Cyber security : law and guidance /: law and guidance. (2018)
- Record Type:
- Book
- Title:
- Cyber security : law and guidance /: law and guidance. (2018)
- Main Title:
- Cyber security : law and guidance
- Further Information:
- Note: [editor], Helen Wong MBE.
- Editors:
- Tse, Helen, 1977-
- Other Names:
- Bloomsbury Professional (Firm), publisher.
- Contents:
- Chapter 1. Threats - Melanie Oldham and Abigail McAlpine (with "Script Kiddies" by Gary Broadfield)Chapter 2. Vulnerabilities - Melanie Oldham and Abigail McAlpineChapter 3. The Law - Ria Halme (with "Territorial Scope" by Gary Broadfield)Chapter 4. How to Defend - Graeme BatsmanChapter 5. Privacy and Security in The Workplace - Ria HalmeChapter 6. Security in The Built Environment - Nathan JonesChapter 7. The Importance of Policy and Guidance in Digital Communications - Ben SilverstoneChapter 8. The C Suite Perspective on Cyber Risk - Klaus JulischChapter 9. Corporate Governance Mind Map - Andrew ConstantineChapter 10. Industry Specialists In-Depth Reports- Mobile Payments - Rhiannon Lewis- Electric Utilities: Critical Infrastructure Protection and Reliability - E. Rudina and S. Kort- Manufactuting - Filippo Mauri- Think Money Group and UK Financial Services - Steven Peacock- Towards Ennergy 4.0 - Stefano Bracco- Aerospace, Defence and Security Sector - Simon Goldsmith- Banking - in the Emirates - Yazid Khandhadia- Healthcare - Helen Wong MBE- Medical Devices - Helen Wong MBEChapter 11. Social Media and Cyber Security - Susan HallChapter 12. International Law and Interaction Between States - Dr Benjamin AngChapter 13. Security Concerns with The Internet of Things - Kevin CurranChapter 14. Managing Cyber-Security in An International Financial Institution - Cosimo PaccianiChapter 15. Employee Liability and Protection - Sally PenniChapter 16. Data Security – The New Oil - RyanChapter 1. Threats - Melanie Oldham and Abigail McAlpine (with "Script Kiddies" by Gary Broadfield)Chapter 2. Vulnerabilities - Melanie Oldham and Abigail McAlpineChapter 3. The Law - Ria Halme (with "Territorial Scope" by Gary Broadfield)Chapter 4. How to Defend - Graeme BatsmanChapter 5. Privacy and Security in The Workplace - Ria HalmeChapter 6. Security in The Built Environment - Nathan JonesChapter 7. The Importance of Policy and Guidance in Digital Communications - Ben SilverstoneChapter 8. The C Suite Perspective on Cyber Risk - Klaus JulischChapter 9. Corporate Governance Mind Map - Andrew ConstantineChapter 10. Industry Specialists In-Depth Reports- Mobile Payments - Rhiannon Lewis- Electric Utilities: Critical Infrastructure Protection and Reliability - E. Rudina and S. Kort- Manufactuting - Filippo Mauri- Think Money Group and UK Financial Services - Steven Peacock- Towards Ennergy 4.0 - Stefano Bracco- Aerospace, Defence and Security Sector - Simon Goldsmith- Banking - in the Emirates - Yazid Khandhadia- Healthcare - Helen Wong MBE- Medical Devices - Helen Wong MBEChapter 11. Social Media and Cyber Security - Susan HallChapter 12. International Law and Interaction Between States - Dr Benjamin AngChapter 13. Security Concerns with The Internet of Things - Kevin CurranChapter 14. Managing Cyber-Security in An International Financial Institution - Cosimo PaccianiChapter 15. Employee Liability and Protection - Sally PenniChapter 16. Data Security – The New Oil - Ryan MackieChapter 17. Data Classification - Reza AlviChapter 18. Liability Following A Data Breach - Mark DeemChapter 19. Criminal Law - Jill Lorimer and William ChristopherChapter 20. The Digital Next Way - Mark BlackhurstChapter 21. Intelligence and The Monitoring of Everyday Life - Dr Victoria Wang and Professor John V. TuckerChapter 22. Collaboration: Results? - David ClarkeChapter 23. Cybersecurity: The Cause and The Cure - Kevin MurphyChapter 24. Mergers and Acquisitions Corporate Due Diligence and Cyber Security Issues - Vijay RathourChapter 25. Protecting Organisations - Gary HibberdChapter 26. Public Private Partnerships - E. RudinaChapter 27. Behavioural Science in Cyber Security - Leron ZinatullinChapter 28. Agile Cyber Security Process Capability - Lanre RotimiChapter 29. Cyber Secret, Life Secrets – On the Verge of Human Science - Arthue KeletiChapter 30. A Plan for the SME - William McBorroughChapter 31. Conclusion - Helen Wong MBEAppendix 1 Theresa May Speech, Munich Security Conference, February 2018Appendix 2 Cyber-Security Lexicon for Converged SystemsAppendix 3 The Government's National ResponseAppendix 4 Sample Legal Documents. … (more)
- Publisher Details:
- London : Bloomsbury Professional
- Publication Date:
- 2018
- Extent:
- 1 online resource (352 pages)
- Subjects:
- 005.8
Computer security
Computer security -- Law and legislation - Languages:
- English
- ISBNs:
- 9781526505873
1526505878 - Related ISBNs:
- 9781526505866
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.505171
- Ingest File:
- 03_079.xml