Cyber-attacks have increased exponentially, making this book essential in areas such as Business Management, Business Continuity and Disaster Recovery, Risk Management, Compliance, and IT. Dr. Michael C. Redmond, PhD takes a complicated subject and breaks it down into plain English, allowing you to understand and absorb the information easily. Unlike other books where you think you’ve learned the information provided, this book’s chapter tests, along with the answer key at the end, ensure your understanding is complete.
|Product dimensions:||5.00(w) x 8.00(h) x 0.22(d)|
Table of ContentsABOUT THE AUTHOR
CHAPTER 1: CYBER SECURITY STANDARDS
Payment Card Industry Data Security Standard (PCI DSS)
CHAPTER 2: WHAT'S IN PLACE
Key Questions to Ask
When There is a Plan
Chart to Assist in Determining What is in Place
CHAPTER 3: RISKS AND MITIGATIONS
Why have cyber security?
What are the risks?
Cyber Terrorism or Cyber-Attack?
Physical Security Is an Important Part of Cyber Security
Spyware and Viruses
CHAPTER 4: IMPACTS AND PREPARATION
Preparations Before an Event or Incident
Cyber Security Incident Response (CSIRT)
CHAPTER 5: THE ATTACK
Cyber-attacker attacks can take the form of
What Can Be Done?
Implement at a minimum
Process for Cyber Security
Goals and Motivation
Cyber Attack Tools
CHAPTER 6: PROTECTION
Protecting the Data Center
Four Types IDS/IPS
Security Information and Event Management
CHAPTER 7: SELF-ASSESSMENT TESTS
CHAPTER 8: SELF-ASSESSMENT TESTS (ANSWERS)
CONTACT THE AUTHOR
CONTINUING YOUR CYBER SECURITY EDUCATION