000 05453nam a22007815i 4500
001 305976
003 IT-RoAPU
005 20250106151645.0
006 m|||||o||d||||||||
007 cr || ||||||||
008 241120t20242024gw fo d z eng d
020 _a9783111286013
_qprint
020 _a9783111289601
_qEPUB
020 _a9783111289069
_qPDF
024 7 _a10.1515/9783111289069
_2doi
035 _a(DE-B1597)9783111289069
035 _a(DE-B1597)652208
035 _a(OCoLC)1453643970
040 _aDE-B1597
_beng
_cDE-B1597
_erda
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.8
084 _aonline - DeGruyter
245 0 0 _aDevelopments in Managing and Exploiting Risk.
_nVolume V,
_pCybersecurity Risk Management ; Enhancing Leadership and Expertise /
_ced. by Kurt J. Engemann, Jason A. Witty.
264 1 _aBerlin ;
_aBoston :
_bDe Gruyter,
_c[2024]
264 4 _c2024
300 _a1 online resource (XIV, 257 p.)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 0 _aDevelopments in Managing and Exploiting Risk ;
_vVolume V
505 0 0 _tFrontmatter --
_tAdvances in cybersecurity risk management --
_tContents --
_tPart I: Fundamentals --
_t1 Introduction to and brief history of cybersecurity risk management --
_t2 Hierarchical considerations in cyber risk assessments: Strategic versus operational prioritization in managing current and emergent threats --
_t3 The benefits of human factors engineering in cybersecurity --
_t4 An organizational climate primer for the development of cybersecurity socio-organizational frameworks --
_t5 Transparent and inclusive cybersecurity risk management and governance --
_t6 Securing artificial intelligence in the real world --
_tPart II: Applications --
_t7 The CISO evolution and impact on goals, processes, and priorities --
_t8 Towards a more secure IT driven future: The necessity and promise of IT operations management governance --
_t9 Practical cyber risk management – preventing the predictable: Drivers of decision making under risk --
_t10 Implications of artificial intelligence in cybersecurity for individuals --
_t11 Ensuring transportation cybersecurity: Air, auto, and rail --
_t12 Towards robust policy frameworks for securing cyber-physical systems in healthcare --
_tContributors --
_tIndex --
_tDevelopments in managing and exploiting risk
506 0 _arestricted access
_uhttp://purl.org/coar/access_right/c_16ec
_fonline access with authorization
_2star
520 _aCybersecurity refers to the set of technologies, practices, and strategies designed to protect computer systems, networks, devices, and data from unauthorized access, theft, damage, disruption, or misuse. It involves identifying and assessing potential threats and vulnerabilities, and implementing controls and countermeasures to prevent or mitigate them. Some major risks of a successful cyberattack include: data breaches, ransomware attacks, disruption of services, damage to infrastructure, espionage and sabotage. Cybersecurity Risk Management: Enhancing Leadership and Expertise explores this highly dynamic field that is situated in a fascinating juxtaposition with an extremely advanced and capable set of cyber threat adversaries, rapidly evolving technologies, global digitalization, complex international rules and regulations, geo-politics, and even warfare. A successful cyber-attack can have significant consequences for individuals, organizations, and society as a whole. With comprehensive chapters in the first part of the book covering fundamental concepts and approaches, and those in the second illustrating applications of these fundamental principles, Cybersecurity Risk Management: Enhancing Leadership and Expertise makes an important contribution to the literature in the field by proposing an appropriate basis for managing cybersecurity risk to overcome practical challenges.
530 _aIssued also in print.
538 _aMode of access: Internet via World Wide Web.
546 _aIn English.
588 0 _aDescription based on online resource; title from PDF title page (publisher's Web site, viewed 20. Nov 2024)
650 7 _aCOMPUTERS / Security / General.
_2bisacsh
653 _aCyberattack.
653 _aCybercriminals.
653 _aCybersecurity.
653 _aCyberthreats.
653 _aInfrastructure Ransomware Attacks.
653 _aRisk Management.
653 _aThreat Actors.
700 1 _aBernik, Jose M.
_eautore
700 1 _aEngemann, Krista N.
_eautore
700 1 _aEngemann, Kurt J.
_eautore
_ecuratore
700 1 _aFitzgerald, Todd
_eautore
700 1 _aHetner, Chris
_eautore
700 1 _aHyat-Khan, Saquib
_eautore
700 1 _aKing-Wilson, Phillip
_eautore
700 1 _aMcKinney, Robert
_eautore
700 1 _aMiller, Holmes E.
_eautore
700 1 _aNobles, Calvin
_eautore
700 1 _aOgu, Emmanuel C.
_eautore
700 1 _aRichardson, Robert
_eautore
700 1 _aRobinson, Nikki
_eautore
700 1 _aShin, Heechang
_eautore
700 1 _aSoluade, Oredola
_eautore
700 1 _aWitty, Jason A.
_eautore
_ecuratore
850 _aIT-RoAPU
856 4 0 _uhttps://doi.org/10.1515/9783111289069
856 4 0 _uhttps://www.degruyter.com/isbn/9783111289069
856 4 2 _3Cover
_uhttps://www.degruyter.com/document/cover/isbn/9783111289069/original
942 _cEB
999 _c305976
_d305976