The Information Systems Security Officer Guide Establishing and Managing a Cyber Security Program 3rd Edition by Gerald L Kovacich – Ebook PDF Instant Download/Delivery. 012802190X, 9780128021903
Full download The Information Systems Security Officer Guide Establishing and Managing a Cyber Security Program 3rd Edition after payment
Product details:
ISBN 10: 012802190X
ISBN 13: 9780128021903
Author: Gerald L Kovacich
The Information Systems Security Officer’s Guide: Establishing and Managing a Cyber Security Program, Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face. This entirely updated edition presents practical advice on establishing, managing, and evaluating a successful information protection program in a corporation or government agency, covering everything from effective communication to career guidance for the information security officer.
The book outlines how to implement a new plan or evaluate an existing one, and is especially targeted to those who are new to the topic. It is the definitive resource for learning the key characteristics of an effective information systems security officer (ISSO), and paints a comprehensive portrait of an ISSO’s duties, their challenges, and working environments, from handling new technologies and threats, to performing information security duties in a national security environment.
- Provides updated chapters that reflect the latest technological changes and advances in countering the latest information security threats and risks and how they relate to corporate security and crime investigation
- Includes new topics, such as forensics labs and information warfare, as well as how to liaison with attorneys, law enforcement, and other agencies others outside the organization
- Written in an accessible, easy-to-read style
The Information Systems Security Officer Guide Establishing and Managing a Cyber Security Program 3rd Table of contents:
Section I. The Working Environment of the Cyber Security Officer
Introduction
Chapter 1. Understanding the Past and Present Cyber-Information World Environment
Ah, the Good Ol’ Days!
Global Information Infrastructure
National Information Infrastructure
How Did We Get from Adam to the Internet?
Changing Criminal Justice Systems
The Human Factor
Summary
Chapter 2. Understanding the Past and Present Global Business and Management Environment
The Changing Business and Government Environments
Understanding the Business Environment
Management Responsibilities and Communicating with Management
Creating a Competitive Advantage through a Cyber Security Program
Service, Support, and a Business Orientation
Business Managers and Cyber security
What Company Managers Should Ask of Their Cyber Security Professionals
What Cyber Security Professionals Should Do
Questions to Consider
Summary
Chapter 3. An Overview of Related World Views of Cyber Security
Evolution of Laws, Standards, Policies, and Procedures
Global via the UN
The EU
Asia
South America
Africa
Canada
United States
Summary
Chapter 4. A Glimpse at the History of Technology
What Is Technology?
From Cave Man to Cyber Security Professional and Information Warrior
Revolutions and Evolutions in High Technology
From the Twentieth Century to Today: Technology and the Advent of High Technology
The Internet
The High-Technology-Driven Phenomenon
Faster and More Massive High-Technology-Driven Communications
The Beneficial Effect of Hacker Tools and Other Malicious Software on Network Security with Dual Roles as Cyber Security Tools
Other High-Technology Tools in Cyber Security
Welcome to the Twenty-First-Century Technology
Summary
Chapter 5. Understanding Today’s Threats in the Cyber Vapor—“War Stories” from the Front Lines
Reported Digital Battlefield Attacks and Related Stories
Summary
Section II. The Duties and Responsibilities of a Cyber Security Officer
Introduction
Chapter 6. The Cyber Security Officer’s Position, Duties, and Responsibilities
Introduction
The Cyber Security Officer in a Global Corporation
Cyber Security Officer Duties and Responsibilities
Goals and Objectives
Leadership Position
Vision, Mission, and Quality Statements
Cyber Security Principles
Project and Risk Management Processes
Cyber Security Officer and Organizational Responsibilities
Summary
Chapter 7. The Cyber Security Program’s Strategic, Tactical, and Annual Plans
Introduction
Corporate’s Cyber Security Strategic Plan
Corporate’s Cyber Security Tactical Plan
Cyber Security Annual Plan
Questions to Consider
Summary
Chapter 8. Establishing a Cyber Security Program and Organization
Introduction
Corporate Cyber Security Program
Cyber Security Officer Thought Process in Establishing the Cyber Security Organization
Questions to Consider
Summary
Chapter 9. Determining and Establishing Cyber Security Functions
Introduction
Processes
Valuing Information
International Widget Corporation (IWC) Cyber Security Program Functions Process Development
Cyber Security Officer’s Cyber Security Program Functions
Access Control and Access Control Systems
Evaluation of All Hardware, Firmware, and Software
Risk Management Program
Security Tests and Evaluations Program
Noncompliance Inquiries
Contingency and Emergency Planning and Disaster Recovery Program
Questions to Consider
Summary
Chapter 10. Establishing a Metrics Management System
Introduction
Metrics 1: Cyber Security Program Level of Effort Drivers—Number of Users
Examples of Other Metrics Charts
Project Management
Questions to Consider
Summary
Chapter 11. Annual Reevaluation and Future Plans
Introduction
One-Year Review
Cyber Security Program Strategic, Tactical, and Annual Plans
Linking Cyber Security Program Accomplishments to Corporate Goals
Metrics Analysis
Planning for Next Year
Questions to Consider
Summary
Chapter 12. High-Technology Crimes Investigative Support
Introduction
Duties and Responsibilities of a Cyber Security Officer in Deterring High-Technology Crimes
Assisting with Computer Forensics Support
Dealing with Law Enforcement
Questions to Consider
Summary
Section III. The Global, Professional, and Personal Challenges of a Cyber Security Officer
Introduction
Chapter 13. Introduction to Global Information Warfare
The Possibilities
Introduction to Warfare
Four Generations of Warfare
Introduction to Global Information Warfare
Information Warfare Will Hit You in Your Pocketbook
Business Is War
IW Broadly Encompasses Many Levels and Functions
What IW Is … and Is Not
Being Prepared-Bad Things Will Happen
The Possible Breakdowns in an Information Environment
Going beyond Three Blind Men Describing an Elephant: Information Warfare Terms of Reference
Information Warfare Is a Powerful Approach for Attaining and Maintaining a Competitive Advantage
How to Use IW to Achieve Goals and Objectives
Coherent Knowledge-Based Operations
Network-Centric Business
Knowledge Management
Summary
Note
Chapter 14. The Cyber Security Officer and Privacy, Ethical, and Liability Issues
Introduction to Privacy Issues
Introduction to Ethics Issues
Codes of Ethics
Corporate Ethics, Standards of Conduct, Business Practices, and Corporate Values
Liability Issues
Questions to Consider
Summary
Chapter 15. A Career as a Cyber Security Officer
Introduction
The Cyber Security Officer’s Career Development Program
Education
Questions
Summary
Chapter 16. A Look at the Possible Future
Surviving into the Future
New Old Approach to Security—Defensive Approach
The Changing Environment
The Need for Enlightened and Dedicated Leadership
Global Trends
Offensive–Defensive Cyber Attacks
The Future of the Internet
Questions
People also search for The Information Systems Security Officer Guide Establishing and Managing a Cyber Security Program 3rd:
the information systems security officer’s guide
the information security oversight office
the information security guidelines are
information systems security officer requirements
the information security oversight office released 32