Muutke küpsiste eelistusi

Cybersecurity: Ethics, Legal, Risks, and Policies [Kõva köide]

(University of Delaware), (University of Delaware, USA)
  • Formaat: Hardback, 416 pages, kõrgus x laius: 234x156 mm, kaal: 734 g, 3 Tables, black and white; 70 Line drawings, black and white; 70 Illustrations, black and white
  • Ilmumisaeg: 10-Mar-2022
  • Kirjastus: Apple Academic Press Inc.
  • ISBN-10: 1774630222
  • ISBN-13: 9781774630228
  • Formaat: Hardback, 416 pages, kõrgus x laius: 234x156 mm, kaal: 734 g, 3 Tables, black and white; 70 Line drawings, black and white; 70 Illustrations, black and white
  • Ilmumisaeg: 10-Mar-2022
  • Kirjastus: Apple Academic Press Inc.
  • ISBN-10: 1774630222
  • ISBN-13: 9781774630228
"This book is the first of its kind to introduce the integration of ethics, laws, risks, and policies in cyberspace. The book will advance understanding of the ethical and legal aspects of cyberspace followed by the risks involved along with current and proposed cyber policies. This book serves as a summary of the state of the art of cyber laws in the United States and considers more than 50 cyber laws. It also, importantly, incorporates various risk management and security strategies from a number of organizations. Using easy-to-understand language and incorporating case studies, the authors begin with the consideration of ethics and law in cybersecurity and then go on to take into account risks and security policies. The section on risk covers risk identification, risk analysis, risk assessment, risk management, and risk remediation. The very important and exquisite topic of cyber insurance is covered as well-its benefits, types, coverage, etc. The section on cybersecurity policy acquaints readers withthe role of policies in cybersecurity and how they are being implemented by means of frameworks. The authors provide a policy overview followed by discussions of several popular cybersecurity frameworks, such as NIST, COBIT, PCI/DSS, ISO series, etc. Each chapter is followed by an overall summary and review that highlights the key points as well as questions for readers to evaluate their understanding based on the chapter content. Cybersecurity: Ethics, Legal, Risks, and Policies is a valuable resource for a large audience that includes instructors, students, professionals in specific fields as well anyone and everyone who is an essential constituent of cyberspace. With increasing cybercriminal activities, it is more important than ever to know the laws and how to secure data and devices"--

This book is the first of its kind to introduce the integration of ethics, laws, risks, and policies in cyberspace. The book will advance understanding of the ethical and legal aspects of cyberspace followed by the risks involved along with current and proposed cyber policies.

This book is the first of its kind to introduce the integration of ethics, laws, risks, and policies in cyberspace. The book will advance understanding of the ethical and legal aspects of cyberspace followed by the risks involved along with current and proposed cyber policies. This book serves as a summary of the state of the art of cyber laws in the United States and considers more than 50 cyber laws. It also, importantly, incorporates various risk management and security strategies from a number of organizations.

Using easy-to-understand language and incorporating case studies, the authors begin with the consideration of ethics and law in cybersecurity and then go on to take into account risks and security policies. The section on risk covers risk identification, risk analysis, risk assessment, risk management, and risk remediation. The very important and exquisite topic of cyber insurance is covered as well—its benefits, types, coverage, etc. The section on cybersecurity policy acquaints readers with the role of policies in cybersecurity and how they are being implemented by means of frameworks. The authors provide a policy overview followed by discussions of several popular cybersecurity frameworks, such as NIST, COBIT, PCI/DSS, ISO series, etc.

Each chapter is followed by an overall summary and review that highlights the key points as well as questions for readers to evaluate their understanding based on the chapter content.

Cybersecurity: Ethics, Legal, Risks, and Policies

is a valuable resource for a large audience that includes instructors, students, professionals in specific fields as well anyone and everyone who is an essential constituent of cyberspace. With increasing cybercriminal activities, it is more important than ever to know the laws and how to secure data and devices.

Abbreviations ix
Preface xv
Introduction xvii
PART I Cybersecurity: Ethics and Legal
1(238)
1 Introduction to Cyberethics
3(38)
2 Ethical Issues in Cybersecurity
41(28)
3 Cybersecurity Ethics: Cyberspace and Other Applications
69(66)
4 Introduction to Cyber laws
135(22)
5 Cyber laws in the United States
157(82)
PART II Cybersecurity: Risks and Policies
239(156)
6 Risks in Cybersecurity
241(66)
7 Cyber Risks and Cyber Insurance
307(22)
8 Introduction to Cybersecurity Policies
329(66)
Bibliography 395(8)
Index 403
Ishaani Priyadarshini, PhD, has authored book chapters and journal articles for SCIE-indexed journals. As a certified reviewer, she conducts peer review of research papers for IEEE, Elsevier, and Springer journals and is a member of the editorial board of the International Journal of Information Security and Privacy. She is a PhD candidate (Department of Electrical and Computer Engineering) at the University of Delaware, USA. Her areas of research include cybersecurity (authentication systems, cybersecurity ethics, and policies) and artificial intelligence.

Chase Cotton, PhD, CISSP, is Professor of Practice and Director of the University of Delaware Center for Intelligent CyberSecurity, USA. He is a successful researcher, telecommunications carrier executive, product manager, consultant, and educator for the technologies used in Internet and data services in the carrier environment. Dr. Cottons varied background includes communications research at Bellcores Applied Research Area, creating new algorithms and methods in bridging multicast and many forms of packet-based applications, including voice and video, traffic monitoring, transport protocols, custom VLSI for communications (protocol engines and content addressable memories), and gigabit networking. Past work also included assisting carriers worldwide as they started their Internet businesses, including Internet Service Providers (ISPs), hosting and web services, and the first large-scale commercial deployment of Digital Subscriber Line (DSL) for consumer broadband services. In 2000, Dr. Cotton assumed research, planning, and engineering for Sprints global Tier 1 Internet provider, SprintLink. His research interests include cybersecurity and high-availability software systems with funding drawn from the NSF, ARL, CERDEC, JPMorgan Chase, and other industrial sponsors. Dr. Cotton currently consults on communications and Internet architectures for many carriers and equipment vendors worldwide.