Strategic cyber security management. (2022)
- Record Type:
- Book
- Title:
- Strategic cyber security management. (2022)
- Main Title:
- Strategic cyber security management
- Further Information:
- Note: Peter Trim, Yang-Im Lee.
- Authors:
- Trim, Peter R. J
Lee, Yang-Im - Contents:
- Contents About the Authors Preface Chapter 1 An Introduction to Strategic Cyber Security Management Introduction Placing the Book in Context Adding to Management Knowledge Promoting a Collectivist and Stakeholder Approach to Cyber Security The Topics Covered The Aims of the Book The Objectives of the Book Learning Outcomes of the Book Conclusion Chapter 2 Strategic Cyber Security Management and the Stakeholder Approach 2.1 Introduction 2.2 Learning Objectives 2.3 Placing Cyber Security in Context 2.4 The Need for a Collectivist Approach to Cyber Security 2.5 Insights into Organizational Interdependencies and Security 2.6 Establishing Trust Base Relationships 2.7 Learning Summary 2.8 Conclusion 2.9 Mini Case: Lost and Found 2.10 Extended Case: Technological Change, Society and the Role of Government 2.11 References 2.12 Further Reading 2.13 Bank of Questions Chapter 3 Bridging the Government, Industry and Society Divide 3.1 Introduction 3.2 Learning Objectives 3.3 A Collectivist Oriented Cyber Security Stakeholder Framework 3.4 Establishing a Cyber Security Policy and Strategy Framework 3.4.1 Analysis of the Attacks on a Computer System 3.4.2 Analysis of the Critical Friendship Groups 3.5 The Relationships Between an Organization and the Known Influential Cyber Security Stakeholders 3.6 Learning Summary 3.7 Conclusion 3.8 Mini Case: Trust and the Community 3.9 Extended Case: Scammers, Internet Providers and Law Enforcement 3.10 References 3.11 Further Reading 3.12 Bank ofContents About the Authors Preface Chapter 1 An Introduction to Strategic Cyber Security Management Introduction Placing the Book in Context Adding to Management Knowledge Promoting a Collectivist and Stakeholder Approach to Cyber Security The Topics Covered The Aims of the Book The Objectives of the Book Learning Outcomes of the Book Conclusion Chapter 2 Strategic Cyber Security Management and the Stakeholder Approach 2.1 Introduction 2.2 Learning Objectives 2.3 Placing Cyber Security in Context 2.4 The Need for a Collectivist Approach to Cyber Security 2.5 Insights into Organizational Interdependencies and Security 2.6 Establishing Trust Base Relationships 2.7 Learning Summary 2.8 Conclusion 2.9 Mini Case: Lost and Found 2.10 Extended Case: Technological Change, Society and the Role of Government 2.11 References 2.12 Further Reading 2.13 Bank of Questions Chapter 3 Bridging the Government, Industry and Society Divide 3.1 Introduction 3.2 Learning Objectives 3.3 A Collectivist Oriented Cyber Security Stakeholder Framework 3.4 Establishing a Cyber Security Policy and Strategy Framework 3.4.1 Analysis of the Attacks on a Computer System 3.4.2 Analysis of the Critical Friendship Groups 3.5 The Relationships Between an Organization and the Known Influential Cyber Security Stakeholders 3.6 Learning Summary 3.7 Conclusion 3.8 Mini Case: Trust and the Community 3.9 Extended Case: Scammers, Internet Providers and Law Enforcement 3.10 References 3.11 Further Reading 3.12 Bank of Questions Chapter 4 Strategic Cyber Security Management and Strategic Intelligence 4.1 Introduction 4.2 Learning Objectives 4.3 Critical Information Infrastructure Protection 4.4 Strategic SLEPT Analysis 4.5 Protecting Critical Information Infrastructure Against Cyber Attacks 4.6 Effective Counter Threat Policy and Strategy 4.7 The Learning Organization and Organizational Learning 4.8 A Defined Organization Security Culture 4.8.1 Teamwork and Agency Theory 4.8.2 Organizational Learning and Cooperation 4.9 Learning Summary 4.10 Conclusion 4.11 Mini Case: Power Outages 4.12 Extended Case: Strategic Cyber Intelligence 4.13 References 4.14 Further Reading 4.15 Bank of Questions Chapter 5 Threat Identification and Risk Assessment 5.1 Introduction 5.2 Learning Objectives 5.3 Different Types of Cyber Attack 5.4 Threat Analysis and Strategic Risk Assessment Frameworks 5.5 Risk Assessment Policy and its Strategic Context 5.6 Cyber Security SWOT and SLEPT Analysis 5.7 Cyber Security Threats 5.8 Enterprise Risk Management (ERM) 5.9 Building Trust Based Relationships 5.10 Learning Summary 5.11 Conclusion 5.12 Mini Case: Fake News and How to Deal with it 5.13 Extended Case: The Role of the Chief Information Officer (CIO) 5.14 References 5.15 Further Reading 5.16 Bank of Questions Chapter 6 Governance and Compliance Decision Making 6.1 Introduction 6.2 Learning Objectives 6.3 Placing Corporate Governance in Context 6.4 The Human Dimension 6.5 Information Security Governance 6.6 Learning from the Past 6.7 Learning Summary 6.8 Conclusion 6.9 Mini Case: Cyber Security Governance 6.10 Extended case: Ensuring that Staff are Compliant 6.11 References 6.12 Further Reading 6.13 Bank of Questions Chapter 7 Business Continuity Management 7.1 Introduction 7.2 Learning Objectives 7.3 Business Continuity Management 7.4 Dependency Modelling 7.5 IT (Information Technology), Risk Management and Business Continuity 7.6 Intelligence, Strategic Purchasing and Supply Chain Management 7.7 A Business Continuity Management Planning Framework 7.8 Education and Training 7.9 Learning Summary 7.10 Conclusion 7.11 Mini Case: Blockchain Technology and Business Continuity 7.12 Extended Case: Ensuring that People are Aware of Cyber Security Issues and Challenges 7.13 References 7.14 Further Reading 7.15 Bank of Questions Chapter 8 Resilience Policy and Planning 8.1 Introduction 8.2 Learning Objectives 8.3 Risk and Resilience Defined 8.4 The Need for Resilience 8.5 Resilience Policy 8.6 Promoting Resilience 8.7 Resilience Domains and Features 8.8 Security Awareness and Organizational learning 8.9 Formulating a Resilience Policy 8.10 Learning Summary 8.11 Conclusion 8.12 Mini Case: Dealing with Ransomware 8.13 Extended Case: Biometrics - a Solution for all 8.14 References 8.15 Further Reading 8.16 Bank of Questions Chapter 9 Integrated Security and a Risk Management Communication Strategy 9.1 Introduction 9.2 Learning Objectives 9.3 Integrated Security Concept 9.4 Consumerization of IT 9.5 Culture and Communication 9.6 Reflecting on the Virtues of Business Continuity Management Planning 9.7 Risk Management Communication Strategy 9.8 Learning Summary 9.9 Conclusion 9.10 Mini Case: The Case of the Insider 9.11 Extended Case: The Cyber Security Manager and Risk Communication 9.12 References 9.13 Further Reading 9.14 Bank of Questions Chapter 10 Organizational Learning, Managing Change and Security Culture 10.1 Introduction 10.2 Learning objectives 10.3 Training, Staff Development and Strategy Implementation 10.4 The Learning Organization Concept and Organizational Learning 10.5 Changing Organizational Attitudes and Mindsets 10.6 An Effective Counter Threat Policy and Strategy 10.7 Strategic Cyber Security Framework 10.8 Learning Summary 10.9 Conclusion 10.10 Mini Case: Establishing a Cyber Security Culture 10.11 Extended Case: Opportunities in Retailing – Avoiding the Pitfalls 10.12 References 10.13 Further Reading 10.14 Bank of Questions Chapter 11 Cyber Security Management 11.1 Introduction 11.2 Learning Objectives 11.3 Cyber Security in Context 11.4 Security in a Broad Context 11.5 Learning Summary 11.6 Conclusion 11.7 Mini Case: All Together Now 11.8 Extended Case: Unexpected Threats 11.9 References 11.10 Further Reading 11.11 Bank of Questions Chapter 12 A Cyber Security Awareness Programme 12.1 Introduction 12.2 Learning Objectives 12.3 Establishing a Collectivist Approach to Cyber Security 12.4 The Communication of Risk 12.5 Communication, Trustworthy Behaviour and Cultural Differences 12.6 Preventing Cyber Attacks 12.7 Cyber Security Awareness 12.7.1 Motivation and Communication 12.7.2 An Approach to Behavioural Change 12.8 Learning summary 12.9 Conclusion 12.10 … (more)
- Edition:
- 1st
- Publisher Details:
- London : Routledge
- Publication Date:
- 2022
- Extent:
- 1 online resource, illustrations (black and white)
- Subjects:
- 658.478
Business enterprises -- Computer networks -- Security measures
Computer security
Computer crimes -- Prevention
Corporations -- Security measures - Languages:
- English
- ISBNs:
- 9781000636390
9781000636338
9781003244295 - Related ISBNs:
- 9781032154756
9781032154763 - Notes:
- Note: Includes bibliographical references and index.
Note: Description based on CIP data; resource not viewed. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.702247
- Ingest File:
- 13_018.xml