Cover image for Cyber Security Policy Guidebook.
Cyber Security Policy Guidebook.
Title:
Cyber Security Policy Guidebook.
Author:
Bayuk, Jennifer L.
ISBN:
9781118241486
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (288 pages)
Contents:
Cyber Security Policy Guidebook -- Contents -- Foreword -- Preface -- Acknowledgments -- 1: Introduction -- 1.1 What Is Cyber Security? -- 1.2 What Is Cyber Security Policy? -- 1.3 Domains of Cyber Security Policy -- 1.3.1 Laws and Regulations -- 1.3.2 Enterprise Policy -- 1.3.3 Technology Operations -- 1.3.4 Technology Configuration -- 1.4 Strategy versus Policy -- 2: Cyber Security Evolution -- 2.1 Productivity -- 2.2 Internet -- 2.3 e-Commerce -- 2.4 Countermeasures -- 2.5 Challenges -- 3: Cyber Security Objectives -- 3.1 Cyber Security Metrics -- 3.2 Security Management Goals -- 3.3 Counting Vulnerabilities -- 3.4 Security Frameworks -- 3.4.1 e-Commerce Systems -- 3.4.2 Industrial Control Systems -- 3.4.3 Personal Mobile Devices -- 3.5 Security Policy Objectives -- 4: Guidance for Decision Makers -- 4.1 Tone at the Top -- 4.2 Policy as a Project -- 4.3 Cyber Security Management -- 4.3.1 Arriving at Goals -- 4.3.2 Cyber Security Documentation -- 4.4 Using the Catalog -- 5: The Catalog Approach -- 5.1 Catalog Format -- 5.2 Cyber Security Policy Taxonomy -- 6: Cyber Security Policy Catalog -- 6.1 Cyber Governance Issues -- 6.1.1 Net Neutrality -- 6.1.2 Internet Names and Numbers -- 6.1.3 Copyrights and Trademarks -- 6.1.4 Email and Messaging -- 6.2 Cyber User Issues -- 6.2.1 Malvertising -- 6.2.2 Impersonation -- 6.2.3 Appropriate Use -- 6.2.4 Cyber Crime -- 6.2.5 Geolocation -- 6.2.6 Privacy -- 6.3 Cyber Conflict Issues -- 6.3.1 Intellectual Property Theft -- 6.3.2 Cyber Espionage -- 6.3.3 Cyber Sabotage -- 6.3.4 Cyber Warfare -- 6.4 Cyber Management Issues -- 6.4.1 Fiduciary Responsibility -- 6.4.2 Risk Management -- 6.4.3 Professional Certification -- 6.4.4 Supply Chain -- 6.4.5 Security Principles -- 6.4.6 Research and Development -- 6.5 Cyber Infrastructure Issues -- 6.5.1 Banking and Finance -- 6.5.2 Health Care.

6.5.3 Industrial Control Systems -- 7: One Government's Approach to Cyber Security Policy -- 7.1 U.S. Federal Cyber Security Strategy -- 7.2 A Brief History of Cyber Security Public Policy Development in the U.S. Federal Government -- 7.2.1 The Bombing of New York's World Trade Center on February 26, 1993 -- 7.2.2 Cyber Attacks against the United States Air Force, March-May 1994: Targeting the Pentagon -- 7.2.3 The Citibank Caper, June-October, 1994: How to Catch a Hacker -- 7.2.4 Murrah Federal Building, Oklahoma City-April 19, 1995: Major Terrorism Events and Their U.S. Outcomes -- 7.2.5 President's Commission on Critical Infrastructure Protection-1996 -- 7.2.6 Presidential Decision Directive 63-1998 -- 7.2.7 National Infrastructure Protection Center (NIPC) and ISACs-1998 -- 7.2.8 Eligible Receiver-1997 -- 7.2.9 Solar Sunrise-1998 -- 7.2.10 Joint Task Force-Computer Network Defense (JTF-CND)-1998 -- 7.2.11 Terrorist Attacks against the United States-September 11, 2001 Effects of Catastrophic Events on Transportation System Management and Operations -- 7.2.12 U.S. Government Response to the September 11, 2001 Terrorist Attacks -- 7.2.13 Homeland Security Presidential Directives -- 7.2.14 National Strategies -- 7.3 The Rise of Cyber Crime -- 7.4 Espionage and Nation-State Actions -- 7.5 Policy Response to Growing Espionage Threats: U.S. Cyber Command -- 7.6 Congressional Action -- 7.7 Summary -- 8: Conclusion -- Glossary -- References -- Index.
Abstract:
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale-taking great care to educate readers on the history and current approaches to the security of cyberspace. It includes thorough descriptions-as well as the pros and cons-of a plethora of issues, and documents policy alternatives for the sake of clarity with respect to policy alone. The Guidebook also delves into organizational implementation issues, and equips readers with descriptions of the positive and negative impact of specific policy choices. Inside are detailed chapters that: Explain what is meant by cyber security and cyber security policy Discuss the process by which cyber security policy goals are set Educate the reader on decision-making processes related to cyber security Describe a new framework and taxonomy for explaining cyber security policy issues Show how the U.S. government is dealing with cyber security policy issues With a glossary that puts cyber security language in layman's terms-and diagrams that help explain complex topics-Cyber Security Policy Guidebook gives students, scholars, and technical decision-makers the necessary knowledge to make informed decisions on cyber security policy.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: