Cybersecurity & Homeland Security
Afbeeldingen
Artikel vergelijken
- Engels
- Paperback
- 9781594547287
- 01 januari 2006
- 138 pagina's
Samenvatting
Even before the terrorist attacks of September 2001, concerns had been rising among security experts about the vulnerabilities to attack of computer systems and associated infrastructure. Yet, despite increasing attention from federal and state governments and international organisations, the defence against attacks on these systems has appeared to be generally fragmented and varying widely in effectiveness. Concerns have grown that what is needed is a national cybersecurity framework -- a co-ordinated, coherent set of public- and private-sector efforts required to ensure an acceptable level of cybersecurity for the nation. As commonly used, cybersecurity refers to three things: measures to protect information technology; the information it contains, processes, and transmits, and associated physical and virtual elements (which together comprise cyberspace); the degree of protection resulting from application of those measures; and the associated field of professional endeavour. Virtually any element of cyberspace can be at risk, and the degree of interconnection of those elements can make it difficult to determine the extent of the cybersecurity framework that is needed. Identifying the major weaknesses in U.S. cybersecurity is an area of some controversy. However, some components appear to be sources of potentially significant risk because either major vulnerabilities have been identified or substantial impacts could result from a successful attack -- in particular, components that play critical roles in elements of critical infrastructure, widely used commercial software, organisational governance, and the level of public knowledge and perception about cybersecurity. There are several options for broadly addressing weaknesses in cybersecurity. They include adopting standards and certification, promulgating best practices and guidelines, using benchmarks and checklists, use of auditing, improving training and education, building security into enterprise architecture, using risk management, and using metrics. These different approaches all have different strengths and weaknesses with respect to how they might contribute to the development of a national framework for cybersecurity. None of them are likely to be widely adopted in the absence of sufficient economic incentives for cybersecurity.
Productspecificaties
Wij vonden geen specificaties voor jouw zoekopdracht '{SEARCH}'.
Inhoud
- Taal
- en
- Bindwijze
- Paperback
- Oorspronkelijke releasedatum
- 01 januari 2006
- Aantal pagina's
- 138
- Illustraties
- Nee
Betrokkenen
- Hoofdredacteur
- Lin V Choi
- Hoofduitgeverij
- Nova Science Publishers
Overige kenmerken
- Editie
- New title
- Extra groot lettertype
- Nee
- Product breedte
- 140 mm
- Product hoogte
- 13 mm
- Product lengte
- 216 mm
- Studieboek
- Nee
- Verpakking breedte
- 140 mm
- Verpakking hoogte
- 13 mm
- Verpakking lengte
- 216 mm
- Verpakkingsgewicht
- 220 g
EAN
- EAN
- 9781594547287
Je vindt dit artikel in
- Categorieën
- Taal
- Engels
- Beschikbaarheid
- Leverbaar
- Boek, ebook of luisterboek?
- Boek
- Studieboek of algemeen
- Algemene boeken
Kies gewenste uitvoering
Bindwijze
: Paperback
Prijsinformatie en bestellen
De prijs van dit product is 70 euro en 01 cent.
1 - 2 weken
Verkoop door
MyBoeken.nl
- Bestellen en betalen via bol
- Prijs inclusief verzendkosten, verstuurd door MyBoeken.nl
- 30 dagen bedenktijd en gratis retourneren
- Wettelijke garantie via MyBoeken.nl
Shop dit artikel
Rapporteer dit artikel
Je wilt melding doen van illegale inhoud over dit artikel:
- Ik wil melding doen als klant
- Ik wil melding doen als autoriteit of trusted flagger
- Ik wil melding doen als partner
- Ik wil melding doen als merkhouder
Geen klant, autoriteit, trusted flagger, merkhouder of partner? Gebruik dan onderstaande link om melding te doen.