADMINISTRATIVE POLICIES
COMMUNAL POLICIES
TECHNICAL POLICIES
10. AWARENESS AND TRAINING
AWARENESS
TRAINING
AWARENESS
TRAINING
11. INFORMATION SHARING
TRUST
INFORMATION CLASSIFICATION
PROTECTION OF SHARED INFORMATION
ANONYMISATION OF SHARED INFORMATION
ROUTES TO INFORMATION SHARING
TRUST
INFORMATION CLASSIFICATION
PROTECTION OF SHARED INFORMATION
ANONYMISATION OF SHARED INFORMATION
ROUTES TO INFORMATION SHARING
PART III APPENDICES
APPENDIX A – STANDARDS
CYBER SECURITY STANDARDS
ISO/IEC 27000 SERIES STANDARDS
OTHER RELEVANT ISO STANDARDS
BUSINESS CONTINUITY STANDARDS
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) STANDARDS
CYBER SECURITY STANDARDS
ISO/IEC 27000 SERIES STANDARDS
OTHER RELEVANT ISO STANDARDS
BUSINESS CONTINUITY STANDARDS
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) STANDARDS
APPENDIX B – GOOD PRACTICE GUIDELINES
GENERAL CYBER SECURITY ADVICE
UK GOVERNMENT CYBER SECURITY ADVICE
GENERAL CYBER SECURITY ADVICE
UK GOVERNMENT CYBER SECURITY ADVICE
APPENDIX C – CYBER SECURITY LAW
UK LAW
EU DIRECTIVES AND REGULATIONS
OTHER RELEVANT LEGISLATION
UK LAW
EU DIRECTIVES AND REGULATIONS
OTHER RELEVANT LEGISLATION
APPENDIX D – CYBER SECURITY TRAINING
APPENDIX E – LINKS TO OTHER USEFUL ORGANISATIONS
FURTHER READING
Index
Back Cover
← Prev
Back
Next →
← Prev
Back
Next →