Cyber security. Simply. Make it happen. : leveraging digitization through IT security

Authors from the fields of politics, business, research and development examine the issue of security in this book. What will it cost and who will provide it? Can security perhaps even be fun? Digitization is permanently changing how we live and work. It is associated with speed and cost efficiency...

Full description

Saved in:
Bibliographic Details
Other Authors: Abolhassan, Ferri, (Editor)
Format: eBook
Language: English
Published: Cham, Switzerland : Springer, 2017.
Series: Management for professionals.
Subjects:
ISBN: 9783319465296
9783319465289
Physical Description: 1 online resource

Cover

Table of contents

LEADER 06277cam a2200481Ii 4500
001 98088
003 CZ-ZlUTB
005 20240914111018.0
006 m o d
007 cr cnu---unuuu
008 170501s2017 sz ob 000 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d EBLCP  |d YDX  |d UAB  |d N$T  |d MERER  |d ESU  |d AZU  |d UPM  |d IOG  |d OCLCQ  |d OTZ  |d IAS  |d OCLCQ  |d IDB  |d U3W  |d MERUC  |d JG0  |d CAUOI  |d OCLCF  |d KSU  |d WYU  |d OCLCQ  |d UKMGB  |d BRX  |d UKAHL  |d OCLCQ  |d ERF  |d OCLCQ  |d SRU 
020 |a 9783319465296  |q (electronic bk.) 
020 |z 9783319465289 
024 7 |a 10.1007/978-3-319-46529-6  |2 doi 
035 |a (OCoLC)984992612  |z (OCoLC)985250572  |z (OCoLC)985677679  |z (OCoLC)985917898  |z (OCoLC)986092991  |z (OCoLC)986299131  |z (OCoLC)986701978  |z (OCoLC)986889820  |z (OCoLC)988386628  |z (OCoLC)988555535  |z (OCoLC)988846637  |z (OCoLC)1066529293  |z (OCoLC)1112538966 
245 0 0 |a Cyber security. Simply. Make it happen. :  |b leveraging digitization through IT security /  |c Ferri Abolhassan, editor. 
264 1 |a Cham, Switzerland :  |b Springer,  |c 2017. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a počítač  |b c  |2 rdamedia 
338 |a online zdroj  |b cr  |2 rdacarrier 
490 1 |a Management for professionals 
504 |a Includes bibliographical references. 
505 0 |a Foreword; Trust Is the Basis of Digitization; Digitization Offers Great Opportunities; Data Protection and Digital Business Models Are Not in Opposition; Security Has to Be Simple; Contents; 1: Security: The Real Challenge for Digitalization; 1.1 Introduction; 1.2 Status Quo: The Cloud Is the Backbone of Digitalization; 1.3 Data Security: Only a Secure Cloud Will Lead to Secure Digitalization; 1.3.1 Risk Transformation: It Has to Be Easy to Get into the Cloud; 1.3.2 Risk of an Incident: Making Sure the Cloud Doesnt́ Crash. 
505 8 |a 1.3.3 Risk of Technical/Physical Attack: A Castle Wall Alone Isnt́ Enough1.3.4 Risk of a Cyberattack: Ensuring Data and Devices Arent́ Casualties; 1.4 Looking to the Future; 1.5 Conclusion; References; 2: Security Policy: Rules for Cyberspace; 2.1 Taking Stock: Digital Warfare in the 21st Century; 2.2 Challenges for the Political Sphere: Rules, Resources and Expertise; 2.3 Outlook: A Strategy for the Digital Age; References; 3: Data Protection Empowerment; 3.1 Code Is Law; 3.2 Empowerment; 3.3 Information Technology and Social Values; References. 
505 8 |a 4: Red Teaming and Wargaming: How Can Management and Supervisory Board Members Become More Involved in Cybersecurity?4.1 Cybersecurity: A Management Board Issue; 4.2 Integrating the Management Board into Existing Cybersecurity Strategies; 4.3 Red Teaming and Wargaming; 4.3.1 Red Teaming Defined; 4.3.2 Wargaming Defined; 4.3.3 Differences Compared with Methods Currently in Use; 4.4 Use of Red Teaming in Combination with Wargaming at Companies; 4.4.1 Classification; 4.4.2 Definition of a Target; 4.4.3 Composition of the Teams; 4.4.4 Analysis: Data Collection and Evaluation; 4.4.5 Wargaming. 
505 8 |a 4.4.6 Report4.5 Conclusion; References; 5: The Law and Its Contribution to IT Security: Legal Framework, Requirements, Limits; 5.1 Key Features of the Existing Legal Framework; 5.1.1 IT Compliance: A Challenge for Management Boards and Executives; 5.1.1.1 The Cornerstone of IT Compliance: IT Security; 5.1.1.2 Liability of the Management Board and Executives; 5.1.2 Who Is Responsible?; 5.1.2.1 Requirements for Software Manufacturers; 5.1.2.2 Requirements for Network and Platform Operators; 5.1.2.3 Legal Framework for Providers of IT Services. 
505 8 |a 5.1.3 Regulation on Determining Critical Infrastructure5.1.4 Controversial: Changes Affecting Telemedia Services; 5.2 International Issues: The European Unionś Directive on Security of Network and Information Systems (NIS Directive); 5.3 Data Protection and Data Security in the United States; 5.4 Data Exchange Between EU and US Companies; 5.4.1 Safe Harbor; 5.4.2 Privacy Shield; 5.5 Conclusion: Many Legal Issues to Consider; References; 6: IT Security: Stronger Together; 6.1 The Trinity of IT Security; 6.2 CSSA -- Security Through Collaboration; 6.2.1 Targeted Interaction. 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a Authors from the fields of politics, business, research and development examine the issue of security in this book. What will it cost and who will provide it? Can security perhaps even be fun? Digitization is permanently changing how we live and work. It is associated with speed and cost efficiency improvements, but it also increases the vulnerability to attack of both individuals and enterprises. To ensure that digitization can continue to drive efficiency, the maximum possible protection of data, networks and data centres, as well as devices and sensors in the Internet of Things, is essential. Humans and human behaviour are key to this, which is why future security concepts will have to be easy to use for everyone - from pensioners, housewives and students to small businesses and major corporations.<Content Security: The Real Challenge for Digitalization Security Policy: Rules for Cyberspace Data Protection Empowerment Red Teaming and Wargaming: How Can Management and Supervisory Board Members Become More Involved in Cybersecurity? CSP, not 007: Integrated Cybersecurity Skills Training Secure and Simple: Plug-and-Play Security Cybersecurity - What's next? The Editor Dr. Ferri Abolhassan is Director of T-Systems International GmbH, responsible for the IT Division and Telekom Security. He has authored various publications on IT markets and trends. 
590 |a SpringerLink  |b Springer Complete eBooks 
650 0 |a Internet  |x Security measures  |x Social aspects. 
650 0 |a Computer networks  |x Security measures. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
700 1 |a Abolhassan, Ferri,  |e editor. 
776 0 8 |i Printed edition:  |z 9783319465289 
830 0 |a Management for professionals. 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://link.springer.com/10.1007/978-3-319-46529-6  |y Plný text 
992 |c NTK-SpringerBM 
999 |c 98088  |d 98088 
993 |x NEPOSILAT  |y EIZ