Cyber resilience best practices:
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Norwich
TSO
2015
|
Schriftenreihe: | AXELOS global best practice
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XIV, 310 Seiten Illustrationen |
ISBN: | 9780113314638 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV043483666 | ||
003 | DE-604 | ||
005 | 20160523 | ||
007 | t | ||
008 | 160330s2015 a||| |||| 00||| eng d | ||
020 | |a 9780113314638 |9 978-0-11-331463-8 | ||
035 | |a (OCoLC)958880178 | ||
035 | |a (DE-599)BVBBV043483666 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-863 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
110 | 2 | |a AXELOS Limited |e Verfasser |0 (DE-588)1046092618 |4 aut | |
245 | 1 | 0 | |a Cyber resilience best practices |c AXELOS.com. |
264 | 1 | |a Norwich |b TSO |c 2015 | |
300 | |a XIV, 310 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a AXELOS global best practice | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection / Security measures | |
650 | 4 | |a Business enterprises / Computer networks / Security measures | |
650 | 4 | |a Unternehmen | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028900372&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-028900372 |
Datensatz im Suchindex
DE-BY-863_location | 1000 |
---|---|
DE-BY-FWS_call_number | 1000/ST 277 A969 |
DE-BY-FWS_katkey | 616670 |
DE-BY-FWS_media_number | 083101372171 |
_version_ | 1806176363108892672 |
adam_text | Contents
List of figures iv
List of tables vi
Foreword vii
Foreword viii
Preface ix
Acknowledgements xi
Contents summary xiii
1 Introduction 1
1.1 Intended audience 3
1.2 Making cyber resilience real through the use
of examples 4
1.3 Aligning cyber resilience with business
outcomes 4
1.4 What is cyber resilience? 5
1.5 Some important characteristics of
cyber resilience 10
1.6 Wider benefits of cyber resilience -
building trust 16
1.7 How to achieve a sufficient level of
cyber resilience 17
1.8 Scope of this publication 19
1.9 Introduction questions 20
2 Risk management 21
2.1 Management of Risk 24
2.2 Assets, threats, vulnerabilities and risks 24
2.3 Actions to address risks and opportunities 27
2.4 Risk management questions 36
3 Managing cyber resilience 37
3.1 The need for a single management system 39
3.2 The ITIL service lifecycle 46
3.3 Managing cyber resilience questions 49
4 Cyber resilience strategy 51
4.1 Control objectives and controls for a cyber
resilience strategy 53
4.2 Aligning cyber resilience strategy with
IT service strategy 63
4.3 Strategy scenarios 70
4.4 Cyber resilience strategy questions 77
5 Cyber resilience design 79
5.1 Control objectives and controls for cyber
resilience design 82
5.2 Aligning cyber resilience design with IT
service design 103
5.3 Design scenarios 118
5.4 Cyber resilience design questions 120
6 Cyber resilience transition 121
6.1 Control objectives and controls for cyber
resilience transition 125
6.2 Aligning cyber resilience transition with IT
service transition 137
6.3 Transition scenarios 153
6.4 Cyber resilience transition questions 155
7 Cyber resilience operation 157
7.1 Control objectives and controls for cyber
resilience operation 161
7.2 Aligning cyber resilience operation with IT
service operation 179
7.3 Operation scenarios 204
7.4 Cyber resilience operation questions 206
8 Cyber resilience continual improvement 207
8.1 Control objectives and controls for cyber
resilience continual improvement 210
8.2 Aligning cyber resilience continual
improvement with IT continual service improvement 225
8.3 Using the ITIL CSI approach to plan
cyber resilience improvements 232
8.4 Using MSP to plan and manage cyber
resilience improvements 236
8.5 Maturity models 236
8.6 Continual improvement scenarios 242
8.7 Cyber resilience continual improvement
questions 245
9 Cyber resilience roles and responsibilities 247
9.1 Roles and responsibilities across
the organization 249
9.2 Segregation of duties and dual controls 255
9.3 Cyber resilience roles and responsibilities
questions 257
Further research 259
Abbreviations and glossary 263
Index 303
|
any_adam_object | 1 |
author_corporate | AXELOS Limited |
author_corporate_role | aut |
author_facet | AXELOS Limited |
author_sort | AXELOS Limited |
building | Verbundindex |
bvnumber | BV043483666 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)958880178 (DE-599)BVBBV043483666 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01435nam a2200373 c 4500</leader><controlfield tag="001">BV043483666</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160523 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">160330s2015 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780113314638</subfield><subfield code="9">978-0-11-331463-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)958880178</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043483666</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-863</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="110" ind1="2" ind2=" "><subfield code="a">AXELOS Limited</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1046092618</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber resilience best practices</subfield><subfield code="c">AXELOS.com.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Norwich</subfield><subfield code="b">TSO</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 310 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">AXELOS global best practice</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises / Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028900372&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028900372</subfield></datafield></record></collection> |
id | DE-604.BV043483666 |
illustrated | Illustrated |
indexdate | 2024-08-01T11:20:07Z |
institution | BVB |
institution_GND | (DE-588)1046092618 |
isbn | 9780113314638 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028900372 |
oclc_num | 958880178 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-863 DE-BY-FWS |
owner_facet | DE-473 DE-BY-UBG DE-863 DE-BY-FWS |
physical | XIV, 310 Seiten Illustrationen |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | TSO |
record_format | marc |
series2 | AXELOS global best practice |
spellingShingle | Cyber resilience best practices Computer security Data protection / Security measures Business enterprises / Computer networks / Security measures Unternehmen Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4274324-2 |
title | Cyber resilience best practices |
title_auth | Cyber resilience best practices |
title_exact_search | Cyber resilience best practices |
title_full | Cyber resilience best practices AXELOS.com. |
title_fullStr | Cyber resilience best practices AXELOS.com. |
title_full_unstemmed | Cyber resilience best practices AXELOS.com. |
title_short | Cyber resilience best practices |
title_sort | cyber resilience best practices |
topic | Computer security Data protection / Security measures Business enterprises / Computer networks / Security measures Unternehmen Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer security Data protection / Security measures Business enterprises / Computer networks / Security measures Unternehmen Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028900372&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT axeloslimited cyberresiliencebestpractices |
Inhaltsverzeichnis
THWS Würzburg Zentralbibliothek Lesesaal
Signatur: |
1000 ST 277 A969 |
---|---|
Exemplar 1 | ausleihbar Verfügbar Bestellen |