Cyber Resilience Defence-In-depth Principles

This book will give you a good understanding of the fundamentals of cyber security and resilience, without tying them to specific standards, frameworks or solutions, and provide an excellent starting point for any cyber resilience implementation project

Bibliographic Details
Main Author: Calder, Alan
Format: eBook
Language:English
Published: Ely IT Governance Ltd 2023
Edition:First edition
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 03261nmm a2200529 u 4500
001 EB002174833
003 EBX01000000000000001312610
005 00000000000000.0
007 cr|||||||||||||||||||||
008 230908 ||| eng
020 |a 9781787784390 
020 |a 9781787784406 
020 |a 9781787784413 
020 |a 1787784398 
020 |a 1787784401 
050 4 |a QA76.9.A25 
100 1 |a Calder, Alan 
245 0 0 |a Cyber Resilience  |h [electronic resource]  |b Defence-In-depth Principles  |c Alan Calder 
250 |a First edition 
260 |a Ely  |b IT Governance Ltd  |c 2023 
300 |a 142 p. 
505 0 |a Chapter 25: Supply chain security -- Chapter 26: System security -- Chapter 27: Vulnerability scanning and penetration testing -- GRC International Group PLC resources 
505 0 |a Cover -- Title -- Copyright -- About the Author -- Acknowledgments -- Contents -- Introduction -- Part 1: Security principles -- Chapter 1: The cyber threat landscape -- Chapter 2: Legal and contractual requirements -- Chapter 3: Key terms and concepts -- Chapter 4: Managing the risks -- Chapter 5: Three security pillars -- Chapter 6: Layers of defence in depth -- Chapter 7: Mapping the layers against the Part 2 reference controls -- Chapter 8: Implementation tips -- Part 2: Reference controls -- Chapter 9: Asset management -- Chapter 10: Board-level commitment and involvement 
505 0 |a Chapter 11: Business continuity management -- Chapter 12: Configuration and patch management -- Chapter 13: Continual improvement process -- Chapter 14: Encryption -- Chapter 15: External certification/validation -- Chapter 16: Identity and access control -- Chapter 17: Incident response management -- Chapter 18: Internal audits -- Chapter 19: Malware protection -- Chapter 20: Network and communications security -- Chapter 21: Physical and environmental security -- Chapter 22: Security monitoring -- Chapter 23: Security policies -- Chapter 24: Staff training and awareness 
653 |a Business enterprises / Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh95010367 
653 |a Computer security / Handbooks, manuals, etc 
653 |a Computer security / fast / (OCoLC)fst00872484 
653 |a Business enterprises / Computer networks / Security measures / fast / (OCoLC)fst00842535 
653 |a Sécurité informatique / Guides, manuels, etc 
653 |a COMPUTERS / Security / General / bisacsh 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
500 |a Description based upon print version of record 
015 |a GBC3I1290 
776 |z 1787784401 
776 |z 9781787784390 
776 |z 1787784398 
776 |z 178778441X 
776 |z 9781787784383 
776 |z 9781787784406 
776 |z 9781787784413 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781787784406/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 005.8 
082 0 |a 338 
082 0 |a 330 
520 |a This book will give you a good understanding of the fundamentals of cyber security and resilience, without tying them to specific standards, frameworks or solutions, and provide an excellent starting point for any cyber resilience implementation project