| 000 | 05453nam a22007815i 4500 | ||
|---|---|---|---|
| 001 | 305976 | ||
| 003 | IT-RoAPU | ||
| 005 | 20250106151645.0 | ||
| 006 | m|||||o||d|||||||| | ||
| 007 | cr || |||||||| | ||
| 008 | 241120t20242024gw fo d z eng d | ||
| 020 |
_a9783111286013 _qprint |
||
| 020 |
_a9783111289601 _qEPUB |
||
| 020 |
_a9783111289069 _qPDF |
||
| 024 | 7 |
_a10.1515/9783111289069 _2doi |
|
| 035 | _a(DE-B1597)9783111289069 | ||
| 035 | _a(DE-B1597)652208 | ||
| 035 | _a(OCoLC)1453643970 | ||
| 040 |
_aDE-B1597 _beng _cDE-B1597 _erda |
||
| 072 | 7 |
_aCOM053000 _2bisacsh |
|
| 082 | 0 | 4 | _a005.8 |
| 084 | _aonline - DeGruyter | ||
| 245 | 0 | 0 |
_aDevelopments in Managing and Exploiting Risk. _nVolume V, _pCybersecurity Risk Management ; Enhancing Leadership and Expertise / _ced. by Kurt J. Engemann, Jason A. Witty. |
| 264 | 1 |
_aBerlin ; _aBoston : _bDe Gruyter, _c[2024] |
|
| 264 | 4 | _c2024 | |
| 300 | _a1 online resource (XIV, 257 p.) | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 0 |
_aDevelopments in Managing and Exploiting Risk ; _vVolume V |
|
| 505 | 0 | 0 |
_tFrontmatter -- _tAdvances in cybersecurity risk management -- _tContents -- _tPart I: Fundamentals -- _t1 Introduction to and brief history of cybersecurity risk management -- _t2 Hierarchical considerations in cyber risk assessments: Strategic versus operational prioritization in managing current and emergent threats -- _t3 The benefits of human factors engineering in cybersecurity -- _t4 An organizational climate primer for the development of cybersecurity socio-organizational frameworks -- _t5 Transparent and inclusive cybersecurity risk management and governance -- _t6 Securing artificial intelligence in the real world -- _tPart II: Applications -- _t7 The CISO evolution and impact on goals, processes, and priorities -- _t8 Towards a more secure IT driven future: The necessity and promise of IT operations management governance -- _t9 Practical cyber risk management – preventing the predictable: Drivers of decision making under risk -- _t10 Implications of artificial intelligence in cybersecurity for individuals -- _t11 Ensuring transportation cybersecurity: Air, auto, and rail -- _t12 Towards robust policy frameworks for securing cyber-physical systems in healthcare -- _tContributors -- _tIndex -- _tDevelopments in managing and exploiting risk |
| 506 | 0 |
_arestricted access _uhttp://purl.org/coar/access_right/c_16ec _fonline access with authorization _2star |
|
| 520 | _aCybersecurity refers to the set of technologies, practices, and strategies designed to protect computer systems, networks, devices, and data from unauthorized access, theft, damage, disruption, or misuse. It involves identifying and assessing potential threats and vulnerabilities, and implementing controls and countermeasures to prevent or mitigate them. Some major risks of a successful cyberattack include: data breaches, ransomware attacks, disruption of services, damage to infrastructure, espionage and sabotage. Cybersecurity Risk Management: Enhancing Leadership and Expertise explores this highly dynamic field that is situated in a fascinating juxtaposition with an extremely advanced and capable set of cyber threat adversaries, rapidly evolving technologies, global digitalization, complex international rules and regulations, geo-politics, and even warfare. A successful cyber-attack can have significant consequences for individuals, organizations, and society as a whole. With comprehensive chapters in the first part of the book covering fundamental concepts and approaches, and those in the second illustrating applications of these fundamental principles, Cybersecurity Risk Management: Enhancing Leadership and Expertise makes an important contribution to the literature in the field by proposing an appropriate basis for managing cybersecurity risk to overcome practical challenges. | ||
| 530 | _aIssued also in print. | ||
| 538 | _aMode of access: Internet via World Wide Web. | ||
| 546 | _aIn English. | ||
| 588 | 0 | _aDescription based on online resource; title from PDF title page (publisher's Web site, viewed 20. Nov 2024) | |
| 650 | 7 |
_aCOMPUTERSÂ / Security / General. _2bisacsh |
|
| 653 | _aCyberattack. | ||
| 653 | _aCybercriminals. | ||
| 653 | _aCybersecurity. | ||
| 653 | _aCyberthreats. | ||
| 653 | _aInfrastructure Ransomware Attacks. | ||
| 653 | _aRisk Management. | ||
| 653 | _aThreat Actors. | ||
| 700 | 1 |
_aBernik, Jose M. _eautore |
|
| 700 | 1 |
_aEngemann, Krista N. _eautore |
|
| 700 | 1 |
_aEngemann, Kurt J. _eautore _ecuratore |
|
| 700 | 1 |
_aFitzgerald, Todd _eautore |
|
| 700 | 1 |
_aHetner, Chris _eautore |
|
| 700 | 1 |
_aHyat-Khan, Saquib _eautore |
|
| 700 | 1 |
_aKing-Wilson, Phillip _eautore |
|
| 700 | 1 |
_aMcKinney, Robert _eautore |
|
| 700 | 1 |
_aMiller, Holmes E. _eautore |
|
| 700 | 1 |
_aNobles, Calvin _eautore |
|
| 700 | 1 |
_aOgu, Emmanuel C. _eautore |
|
| 700 | 1 |
_aRichardson, Robert _eautore |
|
| 700 | 1 |
_aRobinson, Nikki _eautore |
|
| 700 | 1 |
_aShin, Heechang _eautore |
|
| 700 | 1 |
_aSoluade, Oredola _eautore |
|
| 700 | 1 |
_aWitty, Jason A. _eautore _ecuratore |
|
| 850 | _aIT-RoAPU | ||
| 856 | 4 | 0 | _uhttps://doi.org/10.1515/9783111289069 |
| 856 | 4 | 0 | _uhttps://www.degruyter.com/isbn/9783111289069 |
| 856 | 4 | 2 |
_3Cover _uhttps://www.degruyter.com/document/cover/isbn/9783111289069/original |
| 942 | _cEB | ||
| 999 |
_c305976 _d305976 |
||