Midlands State University Library
Image from Google Jackets

Cyber security : an introduction for non-technical managers created by Jeremy S Green

By: Material type: TextTextLanguage: English Publication details: Surrey Gower 2015Description: 255 pages 23 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781472466730
Subject(s): LOC classification:
  • HF5548.37 GRE
Contents:
Cyber security and cyber risk -- A holistic approach to cyber security -- The scope of cyber security -- Systems risks -- People and networks -- Cloud computing -- Bring your own device -- Protecting people -- Keeping data secure outside the office -- Social media risk -- Who is stealing your organisation's identity? -- Disposing of data safely -- The internet of things -- Developing a cyber security strategy -- Picking the right team -- Getting prepared -- Developing a risk register -- Managing the impact of cyber incidents -- Responding to incidents -- Digital governance -- Afterword : looking from the past to the future.
Summary: This publication provides a detailed analysis of some of the key cyber security risks facing business today, and provides useful guidance on how to develop an effective strategy to address them.' Andy Williams, Cyber Connect UK 'Advances in technology bring enormous benefits but also pose significant risks. Managing these risks will challenge all organizations, whatever their sector or size. This book is a welcome addition to the guidance available and, importantly, emphasizes the role of behavioral issues as well as technical solutions to achieve effective cyber security.' Carolyn Williams, The Institute of Risk Management 'Jeremy Swinfen Green has succeeded in creating a cybersecurity book that is both well written and uses the language of business management. This is just the right reference for managers who need to understand key cybersecurity concepts and threats and how they can manage the risks.
Reviews from LibraryThing.com:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Book Book Harare Campus Library Open Shelf HF5548.37 GRE (Browse shelf(Opens below)) 149543 Available BK136165
Core Collection Harare Campus Library Core Collection HF5548.37 GRE (Browse shelf(Opens below)) 149542 Available BK136162
Book Book Harare Campus Library Open Shelf HF5548.37 GRE (Browse shelf(Opens below)) 149541 Available BK136093

Includes bibliographical references and index.

Cyber security and cyber risk -- A holistic approach to cyber security -- The scope of cyber security -- Systems risks -- People and networks -- Cloud computing -- Bring your own device -- Protecting people -- Keeping data secure outside the office -- Social media risk -- Who is stealing your organisation's identity? -- Disposing of data safely -- The internet of things -- Developing a cyber security strategy -- Picking the right team -- Getting prepared -- Developing a risk register -- Managing the impact of cyber incidents -- Responding to incidents -- Digital governance -- Afterword : looking from the past to the future.

This publication provides a detailed analysis of some of the key cyber security risks facing business today, and provides useful guidance on how to develop an effective strategy to address them.' Andy Williams, Cyber Connect UK 'Advances in technology bring enormous benefits but also pose significant risks. Managing these risks will challenge all organizations, whatever their sector or size. This book is a welcome addition to the guidance available and, importantly, emphasizes the role of behavioral issues as well as technical solutions to achieve effective cyber security.' Carolyn Williams, The Institute of Risk Management 'Jeremy Swinfen Green has succeeded in creating a cybersecurity book that is both well written and uses the language of business management. This is just the right reference for managers who need to understand key cybersecurity concepts and threats and how they can manage the risks.

There are no comments on this title.

to post a comment.