Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
About This E-Book Title Page Copyright Page Contents at a Glance Table of Contents About the Author Dedication Acknowledgments We Want to Hear from You! Reader Services Introduction Chapter 1 Understanding Cybersecurity Policy and Governance
Information Security vs. Cybersecurity Policies Looking at Policy Through the Ages Cybersecurity Policy Cybersecurity Policy Life Cycle Summary Test Your Skills
Chapter 2 Cybersecurity Policy Organization, Format, and Styles
Policy Hierarchy Writing Style and Technique Policy Format Summary Test Your Skills
Chapter 3 Cybersecurity Framework
Confidentiality, Integrity, and Availability NIST’s Cybersecurity Framework Summary Test Your Skills
Chapter 4 Governance and Risk Management
Understanding Cybersecurity Policies Cybersecurity Risk Summary Test Your Skills
Chapter 5 Asset Management and Data Loss Prevention
Information Assets and Systems Information Classification Labeling and Handling Standards Information Systems Inventory Understanding Data Loss Prevention Technologies Summary Test Your Skills
Chapter 6 Human Resources Security
The Employee Life Cycle The Importance of Employee Agreements The Importance of Security Education and Training Summary Test Your Skills
Chapter 7 Physical and Environmental Security
Understanding the Secure Facility Layered Defense Model Protecting Equipment Summary Test Your Skills
Chapter 8 Communications and Operations Security
Standard Operating Procedures Operational Change Control Malware Protection Data Replication Secure Messaging Activity Monitoring and Log Analysis Service Provider Oversight Threat Intelligence and Information Sharing Summary Test Your Skills
Chapter 9 Access Control Management
Access Control Fundamentals Infrastructure Access Controls User Access Controls Summary Test Your Skills
Chapter 10 Information Systems Acquisition, Development, and Maintenance
System Security Requirements Secure Code Cryptography Summary Test Your Skills
Chapter 11 Cybersecurity Incident Response
Incident Response What Happened? Investigation and Evidence Handling Data Breach Notification Requirements Summary Test Your Skills
Chapter 12 Business Continuity Management
Emergency Preparedness Business Continuity Risk Management The Business Continuity Plan Plan Testing and Maintenance Summary Test Your Skills
Chapter 13 Regulatory Compliance for Financial Institutions
The Gramm-Leach-Bliley Act New York’s Department of Financial Services Cybersecurity Regulation (23 NYCRR Part 500) What Is a Regulatory Examination? Personal and Corporate Identity Theft Summary Test Your Skills
Chapter 14 Regulatory Compliance for the Health-Care Sector
The HIPAA Security Rule The HITECH Act and the Omnibus Rule Understanding the HIPAA Compliance Enforcement Process Summary Test Your Skills
Chapter 15 PCI Compliance for Merchants
Protecting Cardholder Data PCI Compliance Summary Test Your Skills
Chapter 16 NIST Cybersecurity Framework
Introducing the NIST Cybersecurity Framework Components The Framework Core Framework Implementation Tiers (“Tiers”) NIST’s Recommended Steps to Establish or Improve a Cybersecurity Program NIST’s Cybersecurity Framework Reference Tool Adopting the NIST Cybersecurity Framework in Real Life Summary Test Your Skills
Appendix A Cybersecurity Program Resources Appendix B Answers to the Multiple Choice Questions Index Code Snippets
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion