Cyber security culture: counteracting cyber threats through organizational learning and training
Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers in industry and government to understand how organizational learni...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Farnham, Surrey [u.a.]
Gower
2013
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers in industry and government to understand how organizational learning and training can be utilized to develop a culture that protects an organization from attacks. The authors provide information to help managers form policy and procedures, to undertake scenario-based planning and arrange appropriate training interventions, such as table top exercises.Although the |
Beschreibung: | XX, 211 S. |
ISBN: | 9781409456940 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV040972466 | ||
003 | DE-604 | ||
005 | 20130731 | ||
007 | t | ||
008 | 130429s2013 |||| 00||| eng d | ||
020 | |a 9781409456940 |c hbk |9 978-1-409-45694-0 | ||
035 | |a (OCoLC)854695066 | ||
035 | |a (DE-599)GBV741676443 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-188 | ||
084 | |a QH 740 |0 (DE-625)141614: |2 rvk | ||
100 | 1 | |a Trim, Peter R. J. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyber security culture |b counteracting cyber threats through organizational learning and training |c Peter Trim and David Upton |
264 | 1 | |a Farnham, Surrey [u.a.] |b Gower |c 2013 | |
300 | |a XX, 211 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
520 | 1 | |a Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers in industry and government to understand how organizational learning and training can be utilized to develop a culture that protects an organization from attacks. The authors provide information to help managers form policy and procedures, to undertake scenario-based planning and arrange appropriate training interventions, such as table top exercises.Although the | |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Upton, David |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, EPUB |z 978-1-409-47457-9 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, PDF |z 978-1-409-45695-7 |
856 | 4 | 2 | |m Digitalisierung UB Bamberg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025950638&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-025950638 |
Datensatz im Suchindex
_version_ | 1804150287470952448 |
---|---|
adam_text | Contents
List of Figures
{χ
List of Tables x{
About the Authors
ц
Foreword xv
Preface xix
Introduction and Background to the Research
1
1.0
Introduction
1
1.1
The Relevance of Training Exercises
1
1.2
Scenario Planning
3
1.3
Simulation Exercises and the Learning Organization Approach
4
1.4
The Alternative Worlds Project
7
1.5
Methodological Approach and the Main Steps in the Research
Process
8
1.6
The Data Collection Process
9
1.7
Ethical Issues
14
1.8
Conclusion
15
Social Engineering
21
2.0
Introduction
21
2.1
The Size of the Problem
21
2.2
What is Social Engineering ?
23
2.3
Who Does This, and Why?
27
2.4
Targets: The Employees
32
2.5
The Contrast with the Real World
35
2.6
Conclusion
38
Organizational Issues Relating to Critical Information
Infrastructure Protection 43
3.0
Introduction 43
CYBER
SECURITY
CULTURE
3.1
Placing Critical Information Infrastructure Protection in Context
45
3.2
Current Issues, Threats and Ways to Co-operate
47
3.3
A Joint Training Approach
51
3.4
Organizational Culture and Corporate Security Education
52
3.5
A Joint Security Approach
56
3.6
Disaster and Emergency Management
57
3.7
Developing a Joint Security Approach
59
3.8
A New Stakeholder Security Agenda
60
3.9
Cyber Security and an Organizational Response
63
3.10
Conclusion
66
Protecting Critical Information Infrastructure: Issues and
Considerations
71
4.0
Introduction
71
4.1
General Overview
71
4.2
Issues and Considerations Relating to Critical Information
Infrastructure Protection (CUP)
73
4.3
Wider Implications and the Public and Private Sectors
74
4.4
Strategic Framework
77
4.5
Placing Matters in Context
82
4.6
Cyber Attacks
83
4.7
Towards a Possible Solution
85
4.8
Conclusion
94
Critical Information Infrastructure: Methods of Conceptualizing
Interdependencies that No One Person Fully Understands
97
5.0
Introduction
97
5.1
Traditional Analysis
98
5.2
Effects-based Analysis and Modelling
100
5.3
A Layered Approach
104
5.4
Protean Systems
5.5
The Black Box Model
5.6
A Bottom-up Approach
5.7
Conclusion
Insights into Organizational Learning
И9
6.0
Introduction
lín
6.1
Organizational Learning and Case Study Narrative
119
6.2
A Review and Reflection of Organizational Learning
125
6.3
Discussion 1 ~n
6.4
Conclusion
., ,.
CONTENTS
Critical
Information
Infrastructure Road Map
141
7.0
Introduction
141
7.1
Changes to the Road Map
143
7.2
Who are the Stakeholders During a CUP Incident?
144
7.3
Interactions
1:
Information Flow
148
7.4
Interactions
2:
Providing Assistance or Advice
150
7.5
Interactions
3:
Responsibility for Maintaining Systems
151
7.6
The Road Map and the Way Forward
154
The Learning Organization and Managing Change
169
8.0
Introduction
169
8.1
Training, Staff Development and Strategy Implementation
169
8.2
The Learning Organization Concept and Organizational
Learning
172
8.3
International Project Groups
177
8.4
Changing Organizational Attitudes and Mindsets
182
8.5
Conclusion
185
Devising an Effective Counter Threat Strategy
189
9.0
Introduction
189
9.1
An Effective Counterintelligence Policy
190
9.2
Devising an Organizational Cyber Security Policy
195
9.3
The Importance of Training
197
9.4
Conclusion
201
Index
205
|
any_adam_object | 1 |
author | Trim, Peter R. J. Upton, David |
author_facet | Trim, Peter R. J. Upton, David |
author_role | aut aut |
author_sort | Trim, Peter R. J. |
author_variant | p r j t prj prjt d u du |
building | Verbundindex |
bvnumber | BV040972466 |
classification_rvk | QH 740 |
ctrlnum | (OCoLC)854695066 (DE-599)GBV741676443 |
discipline | Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02145nam a2200385 c 4500</leader><controlfield tag="001">BV040972466</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130731 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">130429s2013 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781409456940</subfield><subfield code="c">hbk</subfield><subfield code="9">978-1-409-45694-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)854695066</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV741676443</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QH 740</subfield><subfield code="0">(DE-625)141614:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Trim, Peter R. J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber security culture</subfield><subfield code="b">counteracting cyber threats through organizational learning and training</subfield><subfield code="c">Peter Trim and David Upton</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Farnham, Surrey [u.a.]</subfield><subfield code="b">Gower</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XX, 211 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="1" ind2=" "><subfield code="a">Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers in industry and government to understand how organizational learning and training can be utilized to develop a culture that protects an organization from attacks. The authors provide information to help managers form policy and procedures, to undertake scenario-based planning and arrange appropriate training interventions, such as table top exercises.Although the</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Upton, David</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, EPUB</subfield><subfield code="z">978-1-409-47457-9</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, PDF</subfield><subfield code="z">978-1-409-45695-7</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025950638&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025950638</subfield></datafield></record></collection> |
id | DE-604.BV040972466 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T00:36:32Z |
institution | BVB |
isbn | 9781409456940 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025950638 |
oclc_num | 854695066 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-188 |
owner_facet | DE-473 DE-BY-UBG DE-188 |
physical | XX, 211 S. |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Gower |
record_format | marc |
spelling | Trim, Peter R. J. Verfasser aut Cyber security culture counteracting cyber threats through organizational learning and training Peter Trim and David Upton Farnham, Surrey [u.a.] Gower 2013 XX, 211 S. txt rdacontent n rdamedia nc rdacarrier Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers in industry and government to understand how organizational learning and training can be utilized to develop a culture that protects an organization from attacks. The authors provide information to help managers form policy and procedures, to undertake scenario-based planning and arrange appropriate training interventions, such as table top exercises.Although the Internet (DE-588)4308416-3 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Internet (DE-588)4308416-3 s Datensicherung (DE-588)4011144-1 s DE-604 Upton, David Verfasser aut Erscheint auch als Online-Ausgabe, EPUB 978-1-409-47457-9 Erscheint auch als Online-Ausgabe, PDF 978-1-409-45695-7 Digitalisierung UB Bamberg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025950638&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Trim, Peter R. J. Upton, David Cyber security culture counteracting cyber threats through organizational learning and training Internet (DE-588)4308416-3 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4308416-3 (DE-588)4011144-1 |
title | Cyber security culture counteracting cyber threats through organizational learning and training |
title_auth | Cyber security culture counteracting cyber threats through organizational learning and training |
title_exact_search | Cyber security culture counteracting cyber threats through organizational learning and training |
title_full | Cyber security culture counteracting cyber threats through organizational learning and training Peter Trim and David Upton |
title_fullStr | Cyber security culture counteracting cyber threats through organizational learning and training Peter Trim and David Upton |
title_full_unstemmed | Cyber security culture counteracting cyber threats through organizational learning and training Peter Trim and David Upton |
title_short | Cyber security culture |
title_sort | cyber security culture counteracting cyber threats through organizational learning and training |
title_sub | counteracting cyber threats through organizational learning and training |
topic | Internet (DE-588)4308416-3 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Internet Datensicherung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025950638&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT trimpeterrj cybersecurityculturecounteractingcyberthreatsthroughorganizationallearningandtraining AT uptondavid cybersecurityculturecounteractingcyberthreatsthroughorganizationallearningandtraining |