Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама



Название: Developing Cybersecurity Programs and Policies in an AI-Driven World, 4th Edition (Early Release)
Автор: Omar Santos
Издательство: Pearson IT Certification
Год: 2024
Страниц: 657
Язык: английский
Формат: epub
Размер: 32.2 MB

Developing Cybersecurity Programs and Policies is a complete guide to establishing a cyber security program and governance in your organization. In this book, you will learn how to create cyber security policies, standards, procedures, guidelines, and plans-and the differences among them. You will also learn how threat actors are launching attacks against their victims-compromising confidentiality, integrity, and availability of systems and networks.

Santos starts by providing an overview of cybersecurity policy and governance, and how to create cybersecurity policies and develop a cybersecurity framework. He then provides details about governance, risk management, asset management, and data loss prevention.

The number of cyber attacks continues to rise. Demand for safe and secure data and other concerns mean that companies need professionals to keep their information safe. Cybersecurity risk includes not only the risk of a data breach but the risk of an entire organization being undermined via business activities that rely on digitization and accessibility. As a result, learning how to develop an adequate cybersecurity program is crucial for any organization. Cybersecurity can no longer be something that you delegate to the information technology (IT) team. Everyone needs to be involved, including the board of directors.

This book begins with a foundational overview of cybersecurity policy and governance to set the stage for the need for balance between policy and practicality in cybersecurity programs. It then goes into detail on cybersecurity policy organization, format, and styles, providing insights into crafting effective and adaptable policies.

As the book progresses, it covers topics such as cloud security, governance and risk management, and asset management and data loss prevention, which are just some of the multifaceted challenges organizations face in securing their assets. Cloud security is paramount in today’s environments because of the need to protect data, applications, and infrastructures operated over the cloud. As businesses and organizations increasingly use cloud services, the complexity and volume of cyber threats escalate. Cloud security is important to ensure compliance with rigorous regulatory requirements and industry standards. It plays a crucial role in enabling the safe adoption of cloud technologies, enabling innovation and agility.

Learn how to:

Respond to incidents and ensure continuity of operations
Comply with laws and regulations, including GLBA, HIPAA/HITECH, FISMA, state data security and notification rules, and PCI DSS
Systematically identify, prioritize, and manage cyber security risks and reduce social engineering (human) risks with role-based Security Education, Awareness, and Training (SETA)
Incorporate human resources, physical, and environmental security as important elements of your cybersecurity program.
Implement appropriate security controls in the cloud, often using automation
Understand Identity and Access Management (IAM)

This book includes:

Practical, hands-on exercises related to several key topics to defend various cloud workloads operating in the different CSP models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), and Functions as a Service (FaaS)
Covers NIST Cyber Security Framework and ISO/IEC 27000-series standards

Скачать Developing Cybersecurity Programs and Policies in an AI-Driven World, 4th Edition (Early Release)








ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!







Автор: Ingvar16 22-05-2024, 10:41 | Напечатать |
 
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.





С этой публикацией часто скачивают:

Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.


 MirKnig.Su  ©2024     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности