Cyber security. Simply. Make it happen. : leveraging digitization through IT security
Authors from the fields of politics, business, research and development examine the issue of security in this book. What will it cost and who will provide it? Can security perhaps even be fun? Digitization is permanently changing how we live and work. It is associated with speed and cost efficiency...
Saved in:
Other Authors: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
Cham, Switzerland :
Springer,
2017.
|
Series: | Management for professionals.
|
Subjects: | |
ISBN: | 9783319465296 9783319465289 |
Physical Description: | 1 online resource |
LEADER | 06277cam a2200481Ii 4500 | ||
---|---|---|---|
001 | 98088 | ||
003 | CZ-ZlUTB | ||
005 | 20240914111018.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 170501s2017 sz ob 000 0 eng d | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d EBLCP |d YDX |d UAB |d N$T |d MERER |d ESU |d AZU |d UPM |d IOG |d OCLCQ |d OTZ |d IAS |d OCLCQ |d IDB |d U3W |d MERUC |d JG0 |d CAUOI |d OCLCF |d KSU |d WYU |d OCLCQ |d UKMGB |d BRX |d UKAHL |d OCLCQ |d ERF |d OCLCQ |d SRU | ||
020 | |a 9783319465296 |q (electronic bk.) | ||
020 | |z 9783319465289 | ||
024 | 7 | |a 10.1007/978-3-319-46529-6 |2 doi | |
035 | |a (OCoLC)984992612 |z (OCoLC)985250572 |z (OCoLC)985677679 |z (OCoLC)985917898 |z (OCoLC)986092991 |z (OCoLC)986299131 |z (OCoLC)986701978 |z (OCoLC)986889820 |z (OCoLC)988386628 |z (OCoLC)988555535 |z (OCoLC)988846637 |z (OCoLC)1066529293 |z (OCoLC)1112538966 | ||
245 | 0 | 0 | |a Cyber security. Simply. Make it happen. : |b leveraging digitization through IT security / |c Ferri Abolhassan, editor. |
264 | 1 | |a Cham, Switzerland : |b Springer, |c 2017. | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a počítač |b c |2 rdamedia | ||
338 | |a online zdroj |b cr |2 rdacarrier | ||
490 | 1 | |a Management for professionals | |
504 | |a Includes bibliographical references. | ||
505 | 0 | |a Foreword; Trust Is the Basis of Digitization; Digitization Offers Great Opportunities; Data Protection and Digital Business Models Are Not in Opposition; Security Has to Be Simple; Contents; 1: Security: The Real Challenge for Digitalization; 1.1 Introduction; 1.2 Status Quo: The Cloud Is the Backbone of Digitalization; 1.3 Data Security: Only a Secure Cloud Will Lead to Secure Digitalization; 1.3.1 Risk Transformation: It Has to Be Easy to Get into the Cloud; 1.3.2 Risk of an Incident: Making Sure the Cloud Doesnt́ Crash. | |
505 | 8 | |a 1.3.3 Risk of Technical/Physical Attack: A Castle Wall Alone Isnt́ Enough1.3.4 Risk of a Cyberattack: Ensuring Data and Devices Arent́ Casualties; 1.4 Looking to the Future; 1.5 Conclusion; References; 2: Security Policy: Rules for Cyberspace; 2.1 Taking Stock: Digital Warfare in the 21st Century; 2.2 Challenges for the Political Sphere: Rules, Resources and Expertise; 2.3 Outlook: A Strategy for the Digital Age; References; 3: Data Protection Empowerment; 3.1 Code Is Law; 3.2 Empowerment; 3.3 Information Technology and Social Values; References. | |
505 | 8 | |a 4: Red Teaming and Wargaming: How Can Management and Supervisory Board Members Become More Involved in Cybersecurity?4.1 Cybersecurity: A Management Board Issue; 4.2 Integrating the Management Board into Existing Cybersecurity Strategies; 4.3 Red Teaming and Wargaming; 4.3.1 Red Teaming Defined; 4.3.2 Wargaming Defined; 4.3.3 Differences Compared with Methods Currently in Use; 4.4 Use of Red Teaming in Combination with Wargaming at Companies; 4.4.1 Classification; 4.4.2 Definition of a Target; 4.4.3 Composition of the Teams; 4.4.4 Analysis: Data Collection and Evaluation; 4.4.5 Wargaming. | |
505 | 8 | |a 4.4.6 Report4.5 Conclusion; References; 5: The Law and Its Contribution to IT Security: Legal Framework, Requirements, Limits; 5.1 Key Features of the Existing Legal Framework; 5.1.1 IT Compliance: A Challenge for Management Boards and Executives; 5.1.1.1 The Cornerstone of IT Compliance: IT Security; 5.1.1.2 Liability of the Management Board and Executives; 5.1.2 Who Is Responsible?; 5.1.2.1 Requirements for Software Manufacturers; 5.1.2.2 Requirements for Network and Platform Operators; 5.1.2.3 Legal Framework for Providers of IT Services. | |
505 | 8 | |a 5.1.3 Regulation on Determining Critical Infrastructure5.1.4 Controversial: Changes Affecting Telemedia Services; 5.2 International Issues: The European Unionś Directive on Security of Network and Information Systems (NIS Directive); 5.3 Data Protection and Data Security in the United States; 5.4 Data Exchange Between EU and US Companies; 5.4.1 Safe Harbor; 5.4.2 Privacy Shield; 5.5 Conclusion: Many Legal Issues to Consider; References; 6: IT Security: Stronger Together; 6.1 The Trinity of IT Security; 6.2 CSSA -- Security Through Collaboration; 6.2.1 Targeted Interaction. | |
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
520 | |a Authors from the fields of politics, business, research and development examine the issue of security in this book. What will it cost and who will provide it? Can security perhaps even be fun? Digitization is permanently changing how we live and work. It is associated with speed and cost efficiency improvements, but it also increases the vulnerability to attack of both individuals and enterprises. To ensure that digitization can continue to drive efficiency, the maximum possible protection of data, networks and data centres, as well as devices and sensors in the Internet of Things, is essential. Humans and human behaviour are key to this, which is why future security concepts will have to be easy to use for everyone - from pensioners, housewives and students to small businesses and major corporations.<Content Security: The Real Challenge for Digitalization Security Policy: Rules for Cyberspace Data Protection Empowerment Red Teaming and Wargaming: How Can Management and Supervisory Board Members Become More Involved in Cybersecurity? CSP, not 007: Integrated Cybersecurity Skills Training Secure and Simple: Plug-and-Play Security Cybersecurity - What's next? The Editor Dr. Ferri Abolhassan is Director of T-Systems International GmbH, responsible for the IT Division and Telekom Security. He has authored various publications on IT markets and trends. | ||
590 | |a SpringerLink |b Springer Complete eBooks | ||
650 | 0 | |a Internet |x Security measures |x Social aspects. | |
650 | 0 | |a Computer networks |x Security measures. | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
700 | 1 | |a Abolhassan, Ferri, |e editor. | |
776 | 0 | 8 | |i Printed edition: |z 9783319465289 |
830 | 0 | |a Management for professionals. | |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://link.springer.com/10.1007/978-3-319-46529-6 |y Plný text |
992 | |c NTK-SpringerBM | ||
999 | |c 98088 |d 98088 | ||
993 | |x NEPOSILAT |y EIZ |