Cyber Resilience : Defence-in-depth principles

個数:

Cyber Resilience : Defence-in-depth principles

  • オンデマンド(OD/POD)版です。キャンセルは承れません。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 162 p.
  • 言語 ENG
  • 商品コード 9781787784383
  • DDC分類 005.8

Full Description

We live in a world where technology and vast quantities of data play a considerable role in everyday life, both personal and professional.
For the foreseeable future (and perhaps beyond), the growth and prominence of data in business shows no signs of slowing down, even if the technology in question will likely change in ways perhaps unimaginable today. Naturally, all this innovation brings huge opportunities and benefits to organisations and people alike. However, these come at more than just a financial cost.

In the world as we know it, you can be attacked both physically and virtually. For today's organisations, which rely so heavily on technology - particularly the Internet - to do business, the latter attack is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. Worse, when a vulnerability is identified, a tool that can exploit it is often developed and used within hours - faster than the time it normally takes for the vendor to release a patch, and certainly quicker than the time many organisations take to install that patch.

This book has been divided into two parts:

Part 1: Security principles.
Part 2: Reference controls.

Part 1 is designed to give you a concise but solid grounding in the principles of good security, covering key terms, risk management, different aspects of security, defence in depth, implementation tips, and more. This part is best read from beginning to end.

Part 2 is intended as a useful reference, discussing a wide range of good-practice controls (in alphabetical order) you may want to consider implementing. Each control is discussed at a high level, focusing on the broader principles, concepts and points to consider, rather than specific solutions. Each control has also been written as a stand-alone chapter, so you can just read the controls that interest you, in an order that suits you.

Contents

Introduction

Part 1: Security principles

Chapter 1: The cyber threat landscape

Chapter 2: Legal and contractual requirements

Chapter 3: Key terms and concepts

Chapter 4: Managing the risks

Chapter 5: Three security pillars

Chapter 6: Layers of defence in depth

Chapter 7: Mapping the layers against the Part 2 reference controls

Chapter 8: Implementation tips

Part 2: Reference controls

Chapter 9: Asset management

Chapter 10: Board-level commitment and involvement

Chapter 11: Business continuity management

Chapter 12: Configuration and patch management

Chapter 13: Continual improvement process

Chapter 14: Encryption

Chapter 15: External certification/validation

Chapter 16: Identity and access control

Chapter 17: Incident response management

Chapter 18: Internal audits

Chapter 19: Malware protection

Chapter 20: Network and communications security

Chapter 21: Physical and environmental security

Chapter 22: Security monitoring

Chapter 23: Security policies

Chapter 24: Staff training and awareness

Chapter 25: Supply chain security

Chapter 26: System security

Chapter 27: Vulnerability scanning and penetration testing

最近チェックした商品