Acknowledgments |
|
vii | |
Preface |
|
1 | (4) |
|
|
|
1 Government Employees Unaware They Are Cyber Crime Victims |
|
|
5 | (3) |
|
|
2 Cybersecurity and America's Governments |
|
|
8 | (3) |
|
|
3 NACo Members Zero In on Cybersecurity, Tech Safety |
|
|
11 | (3) |
|
|
4 Growing Impact of Cybercrime in Local Government |
|
|
14 | (7) |
|
|
5 Cybersecurity: What's Your Risk? |
|
|
21 | (3) |
|
International City/County Management Association |
|
|
6 Performance and Data Analytics: The Cincinnati Story |
|
|
24 | (8) |
|
|
|
32 | (6) |
|
|
8 Digital Wallpapers Open Doors |
|
|
38 | (2) |
|
|
9 Personal Privacy Is Eroding as Consent Policies of Google and Facebook Evoke "Fantasy World" |
|
|
40 | (3) |
|
|
Part II Threats and Risks |
|
|
|
10 IoT Is Changing the Cybersecurity Industry |
|
|
43 | (3) |
|
|
11 Equifax Breach Is a Reminder of Society's Larger Cybersecurity Problems |
|
|
46 | (5) |
|
|
12 Cybersecurity: Protecting Court Data |
|
|
51 | (4) |
|
|
13 Health-Care Industry Increasingly Faces Cybersecurity Breaches |
|
|
55 | (5) |
|
|
14 It's in the Mail: Aetna Agrees to $17M Payout in HIV Privacy Breach |
|
|
60 | (3) |
|
|
15 Explainer: What Is Hacking? |
|
|
63 | (4) |
|
|
16 How the Chinese Cyberthreat Has Evolved |
|
|
67 | (5) |
|
|
17 Now That Russia Has Apparently Hacked Americas Grid, Shoring Up Security Is More Important Than Ever |
|
|
72 | (3) |
|
|
18 Ransomware Victims Urged to Report Infections to Federal Law Enforcement |
|
|
75 | (5) |
|
Federal Bureau of Investigation |
|
|
19 Ransomware Attacks Illustrate the Vulnerabilities That Local Government Entities Face |
|
|
80 | (2) |
|
|
20 Ransomware Attacks on the Rise in 2017 |
|
|
82 | (4) |
|
|
21 The Two Faces of Social Media |
|
|
86 | (3) |
|
|
22 "Zero-Day" Stockpiling Puts Us All at Risk |
|
|
89 | (6) |
|
|
Part III Prevention, Protection, Partnership |
|
|
|
A Practical Preventive Measures |
|
|
|
23 A Plan for Cybersecurity |
|
|
95 | (6) |
|
|
24 How We Can Each Fight Cybercrime with Smarter Habits |
|
|
101 | (3) |
|
|
25 Simple Steps to Online Safety |
|
|
104 | (5) |
|
|
26 Staying Safe on Social Networking Sites |
|
|
109 | (4) |
|
U.S. Computer Emergency Readiness Team |
|
|
27 Seven Keys to Strengthen Your Cybersecurity Culture |
|
|
113 | (4) |
|
|
28 Three Tips for Forming a Computer Emergency Response Team |
|
|
117 | (3) |
|
|
29 Cybersecurity Strategies Governments Need |
|
|
120 | (3) |
|
|
|
30 Security Pros Need a Mentor: Here's Why and How |
|
|
123 | (4) |
|
|
31 Mecklenburg County Refuses to Pay Ransom to Cyber Hackers |
|
|
127 | (3) |
|
|
|
130 | (3) |
|
|
33 How Airplane Crash Investigations Can Improve Cybersecurity |
|
|
133 | (3) |
|
|
III. B Technical Protections |
|
|
|
34 National Cybersecurity Workforce Framework |
|
|
136 | (6) |
|
U.S. Department of Homeland Security |
|
|
35 Eliminating Network Blind Spots and Preventing Breaches |
|
|
142 | (3) |
|
|
36 The Cloud and Enterprise Cybersecurity: Leveling the Playing Field |
|
|
145 | (6) |
|
|
37 Government Data in the Cloud: Provider and User Responsibilities |
|
|
151 | (3) |
|
|
38 Using Blockchain to Secure the "Internet of Things" |
|
|
154 | (3) |
|
|
39 How to Protect Patrons' Digital Privacy |
|
|
157 | (3) |
|
|
40 Monitoring Employees' Use of Company Computers and the Internet |
|
|
160 | (8) |
|
Texas Workforce Commission |
|
|
41 Disaster Recovery for Technology: Best Practice |
|
|
168 | (3) |
|
Government Finance Officers Association |
|
|
III. C Using Partnerships and Networks |
|
|
|
42 Cybersecurity Partnerships: Strength in Numbers |
|
|
171 | (3) |
|
|
43 Intersector Briefing: Cross Sector Collaboration in Cybersecurity |
|
|
174 | (3) |
|
|
44 Obama's Cybersecurity Initiative |
|
|
177 | (4) |
|
|
|
45 New Trump Executive Order on Cybersecurity |
|
|
181 | (4) |
|
|
46 Sharing of Cyber Threat Indicators and Defensive Measures by the Federal Government |
|
|
185 | (7) |
|
Office of the Director of National Intelligence Other Agencies |
|
|
47 Law Enforcement Partnerships Enhance Cybersecurity Investigations |
|
|
192 | (2) |
|
|
48 States Rush to Cash in on Cybersecurity Boom |
|
|
194 | (4) |
|
|
49 How the National Guard Is Protecting Cybersecurity |
|
|
198 | (5) |
|
|
50 Cybersecurity and Local Governments in the United States |
|
|
203 | (4) |
|
|
|
|
51 The Top 18 Security Predictions for 2018 |
|
|
207 | (10) |
|
|
52 Artificial Intelligence Cyber Attacks Are Coming---But What Does That Mean? |
|
|
217 | (3) |
|
|
53 FCC Group on 5G Deployment Short on Local Input |
|
|
220 | (4) |
|
|
54 Thinking Strategically in the Cyber Domain |
|
|
224 | (3) |
|
|
55 Internet, E-mail and Computer Use Policy |
|
|
227 | (6) |
|
Texas Workforce Commission |
|
|
56 Consumers Who Froze Their Credit Reports |
|
|
233 | (4) |
|
Appendix A Glossary of Cybersecurity Terms |
|
237 | (11) |
|
Appendix B Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure |
|
248 | (9) |
Appendix C City and County of San Francisco Cybersecurity Policy |
|
257 | (5) |
Appendix D LaPorte County, Indiana, IT Computer Security Policy |
|
262 | (5) |
About the Contributors |
|
267 | (4) |
Index |
|
271 | |