Building an Effective Security Program

個数:
  • ポイントキャンペーン

Building an Effective Security Program

  • ウェブストア価格 ¥10,743(本体¥9,767)
  • De|G Press(2020/09発売)
  • 外貨定価 US$ 61.99
  • ゴールデンウィーク ポイント2倍キャンペーン対象商品(5/6まで)
  • ポイント 194pt
  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

  • ウェブストア価格 ¥10,969(本体¥9,972)
  • De|G Press(2020/09発売)
  • 外貨定価 UK£ 48.00
  • ゴールデンウィーク ポイント2倍キャンペーン対象商品(5/6まで)
  • ポイント 198pt
  • 提携先の海外書籍取次会社に在庫がございます。通常約2週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 444 p.
  • 言語 ENG
  • 商品コード 9781501515248
  • DDC分類 005.8

Full Description

Building an Effective Security Program provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security awareness, and training. This program will establish and maintain effective security protections for the confidentiality, availability, and integrity of organization information. In this book, the authors take a pragmatic approach to building organization cyberdefenses that are effective while also remaining affordable.

This book is intended for business leaders, IT professionals, cybersecurity personnel, educators, and students interested in deploying real-world cyberdefenses against today's persistent and sometimes devastating cyberattacks. It includes detailed explanation of the following IT security topics:



IT Security Mindset—Think like an IT security professional, and consider how your IT environment can be defended against potential cyberattacks.

Risk Management—Identify the assets, vulnerabilities and threats that drive IT risk, along with the controls that can be used to mitigate such risk.

Effective Cyberdefense—Consider the components of an effective organization cyberdefense to successfully protect computers, devices, networks, accounts, applications and data.

Cyber Operations—Operate cyberdefense capabilities and controls so that assets are protected, and intruders can be detected and repelled before significant damage can be done.

IT Security Awareness and Training—Promote effective cybersecurity practices at work, on travel, and at home, among your organization's business leaders, IT professionals, and staff.

Resilient IT Security—Implement, operate, monitor, assess, and improve your cybersecurity program on an ongoing basis to defend against the cyber threats of today and the future.

Contents

FOREWORD - 1 page

ABOUT THE AUTHORS - 1 page

ACKNOWLEDGMENTS - 1 page

INTRODUCTION - 2 pages




What is this book about?




Who should read this book?




Why did the authors write this book?




Organization of the book

CHAPTERS




Chapter 1—Business Case (‾15 pages)

This chapter presents the business case for setting up an enduring IT security awareness and training program for use in training the employees of the company—from IT users to career IT security professionals. This chapter introduces fundamental concepts and terms used throughout the book.






Chapter 2—IT Security Mind Set (‾15 pages)

This chapter presents thinking like an IT security professional to establish and maintain common security protections.






Chapter 3—IT Security Risk Management (‾15 pages)

This chapter presents a risk management process that involves asset management, security vulnerabilities, security threats, risk identification, risk mitigation, and security controls.






Chapter 4—IT Security Process (‾15 pages)

This chapter presents how to establish security scopes and select corresponding controls to protect the confidentiality, availability, and integrity of company information.






Chapter 5—IT Security Scenarios and Perspectives (‾40 pages)

This chapter presents how the Chapter 4 IT security process is applied to various scenarios. Each scenario will walk through a number of common security controls and apply the IT security process to identify how to protect company information.




IT security at home




IT security while traveling




IT security at work




IT security as an executive




International IT security






Chapter 6—Planning IT Security Awareness and Training (‾15 pages)

This chapter presents practical guidance on how to write an IT Awareness and Training implementation plan.






Chapter 7—Implementing IT Security Awareness and Training Program(‾15 pages)

This chapter presents human issues related to bringing about enterprise-wide cultural change due to implementation of an IT Awareness and Training Program.






Chapter 8—Measuring IT Security Awareness and Training Program Implementation (‾15 pages)

This chapter presents practical guidance for measuring program implementation success and how to use the measurements to achieve awareness and training goals.






Chapter 9—Managing Continual Program Improvement (‾15 pages)

This chapter presents practical guidance for monitoring compliance, evaluating feedback and improving the program.






Chapter 10—Looking to the Future (‾15 pages)

This chapter presents a view of the evolving cybersecurity attacks as they become more capable and sophisticated.

APPENDICES - 10 pages

GLOSSARY - 3 pages

BIBLIOGRAPHY - 3 pages

INDEX - 4 pages