Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036

Combatting Cyber Terrorism: A guide to understanding the cyber threat landscape and incident response planning

Længde
6T 17M
Sprog
Engelsk
Format
Kategori

Fakta

In his second book with IT Governance Publishing, Richard Bingley's Combatting Cyber Terrorism – A guide to understanding the cyber threat landscape and incident response planning analyses the evolution of cyber terrorism and what organisations can do to mitigate this threat. This book discusses:

- Definitions of cyber terrorism; - Ideologies and idealisations that can lead to cyber terrorism; - How threat actors use computer systems to diversify, complicate and increase terrorist attack impacts; - The role of Big Tech and social media organisations such as X (formerly Twitter) and Instagram within the cyber threat landscape; and - How organisations can prepare for acts of cyber terrorism via security planning and incident response strategies such as ISO 31000, ISO 27001 and the NIST Cybersecurity Framework.Increasingly, cyber security practitioners are confronted with a stark phrase: cyber terrorism. For many, it conveys fear and hopelessness. What is this thing called 'cyber terrorism' and what can we begin to do about it? Malicious-minded ICT users, programmers and even programs (including much AI-powered software) have all been instrumental in recruiting, inspiring, training, executing and amplifying acts of terrorism. This has resulted in the loss of life and/or life-changing physical injuries that could never have occurred without support and facilitation from the cyber sphere. These types of attacks can be encapsulated by the phrase 'cyber terrorism'. This book recounts case studies to show the types of threats we face and provides a comprehensive coverage of risk management tactics and strategies to protect yourself against such nefarious threat actors. These include key mitigation and controls for information security or security and HR-related professionals.

© 2024 IT Governance Publishing Ltd (Lydbog): 9781787785229

Release date

Lydbog: 25. oktober 2024

Tags

    Andre kan også lide...

    1. Inside Cyber Warfare: Mapping the Cyber Underworld (3rd Edition) Jeffrey Caruso
    2. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
    3. Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
    4. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
    5. Cybersecurity For Dummies Joseph Steinberg
    6. Biggest Cyber Crimes in the History Introbooks Team
    7. Liars and Outliers: Enabling the Trust that Society Needs to Thrive Bruce Schneier
    8. A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Bruce Schneier
    9. Navigating Cybersecurity: Defending Against Cyber Threats: Strategies for a Secure Online Environment Olivia Larson
    10. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Bruce Schneier
    11. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
    12. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
    13. Ransom War: How Cyber Crime Became a Threat to National Security Max Smeets
    14. Cybercrime Investigators Handbook Graeme Edwards
    15. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
    16. Cyberdeterrence and Cyberwar Martin C. Libicki
    17. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
    18. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    19. The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Mathieu Gorge
    20. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
    21. Cybersecutity First Principles Rick Howard
    22. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    23. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
    24. Ethical Hacking Introbooks Team
    25. The Promise of Cybersecurity: From Prevention to Response: Building a Fortified Cyber Environment Olivia Martinez
    26. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
    27. Cyber Sentinel: Bulletproofing Your Digital Defenses: Protecting Your Online Presence from Cyber Threats Rachel Evans
    28. Social Engineering for Beginners: Manipulating Minds, Securing Systems Brandon Scott
    29. Defensive Security Handbook: Best Practices for Securing Infrastructure (2nd Edition) Amanda Berlin
    30. If It's Smart, It's Vulnerable Mikko Hypponen
    31. The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Perry Carpenter
    32. Cyber Security for Beginners: Safeguarding Your Cyber Space Daniel Green
    33. Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing Roger A. Grimes
    34. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
    35. Project Zero Trust: A Story about a Strategy for Aligning Security and the Business George Finney
    36. People Hacker Jenny Radcliffe
    37. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
    38. Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Ray A. Rothrock
    39. Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Eric Cole
    40. The Future of Cybersecurity: Guarding the Digital Frontier: Strategies, Tools, and Best Practices Emily Foster
    41. The Wires of War: Technology and the Global Struggle for Power Jacob Helberg
    42. Cyber Security for Decision Makers Jarno Limnéll
    43. Cyber Security: Learn All the Essentials and Basic Ways to Avoid Cyber Risk for Your Business. Cyber Security Guide for Beginners (2021 Edition) Cole Peters
    44. Pegasus: The Story of the World's Most Dangerous Spyware Laurent Richard

    Vælg dit abonnement

    • Over 600.000 titler

    • Download og nyd titler offline

    • Eksklusive titler + Mofibo Originals

    • Børnevenligt miljø (Kids Mode)

    • Det er nemt at opsige når som helst

    Flex

    For dig som vil prøve Mofibo.

    89 kr. /måned
    • 1 konto

    • 20 timer/måned

    • Gem op til 100 ubrugte timer

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Prøv gratis
    Den mest populære

    Premium

    For dig som lytter og læser ofte.

    129 kr. /måned
    • 1 konto

    • 100 timer/måned

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Start tilbuddet

    Unlimited

    For dig som lytter og læser ubegrænset.

    149 kr. /måned
    • 1 konto

    • Ubegrænset adgang

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Start tilbuddet

    Family

    For dig som ønsker at dele historier med familien.

    Fra 179 kr. /måned
    • 2-6 konti

    • 100 timer/måned pr. konto

    • Fri lytning til podcasts

    • Kun 39 kr. pr. ekstra konto

    • Ingen binding

    2 konti

    179 kr. /måned
    Prøv gratis