Transnational organized crime and gangs : intervention, prevention, and suppression of cyber-security /: intervention, prevention, and suppression of cyber-security. (2020)
- Record Type:
- Book
- Title:
- Transnational organized crime and gangs : intervention, prevention, and suppression of cyber-security /: intervention, prevention, and suppression of cyber-security. (2020)
- Main Title:
- Transnational organized crime and gangs : intervention, prevention, and suppression of cyber-security
- Further Information:
- Note: Robert Matthew Brzenchek.
- Authors:
- Brzenchek, Robert Matthew
- Contents:
- <span style="font-weight:bold;">Chapter 1: Introduction ; Problem Purpose Theory Concepts <span style="font-weight:bold;">Review Questions: ; What is the root problem? What is the Plan Do Check Act theory? Are gangs in nations like Russia or China that can be particularly resourceful and dangerous &ndash; secretly sponsoring hackers&rsquo; efforts and protecting them from international law enforcement? ; <span style="font-weight:bold;">Chapter 2: Prevention ; Environment Education Socio-Economics Summary <span style="font-weight:bold;">Review Questions: ; Does compliance with standards and laws protect a business and executives from liability? What education is appropriate to prepare a cyber professional for today&rsquo;s cyber threats? What is the estimated economic loss from cyber crime annually? ; <span style="font-weight:bold;">Chapter 3: Historical First-Person Accounts ; Washington DC metro Houston, TX New York City metro Summary <span style="font-weight:bold;">Review Questions: ; What are your thoughts and impressions on the first person accounts? What takeaways can you apply to your current or future cyber career? Can you be as flexible to move around the country/world to complete training/work? ; <span style="font-weight:bold;">Chapter 4: Intervention ; Purpose of ISO 27001/Cybersecurity Measures Theory of ISO 27001/Cybersecurity Measures Concepts of ISO 27001/Cybersecurity Measures Integrating ISO 27001/Cybersecurity Measures <span style="font-weight:bold;">Review<span style="font-weight:bold;">Chapter 1: Introduction ; Problem Purpose Theory Concepts <span style="font-weight:bold;">Review Questions: ; What is the root problem? What is the Plan Do Check Act theory? Are gangs in nations like Russia or China that can be particularly resourceful and dangerous &ndash; secretly sponsoring hackers&rsquo; efforts and protecting them from international law enforcement? ; <span style="font-weight:bold;">Chapter 2: Prevention ; Environment Education Socio-Economics Summary <span style="font-weight:bold;">Review Questions: ; Does compliance with standards and laws protect a business and executives from liability? What education is appropriate to prepare a cyber professional for today&rsquo;s cyber threats? What is the estimated economic loss from cyber crime annually? ; <span style="font-weight:bold;">Chapter 3: Historical First-Person Accounts ; Washington DC metro Houston, TX New York City metro Summary <span style="font-weight:bold;">Review Questions: ; What are your thoughts and impressions on the first person accounts? What takeaways can you apply to your current or future cyber career? Can you be as flexible to move around the country/world to complete training/work? ; <span style="font-weight:bold;">Chapter 4: Intervention ; Purpose of ISO 27001/Cybersecurity Measures Theory of ISO 27001/Cybersecurity Measures Concepts of ISO 27001/Cybersecurity Measures Integrating ISO 27001/Cybersecurity Measures <span style="font-weight:bold;">Review Questions: ; What is an ISMS? What is ISO 27001? How do you integrate the ISO 27001 cradle to grave? ; <span style="font-weight:bold;">Chapter 5: Suppression ; Problem Purpose Concepts Operationalization Summary <span style="font-weight:bold;">Review Questions: ; Do you think the newly created DHS National Risk Management Center will assist in implementing cybersecurity measures for financial services, telecommunications, and energy sectors? Are laws/measures such as Data Protection Law, NYS Cyber Security Law 18, Federal law, Including the Federal Information Security Management Act (FISMA), NIST 800-171, HIPAA, and GDPR enough for cyber professionals to protect our infrastructure? Are people, processes, and technologies vulnerabilities in cyber security? ; <span style="font-weight:bold;">Chapter 6: Findings and Conclusions ; Recommendations <span style="font-weight:bold;">Review Questions: ; What are your recommendations for America to bolster cyber security defenses? Do you think our current cyber security measures adequate? What are your next steps to share your knowledge obtained from this book? … (more)
- Publisher Details:
- Lanham : Rowman & Littlefield Publishers
- Publication Date:
- 2020
- Extent:
- 1 online resource, illustrations (black and white)
- Subjects:
- 364.106
Transnational crime
Organized crime -- Technological innovations
Transnational crime -- Prevention -- International cooperation
Computer security - Languages:
- English
- ISBNs:
- 9781538128190
- Related ISBNs:
- 9781538128183
9781538142783 - Notes:
- Note: Includes bibliographical references and index.
Note: Description based on CIP data; resource not viewed. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.534731
- Ingest File:
- 03_135.xml