Assessing and insuring cybersecurity risk:
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
Boca Raton
CRC Press
2022
|
Ausgabe: | First edition |
Schriftenreihe: | An Auerbach book
|
Schlagwörter: | |
Links: | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032940886&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Umfang: | xiv, 152 Seiten illustrations (black and white) 24 cm |
ISBN: | 9780367903077 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV047565531 | ||
003 | DE-604 | ||
005 | 20220105 | ||
007 | t| | ||
008 | 211028s2022 xx a||| |||| 00||| eng d | ||
015 | |a GBC1D5416 |2 dnb | ||
020 | |a 9780367903077 |9 978-0-367-90307-7 | ||
035 | |a (OCoLC)1284793253 | ||
035 | |a (DE-599)BVBBV047565531 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Das, Ravindra |e Verfasser |0 (DE-588)1100570306 |4 aut | |
245 | 1 | 0 | |a Assessing and insuring cybersecurity risk |c Ravi Das |
250 | |a First edition | ||
264 | 1 | |a Boca Raton |b CRC Press |c 2022 | |
300 | |a xiv, 152 Seiten |b illustrations (black and white) |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a An Auerbach book | |
650 | 4 | |a Computer security / Risk management | |
650 | 4 | |a Computer insurance | |
650 | 7 | |a Computer insurance |2 fast | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Risikoanalyse |0 (DE-588)4137042-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Risikoanalyse |0 (DE-588)4137042-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i ebook version |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032940886&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-032940886 |
Datensatz im Suchindex
_version_ | 1819318992386392064 |
---|---|
adam_text | Contents Acknowledgments Authors Chapter 1 xi хіп Cybersecurity Risk Introduction What Cyber Measurement Is All About The Concept of Bayesian Measurement The Classification Chain Uncertainty Measurement of Uncertainty Risk Measurement of Risk The Statistical Methods of Measurement The Rule of Five The Various Quantitative Methods for Gauging Cyber Risk The Risk Matrix The Monte Carlo Method The Creation of Random Cyber-Related Events The Lognormal Distribution The Summation of the Cyber Risks How to Visualize Cyber Losses The Return on Mitigation The Decomposition of the One for One Substitution Cyber Risk Model A Decomposition Strategy A Newer Decomposition Strategy How to Avoid Over Decomposing the Variables 1 1 4 6 7 8 8 8 9 10 11 12 12 13 14 IS 16 17 19 20 24 25 26 VII
VIII A Critical Variable Related to Cyber Risk: Reputational Damage How to Reduce the՛ Level of Cyber Risk with Bayesian Techniques The Important Statistical Concepts of the Bayesian Theory Making Use of Prior Cyber Events in the Bayesian Methodology Statistically Proving the Bayesian Theorem The Applications of the Bayesian Methodology How to Reduce the Level of Cyber Risk with More Sophisticated Bayesian Techniques The Beta Distribution Making Use of the Log Odds Ratio How to Use the Log Odds Ratio (LOR) Methodology The Lens Methodology A Cross Comparison of the LOR and Lens Methodologies How to Ascertain the Value of Information and Data How a Known Factor Can Have an Impact on a Predicted Event A Brief Overview of Cybersecurity Metrics Chapter 2 CONTENTS CONTENTS Cybersecurity Audits, Frameworks, and Controls An Overview of the Cybersecurity Controls A Technical Review of the Cybersecurity Audit Why the Cyber Audit Is Conducted The Principles of Control in the Cyber Audit The Validation of the Audit Frameworks A Macro View of How the Cyber Audit Process Works The Importance of Cyber Audit Management A Holistic View of How the Cyber Audit Process Works A Review of the Cyber Audit Frameworks Breaking Down the Importance of Information Technology (IT) Security Governance A Deep Dive into the Cybersecurity Frameworks The ISO 27001 The COBIT 5 The National Institute of Standards and Technology The Framework for Improving Critical Infrastructure Cybersecurity The Information Security Forum Standard of Good Practice for Information Security The Payment Card Industry Data
Security Standards 28 29 30 Chapter 3 33 34 35 37 38 40 41 42 Chapter 4 44 45 46 47 51 52 54 57 59 63 65 67 70 75 75 77 78 80 82 82 85 86 Chapter 5 IX The Cyber Risk Controls The Goal-Based Security Controls The Preventive Controls The Detective Controls The Operational Controls 86 88 89 89 91 Cybersecurity Insurance Policies Cybersecurity Risk Insurance Policies The State of the Cybersecurity Insurance Market An Analysis of the Major Insurance Carriers That Offer Cyber Insurance The Major Components of a Cyber Insurance Policy How Should an SMB Decide on What Kind of Cyber Policy to Get Notes 93 93 93 The Compliance Laws of the GDPR, CCPA, and CMMC GDPR Implications for Business and Cybersecurity More about GDPR DPO, DCs, and DPs Conclusions on GDPR California Consumer Privacy Act (CCPA) Cybersecurity Maturity Model Certification (CMMC) Who Cares? Levels Summary Notes Conclusions Chapter 1 Chapter 3 An Example of Cyber Resiliency How the Definition of Cyber Resiliency Was Met What Is the Difference between Cyber Resiliency and Cybersecurity? The NIST Special Publication 800-160 Volume 2 What Cybersecurity Insurance Is and its History The Advantages and Disadvantages of Cybersecurity Insurance The Advantages The Disadvantages The Factors That Insurance Companies Consider When Providing Coverage Chapter 4 PII Versus Personal Data The Rights That Are Afforded to Individuals 96 100 104 106 109 109 110 111 112 113 113 115 116 116 117 117 119 119 122 122 123 124 124 126 128 128 131 133 136 137 138
1 X CONTENTS Ihe CCPA lhe GDPR The Usage of Data Ihe CCPA The GDPR The Components of the Maturity Level 1 The Access Control (AC) The Identification and Authentication (IA) The Media Protection (MP) The Physical Protection (PE) The System and Communications Protection (SC) The System and Information Integrity (SI) The Background of the PCI-DSS The Compliance Levels of the PCI-DSS The Requirements of the PCI-DSS Index 138 138 139 139 139 141 141 142 143 143 144 145 145 146 147 149
|
any_adam_object | 1 |
author | Das, Ravindra |
author_GND | (DE-588)1100570306 |
author_facet | Das, Ravindra |
author_role | aut |
author_sort | Das, Ravindra |
author_variant | r d rd |
building | Verbundindex |
bvnumber | BV047565531 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)1284793253 (DE-599)BVBBV047565531 |
discipline | Informatik |
edition | First edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01600nam a2200421 c 4500</leader><controlfield tag="001">BV047565531</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220105 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">211028s2022 xx a||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBC1D5416</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780367903077</subfield><subfield code="9">978-0-367-90307-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1284793253</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047565531</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Das, Ravindra</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1100570306</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Assessing and insuring cybersecurity risk</subfield><subfield code="c">Ravi Das</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xiv, 152 Seiten</subfield><subfield code="b">illustrations (black and white)</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">An Auerbach book</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security / Risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer insurance</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer insurance</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikoanalyse</subfield><subfield code="0">(DE-588)4137042-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Risikoanalyse</subfield><subfield code="0">(DE-588)4137042-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">ebook version</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032940886&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032940886</subfield></datafield></record></collection> |
id | DE-604.BV047565531 |
illustrated | Illustrated |
indexdate | 2024-12-20T19:22:21Z |
institution | BVB |
isbn | 9780367903077 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032940886 |
oclc_num | 1284793253 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | xiv, 152 Seiten illustrations (black and white) 24 cm |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | CRC Press |
record_format | marc |
series2 | An Auerbach book |
spellingShingle | Das, Ravindra Assessing and insuring cybersecurity risk Computer security / Risk management Computer insurance Computer insurance fast Computersicherheit (DE-588)4274324-2 gnd Risikoanalyse (DE-588)4137042-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4137042-9 |
title | Assessing and insuring cybersecurity risk |
title_auth | Assessing and insuring cybersecurity risk |
title_exact_search | Assessing and insuring cybersecurity risk |
title_full | Assessing and insuring cybersecurity risk Ravi Das |
title_fullStr | Assessing and insuring cybersecurity risk Ravi Das |
title_full_unstemmed | Assessing and insuring cybersecurity risk Ravi Das |
title_short | Assessing and insuring cybersecurity risk |
title_sort | assessing and insuring cybersecurity risk |
topic | Computer security / Risk management Computer insurance Computer insurance fast Computersicherheit (DE-588)4274324-2 gnd Risikoanalyse (DE-588)4137042-9 gnd |
topic_facet | Computer security / Risk management Computer insurance Computersicherheit Risikoanalyse |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032940886&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT dasravindra assessingandinsuringcybersecurityrisk |