Dimensions
142 x 217 x 22mm
The goals of the cyberterrorist, the cyberactivist and cyber attacks originating from nation states are normally quite different. However, the techniques they use to achieve their goals are similar: stealing information/exfiltration, disrupting business-as-usual operations or organisations and undermining political/economic credibility.
Many books on cybersecurity focus on technical responses to these threats. As important as this is, human fallibility and known vulnerabilities will still allow hackers to get through. This book encourages cybersecurity professionals to take a wider view of what cybersecurity means, and exploit international standards and best practice as a resource for creating a culture of cybersecurity awareness within their organizations to supplement technical solutions such as firewalls and anti-virus software.
This new edition includes an updated body of knowledge that describes how to acquire, develop, and sustain a secure information environment that goes beyond technology and into a cyber aware organisational culture. Related references, as well as recommendations for additional reading are included at the end of each chapter, making this valuable resource for trainers and researchers as well as cybersecurity practitioners.