Cyber security. Simply. Make it happen. : leveraging digitization through IT security /: leveraging digitization through IT security. (2017)
- Record Type:
- Book
- Title:
- Cyber security. Simply. Make it happen. : leveraging digitization through IT security /: leveraging digitization through IT security. (2017)
- Main Title:
- Cyber security. Simply. Make it happen. : leveraging digitization through IT security
- Further Information:
- Note: Ferri Abolhassan, editor.
- Editors:
- Abolhassan, Ferri
- Contents:
- Foreword; Trust Is the Basis of Digitization; Digitization Offers Great Opportunities; Data Protection and Digital Business Models Are Not in Opposition; Security Has to Be Simple; Contents; 1: Security: The Real Challenge for Digitalization; 1.1 Introduction; 1.2 Status Quo: The Cloud Is the Backbone of Digitalization; 1.3 Data Security: Only a Secure Cloud Will Lead to Secure Digitalization; 1.3.1 Risk Transformation: It Has to Be Easy to Get into the Cloud; 1.3.2 Risk of an Incident: Making Sure the Cloud Doesnt́ Crash. 1.3.3 Risk of Technical/Physical Attack: A Castle Wall Alone Isnt́ Enough1.3.4 Risk of a Cyberattack: Ensuring Data and Devices Arent́ Casualties; 1.4 Looking to the Future; 1.5 Conclusion; References; 2: Security Policy: Rules for Cyberspace; 2.1 Taking Stock: Digital Warfare in the 21st Century; 2.2 Challenges for the Political Sphere: Rules, Resources and Expertise; 2.3 Outlook: A Strategy for the Digital Age; References; 3: Data Protection Empowerment; 3.1 Code Is Law; 3.2 Empowerment; 3.3 Information Technology and Social Values; References. 4: Red Teaming and Wargaming: How Can Management and Supervisory Board Members Become More Involved in Cybersecurity?4.1 Cybersecurity: A Management Board Issue; 4.2 Integrating the Management Board into Existing Cybersecurity Strategies; 4.3 Red Teaming and Wargaming; 4.3.1 Red Teaming Defined; 4.3.2 Wargaming Defined; 4.3.3 Differences Compared with Methods Currently in Use; 4.4 Use of Red Teaming in CombinationForeword; Trust Is the Basis of Digitization; Digitization Offers Great Opportunities; Data Protection and Digital Business Models Are Not in Opposition; Security Has to Be Simple; Contents; 1: Security: The Real Challenge for Digitalization; 1.1 Introduction; 1.2 Status Quo: The Cloud Is the Backbone of Digitalization; 1.3 Data Security: Only a Secure Cloud Will Lead to Secure Digitalization; 1.3.1 Risk Transformation: It Has to Be Easy to Get into the Cloud; 1.3.2 Risk of an Incident: Making Sure the Cloud Doesnt́ Crash. 1.3.3 Risk of Technical/Physical Attack: A Castle Wall Alone Isnt́ Enough1.3.4 Risk of a Cyberattack: Ensuring Data and Devices Arent́ Casualties; 1.4 Looking to the Future; 1.5 Conclusion; References; 2: Security Policy: Rules for Cyberspace; 2.1 Taking Stock: Digital Warfare in the 21st Century; 2.2 Challenges for the Political Sphere: Rules, Resources and Expertise; 2.3 Outlook: A Strategy for the Digital Age; References; 3: Data Protection Empowerment; 3.1 Code Is Law; 3.2 Empowerment; 3.3 Information Technology and Social Values; References. 4: Red Teaming and Wargaming: How Can Management and Supervisory Board Members Become More Involved in Cybersecurity?4.1 Cybersecurity: A Management Board Issue; 4.2 Integrating the Management Board into Existing Cybersecurity Strategies; 4.3 Red Teaming and Wargaming; 4.3.1 Red Teaming Defined; 4.3.2 Wargaming Defined; 4.3.3 Differences Compared with Methods Currently in Use; 4.4 Use of Red Teaming in Combination with Wargaming at Companies; 4.4.1 Classification; 4.4.2 Definition of a Target; 4.4.3 Composition of the Teams; 4.4.4 Analysis: Data Collection and Evaluation; 4.4.5 Wargaming. 4.4.6 Report4.5 Conclusion; References; 5: The Law and Its Contribution to IT Security: Legal Framework, Requirements, Limits; 5.1 Key Features of the Existing Legal Framework; 5.1.1 IT Compliance: A Challenge for Management Boards and Executives; 5.1.1.1 The Cornerstone of IT Compliance: IT Security; 5.1.1.2 Liability of the Management Board and Executives; 5.1.2 Who Is Responsible?; 5.1.2.1 Requirements for Software Manufacturers; 5.1.2.2 Requirements for Network and Platform Operators; 5.1.2.3 Legal Framework for Providers of IT Services. 5.1.3 Regulation on Determining Critical Infrastructure5.1.4 Controversial: Changes Affecting Telemedia Services; 5.2 International Issues: The European Unionś Directive on Security of Network and Information Systems (NIS Directive); 5.3 Data Protection and Data Security in the United States; 5.4 Data Exchange Between EU and US Companies; 5.4.1 Safe Harbor; 5.4.2 Privacy Shield; 5.5 Conclusion: Many Legal Issues to Consider; References; 6: IT Security: Stronger Together; 6.1 The Trinity of IT Security; 6.2 CSSA -- Security Through Collaboration; 6.2.1 Targeted Interaction. … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2017
- Extent:
- 1 online resource
- Subjects:
- 005.8
Business
Internet -- Security measures -- Social aspects
Computer networks -- Security measures
COMPUTERS -- Security -- Networking
Computer networks -- Security measures
Business and Management
Business IT Infrastructure
Innovation/Technology Management
Management of Computing and Information Systems
Systems and Data Security
Business & Economics -- Production & Operations Management
Business & Economics -- Information Management
Computers -- Security -- General
Research & development management
Information architecture
Computer security
Management science
Management information systems
Management
Information Systems
Computer security
Computers -- Enterprise Applications -- General
Business mathematics & systems
Electronic books - Languages:
- English
- ISBNs:
- 9783319465296
3319465295 - Related ISBNs:
- 9783319465289
3319465287 - Notes:
- Note: Includes bibliographical references.
Note: Online resource, title from PDF title page (EBSCO, viewed May 28, 2017). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.373266
- Ingest File:
- 02_354.xml