Solving Cyber Risk: Protecting Your Company and Society
The non-technical handbook for cyber security risk management Solving Cyber Risk distills a decade of research into a practical framework for cyber security. Blending statistical data and cost information with research into the culture, psychology, and business models of the hacker community, this b...
Saved in:
Main Author: | |
---|---|
Other Authors: | , |
Format: | Electronic eBook |
Language: | English |
Published: |
Newark
John Wiley & Sons, Incorporated
2018
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781119490937/?ar |
Summary: | The non-technical handbook for cyber security risk management Solving Cyber Risk distills a decade of research into a practical framework for cyber security. Blending statistical data and cost information with research into the culture, psychology, and business models of the hacker community, this book provides business executives, policy-makers, and individuals with a deeper understanding of existing future threats, and an action plan for safeguarding their organizations. Key Risk Indicators reveal vulnerabilities based on organization type, IT infrastructure and existing security measures, while expert discussion from leading cyber risk specialists details practical, real-world methods of risk reduction and mitigation. By the nature of the business, your organization's customer database is packed with highly sensitive information that is essentially hacker-bait, and even a minor flaw in security protocol could spell disaster. This book takes you deep into the cyber threat landscape to show you how to keep your data secure.-Understand who is carrying out cyber-attacks, and why -Identify your organization's risk of attack and vulnerability to damage -Learn the most cost-effective risk reduction measures -Adopt a new cyber risk assessment and quantification framework based on techniques used by the insurance industry By applying risk management principles to cyber security, non-technical leadership gains a greater understanding of the types of threat, level of threat, and level of investment needed to fortify the organization against attack. Just because you have not been hit does not mean your data is safe, and hackers rely on their targets' complacence to help maximize their haul. Solving Cyber Risk gives you a concrete action plan for implementing top-notch preventative measures before you're forced to implement damage control. |
Item Description: | 2.5.3 Wholesale and Back-End Financial Systems. - Includes bibliographical references and index. - Print version record |
Physical Description: | 1 Online-Ressource (384 Seiten) |
ISBN: | 9781119490913 111949091X 9781119490920 1119490928 9781119490937 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-048602167 | ||
003 | DE-627-1 | ||
005 | 20240228120623.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191206s2018 xx |||||o 00| ||eng c | ||
020 | |a 9781119490913 |9 978-1-119-49091-3 | ||
020 | |a 111949091X |9 1-119-49091-X | ||
020 | |a 9781119490920 |9 978-1-119-49092-0 | ||
020 | |a 1119490928 |9 1-119-49092-8 | ||
020 | |a 9781119490937 |9 978-1-119-49093-7 | ||
035 | |a (DE-627-1)048602167 | ||
035 | |a (DE-599)KEP048602167 | ||
035 | |a (ORHE)9781119490937 | ||
035 | |a (DE-627-1)048602167 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Coburn, Andrew |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Solving Cyber Risk |b Protecting Your Company and Society |
264 | 1 | |a Newark |b John Wiley & Sons, Incorporated |c 2018 | |
300 | |a 1 Online-Ressource (384 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a 2.5.3 Wholesale and Back-End Financial Systems. - Includes bibliographical references and index. - Print version record | ||
520 | |a The non-technical handbook for cyber security risk management Solving Cyber Risk distills a decade of research into a practical framework for cyber security. Blending statistical data and cost information with research into the culture, psychology, and business models of the hacker community, this book provides business executives, policy-makers, and individuals with a deeper understanding of existing future threats, and an action plan for safeguarding their organizations. Key Risk Indicators reveal vulnerabilities based on organization type, IT infrastructure and existing security measures, while expert discussion from leading cyber risk specialists details practical, real-world methods of risk reduction and mitigation. By the nature of the business, your organization's customer database is packed with highly sensitive information that is essentially hacker-bait, and even a minor flaw in security protocol could spell disaster. This book takes you deep into the cyber threat landscape to show you how to keep your data secure.-Understand who is carrying out cyber-attacks, and why -Identify your organization's risk of attack and vulnerability to damage -Learn the most cost-effective risk reduction measures -Adopt a new cyber risk assessment and quantification framework based on techniques used by the insurance industry By applying risk management principles to cyber security, non-technical leadership gains a greater understanding of the types of threat, level of threat, and level of investment needed to fortify the organization against attack. Just because you have not been hit does not mean your data is safe, and hackers rely on their targets' complacence to help maximize their haul. Solving Cyber Risk gives you a concrete action plan for implementing top-notch preventative measures before you're forced to implement damage control. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Data protection | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Protection de l'information (Informatique) | |
650 | 4 | |a BUSINESS & ECONOMICS ; Insurance ; Risk Assessment & Management | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection | |
700 | 1 | |a Leverett, Eireann |e MitwirkendeR |4 ctb | |
700 | 1 | |a Woo, Gordon |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9781119490937 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781119490937 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781119490937/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-048602167 |
---|---|
_version_ | 1829007758897184769 |
adam_text | |
any_adam_object | |
author | Coburn, Andrew |
author2 | Leverett, Eireann Woo, Gordon |
author2_role | ctb ctb |
author2_variant | e l el g w gw |
author_facet | Coburn, Andrew Leverett, Eireann Woo, Gordon |
author_role | aut |
author_sort | Coburn, Andrew |
author_variant | a c ac |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)048602167 (DE-599)KEP048602167 (ORHE)9781119490937 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03713cam a22005172c 4500</leader><controlfield tag="001">ZDB-30-ORH-048602167</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120623.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191206s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119490913</subfield><subfield code="9">978-1-119-49091-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">111949091X</subfield><subfield code="9">1-119-49091-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119490920</subfield><subfield code="9">978-1-119-49092-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119490928</subfield><subfield code="9">1-119-49092-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119490937</subfield><subfield code="9">978-1-119-49093-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048602167</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP048602167</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119490937</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048602167</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Coburn, Andrew</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Solving Cyber Risk</subfield><subfield code="b">Protecting Your Company and Society</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Newark</subfield><subfield code="b">John Wiley & Sons, Incorporated</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (384 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">2.5.3 Wholesale and Back-End Financial Systems. - Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The non-technical handbook for cyber security risk management Solving Cyber Risk distills a decade of research into a practical framework for cyber security. Blending statistical data and cost information with research into the culture, psychology, and business models of the hacker community, this book provides business executives, policy-makers, and individuals with a deeper understanding of existing future threats, and an action plan for safeguarding their organizations. Key Risk Indicators reveal vulnerabilities based on organization type, IT infrastructure and existing security measures, while expert discussion from leading cyber risk specialists details practical, real-world methods of risk reduction and mitigation. By the nature of the business, your organization's customer database is packed with highly sensitive information that is essentially hacker-bait, and even a minor flaw in security protocol could spell disaster. This book takes you deep into the cyber threat landscape to show you how to keep your data secure.-Understand who is carrying out cyber-attacks, and why -Identify your organization's risk of attack and vulnerability to damage -Learn the most cost-effective risk reduction measures -Adopt a new cyber risk assessment and quantification framework based on techniques used by the insurance industry By applying risk management principles to cyber security, non-technical leadership gains a greater understanding of the types of threat, level of threat, and level of investment needed to fortify the organization against attack. Just because you have not been hit does not mean your data is safe, and hackers rely on their targets' complacence to help maximize their haul. Solving Cyber Risk gives you a concrete action plan for implementing top-notch preventative measures before you're forced to implement damage control.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">BUSINESS & ECONOMICS ; Insurance ; Risk Assessment & Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Leverett, Eireann</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Woo, Gordon</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781119490937</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781119490937</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119490937/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-048602167 |
illustrated | Not Illustrated |
indexdate | 2025-04-10T09:35:24Z |
institution | BVB |
isbn | 9781119490913 111949091X 9781119490920 1119490928 9781119490937 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (384 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | John Wiley & Sons, Incorporated |
record_format | marc |
spelling | Coburn, Andrew VerfasserIn aut Solving Cyber Risk Protecting Your Company and Society Newark John Wiley & Sons, Incorporated 2018 1 Online-Ressource (384 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier 2.5.3 Wholesale and Back-End Financial Systems. - Includes bibliographical references and index. - Print version record The non-technical handbook for cyber security risk management Solving Cyber Risk distills a decade of research into a practical framework for cyber security. Blending statistical data and cost information with research into the culture, psychology, and business models of the hacker community, this book provides business executives, policy-makers, and individuals with a deeper understanding of existing future threats, and an action plan for safeguarding their organizations. Key Risk Indicators reveal vulnerabilities based on organization type, IT infrastructure and existing security measures, while expert discussion from leading cyber risk specialists details practical, real-world methods of risk reduction and mitigation. By the nature of the business, your organization's customer database is packed with highly sensitive information that is essentially hacker-bait, and even a minor flaw in security protocol could spell disaster. This book takes you deep into the cyber threat landscape to show you how to keep your data secure.-Understand who is carrying out cyber-attacks, and why -Identify your organization's risk of attack and vulnerability to damage -Learn the most cost-effective risk reduction measures -Adopt a new cyber risk assessment and quantification framework based on techniques used by the insurance industry By applying risk management principles to cyber security, non-technical leadership gains a greater understanding of the types of threat, level of threat, and level of investment needed to fortify the organization against attack. Just because you have not been hit does not mean your data is safe, and hackers rely on their targets' complacence to help maximize their haul. Solving Cyber Risk gives you a concrete action plan for implementing top-notch preventative measures before you're forced to implement damage control. Computer security Data protection Sécurité informatique Protection de l'information (Informatique) BUSINESS & ECONOMICS ; Insurance ; Risk Assessment & Management Leverett, Eireann MitwirkendeR ctb Woo, Gordon MitwirkendeR ctb 9781119490937 Erscheint auch als Druck-Ausgabe 9781119490937 |
spellingShingle | Coburn, Andrew Solving Cyber Risk Protecting Your Company and Society Computer security Data protection Sécurité informatique Protection de l'information (Informatique) BUSINESS & ECONOMICS ; Insurance ; Risk Assessment & Management |
title | Solving Cyber Risk Protecting Your Company and Society |
title_auth | Solving Cyber Risk Protecting Your Company and Society |
title_exact_search | Solving Cyber Risk Protecting Your Company and Society |
title_full | Solving Cyber Risk Protecting Your Company and Society |
title_fullStr | Solving Cyber Risk Protecting Your Company and Society |
title_full_unstemmed | Solving Cyber Risk Protecting Your Company and Society |
title_short | Solving Cyber Risk |
title_sort | solving cyber risk protecting your company and society |
title_sub | Protecting Your Company and Society |
topic | Computer security Data protection Sécurité informatique Protection de l'information (Informatique) BUSINESS & ECONOMICS ; Insurance ; Risk Assessment & Management |
topic_facet | Computer security Data protection Sécurité informatique Protection de l'information (Informatique) BUSINESS & ECONOMICS ; Insurance ; Risk Assessment & Management |
work_keys_str_mv | AT coburnandrew solvingcyberriskprotectingyourcompanyandsociety AT leveretteireann solvingcyberriskprotectingyourcompanyandsociety AT woogordon solvingcyberriskprotectingyourcompanyandsociety |