Muutke küpsiste eelistusi

Cybersecurity: Current Writings on Threats and Protection [Pehme köide]

Edited by , Edited by
  • Formaat: Paperback / softback, 288 pages, kõrgus x laius x paksus: 229x152x15 mm, kaal: 376 g, appendices, glossary, index
  • Ilmumisaeg: 05-Feb-2019
  • Kirjastus: McFarland & Co Inc
  • ISBN-10: 147667440X
  • ISBN-13: 9781476674407
Teised raamatud teemal:
  • Formaat: Paperback / softback, 288 pages, kõrgus x laius x paksus: 229x152x15 mm, kaal: 376 g, appendices, glossary, index
  • Ilmumisaeg: 05-Feb-2019
  • Kirjastus: McFarland & Co Inc
  • ISBN-10: 147667440X
  • ISBN-13: 9781476674407
Teised raamatud teemal:
Billions of people are connected through billions of devices across the globe. In the age of this massive internet, professional and personal information is being transmitted and received constantly, and while this access is convenient, it comes at a risk. This handbook of cybersecurity best practices is for public officials and citizens, employers and employees, corporations and consumers. Essays also address the development of state-of-the-art software systems and hardware for public and private organizations, the use of which holds down the cost of providing services, saving money for taxpayers and consumers.

Arvustused

The 56 separately authored articles contained in this volume effectively combine diverse resources under one cover, making it easier for those new to the cybersecurity discipline to find information relevant to their area of interest...the articles are relevant and informative...recommendedChoice; essential reading...recommendedMidwest Book Review.

Acknowledgments vii
Preface 1(4)
Part I An Overview
1 Government Employees Unaware They Are Cyber Crime Victims
5(3)
Chelsea Binns
2 Cybersecurity and America's Governments
8(3)
Roger L. Kemp
3 NACo Members Zero In on Cybersecurity, Tech Safety
11(3)
Ariel Cohen
4 Growing Impact of Cybercrime in Local Government
14(7)
Gerald Cliff
5 Cybersecurity: What's Your Risk?
21(3)
International City/County Management Association
6 Performance and Data Analytics: The Cincinnati Story
24(8)
Harry Black
7 The Digital Solution
32(6)
Shaun Mulholland
8 Digital Wallpapers Open Doors
38(2)
Caitlin Cowart
9 Personal Privacy Is Eroding as Consent Policies of Google and Facebook Evoke "Fantasy World"
40(3)
Fred H. Cate
Part II Threats and Risks
10 IoT Is Changing the Cybersecurity Industry
43(3)
Larry Karisny
11 Equifax Breach Is a Reminder of Society's Larger Cybersecurity Problems
46(5)
Richard Forno
12 Cybersecurity: Protecting Court Data
51(4)
Brian McLaughlin
13 Health-Care Industry Increasingly Faces Cybersecurity Breaches
55(5)
Margaret Steen
14 It's in the Mail: Aetna Agrees to $17M Payout in HIV Privacy Breach
60(3)
Elana Gordon
15 Explainer: What Is Hacking?
63(4)
James H. Hamlyn-Harris
16 How the Chinese Cyberthreat Has Evolved
67(5)
Dorothy Denning
17 Now That Russia Has Apparently Hacked Americas Grid, Shoring Up Security Is More Important Than Ever
72(3)
Theodore J. Kury
18 Ransomware Victims Urged to Report Infections to Federal Law Enforcement
75(5)
Federal Bureau of Investigation
19 Ransomware Attacks Illustrate the Vulnerabilities That Local Government Entities Face
80(2)
Mary Scott Nabers
20 Ransomware Attacks on the Rise in 2017
82(4)
Mary Ann Barton
21 The Two Faces of Social Media
86(3)
Martha Perego
22 "Zero-Day" Stockpiling Puts Us All at Risk
89(6)
Benjamin Dean
Part III Prevention, Protection, Partnership
A Practical Preventive Measures
23 A Plan for Cybersecurity
95(6)
Cory Fleming
24 How We Can Each Fight Cybercrime with Smarter Habits
101(3)
Arun Vishwanath
25 Simple Steps to Online Safety
104(5)
Alan Shark
26 Staying Safe on Social Networking Sites
109(4)
U.S. Computer Emergency Readiness Team
27 Seven Keys to Strengthen Your Cybersecurity Culture
113(4)
Daniel J. Lohrmann
28 Three Tips for Forming a Computer Emergency Response Team
117(3)
Kelsey Brewer
29 Cybersecurity Strategies Governments Need
120(3)
Gus "Ira" Hunt
Lalit Ahluwalia
30 Security Pros Need a Mentor: Here's Why and How
123(4)
Daniel J. Lohrmann
31 Mecklenburg County Refuses to Pay Ransom to Cyber Hackers
127(3)
Mary Ann Barton
32 Fighting Fake News
130(3)
Marcus Banks
33 How Airplane Crash Investigations Can Improve Cybersecurity
133(3)
Scott Shackelford
III. B Technical Protections
34 National Cybersecurity Workforce Framework
136(6)
U.S. Department of Homeland Security
35 Eliminating Network Blind Spots and Preventing Breaches
142(3)
Reggie Best
36 The Cloud and Enterprise Cybersecurity: Leveling the Playing Field
145(6)
Microsoft
37 Government Data in the Cloud: Provider and User Responsibilities
151(3)
Subrata Chakrabarti
38 Using Blockchain to Secure the "Internet of Things"
154(3)
Nir Kshetri
39 How to Protect Patrons' Digital Privacy
157(3)
Anne Ford
40 Monitoring Employees' Use of Company Computers and the Internet
160(8)
Texas Workforce Commission
41 Disaster Recovery for Technology: Best Practice
168(3)
Government Finance Officers Association
III. C Using Partnerships and Networks
42 Cybersecurity Partnerships: Strength in Numbers
171(3)
Susan Miller
43 Intersector Briefing: Cross Sector Collaboration in Cybersecurity
174(3)
Intersector Project
44 Obama's Cybersecurity Initiative
177(4)
Frank J. Cilluffo
Sharon L. Cardash
45 New Trump Executive Order on Cybersecurity
181(4)
Daniel J. Lohrmann
46 Sharing of Cyber Threat Indicators and Defensive Measures by the Federal Government
185(7)
Office of the Director of National Intelligence Other Agencies
47 Law Enforcement Partnerships Enhance Cybersecurity Investigations
192(2)
Chelsea Binns
48 States Rush to Cash in on Cybersecurity Boom
194(4)
Elaine S. Povich
49 How the National Guard Is Protecting Cybersecurity
198(5)
Colin Wood
50 Cybersecurity and Local Governments in the United States
203(4)
William Hatcher
Part IV Future
51 The Top 18 Security Predictions for 2018
207(10)
Daniel J. Lohrmann
52 Artificial Intelligence Cyber Attacks Are Coming---But What Does That Mean?
217(3)
Jeremy Straub
53 FCC Group on 5G Deployment Short on Local Input
220(4)
Mary Ann Barton
54 Thinking Strategically in the Cyber Domain
224(3)
John O'Brien
55 Internet, E-mail and Computer Use Policy
227(6)
Texas Workforce Commission
56 Consumers Who Froze Their Credit Reports
233(4)
Julie Appleby
Appendix A Glossary of Cybersecurity Terms 237(11)
Joaquin Jay Gonzalez III
Appendix B Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure 248(9)
Appendix C City and County of San Francisco Cybersecurity Policy 257(5)
Appendix D LaPorte County, Indiana, IT Computer Security Policy 262(5)
About the Contributors 267(4)
Index 271
Joaquin Jay Gonzalez III, Ph.D., is vice provost for global affairs as well as chair and Mayor George Christopher Professor of Public Administration at Golden Gate University. He founded GGUs law enforcement and security program and is a San Francisco advocate for the safety and security of Filipino American kids and their families. Roger L. Kemp, Ph.D., ICMA-CM, has been a city manager on both the East and West coasts for more than 25 years. He is presently Distinguished Adjunct Professor of Public Administration at Golden Gate University and a Fellow of The Academy of Political Science.