Cybersecurity Best Practices : Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden /: Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden. ([2018])
- Record Type:
- Book
- Title:
- Cybersecurity Best Practices : Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden /: Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden. ([2018])
- Main Title:
- Cybersecurity Best Practices : Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden
- Further Information:
- Note: Michael Bartsch, Stefanie Frey, Hrsg.
- Editors:
- Bartsch, Michael
Frey, Stefanie, 1971- - Contents:
- Intro; Geleitwort; Cyber: Risks and Economic Opportunities for Geneva; Geleitwort; Politische Strategien zur Bekämpfung der Cyber-Kriminalität - Eine Zukunftsaufgabe; Vorwort der Herausgeber; Was liefert dieses Buch?; Aufbau des Buches; An wen richtet sich das Buch?; Preface by the Publishers; What This Book Provides; Structure of the Book; Target Groups; Danksagung; Inhaltsverzeichnis; Über die Autoren; 1: How to Eliminate the Prevailing Ignorance and Complacency Around Cybersecurity; 1.1 The Challenges of the Twenty First Century; 1.2 Current Situation; 1.2.1 We Have Not Had a Cyber 9/11 1.2.2 Complexity1.3 Conclusion; References; Teil I: Beispiele aus der Praxis; 2: Angriff aus der Dunkelheit: Cyberattacke auf das Lukaskrankenhaus Neuss; Literatur; Literaturverzeichnis; 3: Audrey and Reto Gfeller People Like You and Me; 3.1 The Storyline; 3.2 Emails Received After the Alleged Purchase; 3.3 Continuation of Events After Returning from Vacation; 3.4 The End; 3.5 List of All Bought Items; Teil II: Staaten und Behörden; States and Authorities; 4: Vorworte; 4.1 Integrierte Wertschöpfungskette der Cyber-Sicherheit; 4.2 Cyber Security Is a Shared Responsibility; References 5: ENISA's Contribution to National Cyber Security Strategies5.1 Introduction; 5.2 A Resilient National Strategy; 5.2.1 Member State's Objectives; 5.2.1.1 Objective 1: Develop National Cyber Contingency Plans; 5.2.1.2 Objective 2: Protect Critical Information Infrastructure; 5.2.2 Objective 3: OrganizeIntro; Geleitwort; Cyber: Risks and Economic Opportunities for Geneva; Geleitwort; Politische Strategien zur Bekämpfung der Cyber-Kriminalität - Eine Zukunftsaufgabe; Vorwort der Herausgeber; Was liefert dieses Buch?; Aufbau des Buches; An wen richtet sich das Buch?; Preface by the Publishers; What This Book Provides; Structure of the Book; Target Groups; Danksagung; Inhaltsverzeichnis; Über die Autoren; 1: How to Eliminate the Prevailing Ignorance and Complacency Around Cybersecurity; 1.1 The Challenges of the Twenty First Century; 1.2 Current Situation; 1.2.1 We Have Not Had a Cyber 9/11 1.2.2 Complexity1.3 Conclusion; References; Teil I: Beispiele aus der Praxis; 2: Angriff aus der Dunkelheit: Cyberattacke auf das Lukaskrankenhaus Neuss; Literatur; Literaturverzeichnis; 3: Audrey and Reto Gfeller People Like You and Me; 3.1 The Storyline; 3.2 Emails Received After the Alleged Purchase; 3.3 Continuation of Events After Returning from Vacation; 3.4 The End; 3.5 List of All Bought Items; Teil II: Staaten und Behörden; States and Authorities; 4: Vorworte; 4.1 Integrierte Wertschöpfungskette der Cyber-Sicherheit; 4.2 Cyber Security Is a Shared Responsibility; References 5: ENISA's Contribution to National Cyber Security Strategies5.1 Introduction; 5.2 A Resilient National Strategy; 5.2.1 Member State's Objectives; 5.2.1.1 Objective 1: Develop National Cyber Contingency Plans; 5.2.1.2 Objective 2: Protect Critical Information Infrastructure; 5.2.2 Objective 3: Organize Cybersecurity Exercises; 5.2.3 Objective 4: Establish Baseline Security Measures; 5.2.4 Objective 5: Establish Incident Reporting Mechanisms; 5.2.5 Objective 6: Raise User Awareness; 5.2.6 Objective 7: Strengthen Training and Educational Programs 5.2.7 Objective 8: Establishment of Incident Response Capability5.2.8 Objective 9: Address Cyber Crime; 5.2.9 Objective 10: Engage in International Cooperation; 5.2.10 Objective 11: Establish a Public-Private Partnership; 5.2.10.1 Objective 12: Balance Security with Privacy and Data Protection; 5.2.11 Objective 13: Institutionalize Cooperation Between Public Agencies; 5.2.11.1 Objective 14: Foster Research and Development (R&D) in Cybersecurity; 5.2.11.2 Objective 15: Provide Incentives for the Private Sector to Invest in Security Measures; 5.3 Governance Structures in the EU 5.3.1 Centralized Approach5.3.2 Decentralized Approach; 5.3.3 Co-regulation with the Private Sector; 5.4 Challenges; 5.5 ENISA's Contribution to NCSS; 5.6 The Next Steps for NCSS; 5.7 Conclusions; References; 6: Die Allianz für Cyber-Sicherheit: Netzwerke schützen Netzwerke; 6.1 Warum eine Allianz für Cyber-Sicherheit?; 6.2 Die Allianz für Cyber-Sicherheit; 6.3 Struktur der Allianz für Cyber-Sicherheit; 6.3.1 Die Teilnehmer; 6.3.2 Partner; 6.3.3 Multiplikatoren; 6.4 Die Angebote der Allianz für Cyber-Sicherheit; 6.4.1 Informationspool; 6.4.2 Erfahrungsaustausch; 6.4.3 Praxis … (more)
- Publisher Details:
- Wiesbaden, Germany : Springer Vieweg
- Publication Date:
- 2018
- Extent:
- 1 online resource
- Subjects:
- 005.8
Computer security
COMPUTERS / Security / General
COMPUTERS / Networking / Security
COMPUTERS / Security / Online Safety & Privacy
Computer security
Electronic books - Languages:
- German
- ISBNs:
- 9783658216559
3658216557 - Related ISBNs:
- 9783658216542
3658216549 - Notes:
- Note: Includes bibliographical references and index.
Note: Online resource; title from PDF title page (EBSCO, viewed July 26, 2018). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.400051
- Ingest File:
- 02_433.xml