Developing Cybersecurity Programs and Policies

The full text downloaded to your computer With eBooks you can: search for key concepts, words and phrases make highlights and notes as you study ...
Publisher: Pearson D
ISBN: 9780134858548
$77.95
Your price: $74.05

The full text downloaded to your computer

With eBooks you can:

  • search for key concepts, words and phrases
  • make highlights and notes as you study
  • share your notes with friends

eBooks are downloaded to your computer and accessible either offline through the Bookshelf (available as a free download), available online and also via the iPad and Android apps.

Upon purchase, you'll gain instant access to this eBook.

Time limit

The eBooks products do not have an expiry date. You will continue to access your digital ebook products whilst you have your Bookshelf installed.

This book is a complete guide to establishing a cybersecurity program and governance in your organisation. In this book, you will learn how to create cybersecurity policies, standards, procedures, guidelines, and plans —and the differences among them. This book covers the Confidentiality, Integrity & Availability (CIA) security model. You will also learn how threat actors are launching attacks against their victims compromising confidentiality, integrity, and availability of systems and networks. This book covers the NIST Cybersecurity Framework and ISO/IEC 27000-series standards. You will learn how to align security with business strategy, as well as define, inventory, and classify your information and systems.

This book teaches you how to systematically identify, prioritise, and manage cybersecurity risks and reduce social engineering (human) risks with role-based Security Education, Awareness, and Training (SETA). You will also learn how to implement effective physical, environmental, communications, and operational security; and effectively manage access control. In this book you will learn how to respond to incidents and ensure continuity of operations and how to comply with laws and regulations, including GLBA, HIPAA/HITECH, FISMA, state data security and notification rules, and PCI DSS.

Products specifications
Attribute nameAttribute value
FormatElectronic book text
AudienceCollege / higher education
Author(s)Omar Santos
Edition3