Business continuity in a cyber world: surviving cyberattacks
1. The practice of business continuity management -- 2. A brief overview of the risk management process -- 3. The main cybersecurity issues -- 4. Information assets and impacts -- 5. Vulnerabilities and threats -- 6. Selecting strategic, tactical, and operational solutions -- 7. Business continuity...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, New York (222 East 46th Street, New York, NY 10017)
Business Expert Press
2018
|
Ausgabe: | First edition |
Schriftenreihe: | Information systems collection
|
Schlagworte: | |
Online-Zugang: | FHN01 FWS01 FWS02 UBY01 Volltext |
Zusammenfassung: | 1. The practice of business continuity management -- 2. A brief overview of the risk management process -- 3. The main cybersecurity issues -- 4. Information assets and impacts -- 5. Vulnerabilities and threats -- 6. Selecting strategic, tactical, and operational solutions -- 7. Business continuity activities and solutions -- 8. Testing, exercising, and maintaining plans -- 9. Embedding cybersecurity and business continuity -- Appendix A. Information on cybersecurity controls -- Appendix B. Standards and good practice guidelines -- Glossary -- Bibliography -- About the author -- Index Until recently, if it has been considered at all in the context of business continuity, cybersecurity may have been thought of in terms of disaster recovery and little else. Recent events have shown that cyberattacks are now an everyday occurrence, and it is becoming clear that the impact of these can have devastating effects on organizations whether large and small, and whether in the public or the private sector. Cybersecurity is one aspect of information security, since the impacts or consequences of a cyberattack will inevitably damage one or more of the three pillars of information security: the confidentiality, integrity, or availability of an organization's information assets. The main difference between information security and cybersecurity is that while information security deals with all types of information assets, cybersecurity deals purely with those that are accessible by means of interconnected electronic networks, including the Internet. Many responsible organizations now have robust information security, business continuity, and disaster recovery programs in place, and it is not the intention of this book to rewrite those, but to inform organizations about the kind of precautions they should take to stave off successful cyberattacks and how they should deal with them when they arise in order to protect their day-to-day business |
Beschreibung: | Includes bibliographical references (pages 169-170) and index |
Beschreibung: | Online-Ressource (xix, 182 pages) |
ISBN: | 9781947441477 9781947441460 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045876467 | ||
003 | DE-604 | ||
005 | 20240417 | ||
007 | cr|uuu---uuuuu | ||
008 | 190514s2018 |||| o||u| ||||||eng d | ||
020 | |a 9781947441477 |9 978-1-947441-47-7 | ||
020 | |a 9781947441460 |9 978-1-947441-46-0 | ||
035 | |a (ZDB-191-BEX)9781947441477 | ||
035 | |a (OCoLC)1045429075 | ||
035 | |a (DE-599)BVBBV045876467 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-863 |a DE-862 |a DE-92 |a DE-706 | ||
082 | 0 | |a 363.325 |2 23 | |
100 | 1 | |a Sutton, David |e Verfasser |4 aut | |
245 | 1 | 0 | |a Business continuity in a cyber world |b surviving cyberattacks |c David Sutton |
250 | |a First edition | ||
264 | 1 | |a New York, New York (222 East 46th Street, New York, NY 10017) |b Business Expert Press |c 2018 | |
300 | |a Online-Ressource (xix, 182 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Information systems collection | |
500 | |a Includes bibliographical references (pages 169-170) and index | ||
520 | |a 1. The practice of business continuity management -- 2. A brief overview of the risk management process -- 3. The main cybersecurity issues -- 4. Information assets and impacts -- 5. Vulnerabilities and threats -- 6. Selecting strategic, tactical, and operational solutions -- 7. Business continuity activities and solutions -- 8. Testing, exercising, and maintaining plans -- 9. Embedding cybersecurity and business continuity -- Appendix A. Information on cybersecurity controls -- Appendix B. Standards and good practice guidelines -- Glossary -- Bibliography -- About the author -- Index | ||
520 | |a Until recently, if it has been considered at all in the context of business continuity, cybersecurity may have been thought of in terms of disaster recovery and little else. Recent events have shown that cyberattacks are now an everyday occurrence, and it is becoming clear that the impact of these can have devastating effects on organizations whether large and small, and whether in the public or the private sector. Cybersecurity is one aspect of information security, since the impacts or consequences of a cyberattack will inevitably damage one or more of the three pillars of information security: the confidentiality, integrity, or availability of an organization's information assets. The main difference between information security and cybersecurity is that while information security deals with all types of information assets, cybersecurity deals purely with those that are accessible by means of interconnected electronic networks, including the Internet. Many responsible organizations now have robust information security, business continuity, and disaster recovery programs in place, and it is not the intention of this book to rewrite those, but to inform organizations about the kind of precautions they should take to stave off successful cyberattacks and how they should deal with them when they arise in order to protect their day-to-day business | ||
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Risk management | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781947441460 |
856 | 4 | 0 | |u http://portal.igpublish.com/iglibrary/search/BEPB0000763.html |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-191-BEX | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031259685 | ||
966 | e | |u https://portal.igpublish.com/iglibrary/search/BEPB0000763.html |l FHN01 |p ZDB-191-BEX |x Verlag |3 Volltext | |
966 | e | |u http://portal.igpublish.com/iglibrary/search/BEPB0000763.html |l FWS01 |p ZDB-191-BEX |x Verlag |3 Volltext | |
966 | e | |u http://portal.igpublish.com/iglibrary/search/BEPB0000763.html |l FWS02 |p ZDB-191-BEX |x Verlag |3 Volltext | |
966 | e | |u http://portal.igpublish.com/iglibrary/search/BEPB0000763.html |l UBY01 |p ZDB-191-BEX |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 724611 |
---|---|
_version_ | 1806188255431884800 |
any_adam_object | |
author | Sutton, David |
author_facet | Sutton, David |
author_role | aut |
author_sort | Sutton, David |
author_variant | d s ds |
building | Verbundindex |
bvnumber | BV045876467 |
collection | ZDB-191-BEX |
ctrlnum | (ZDB-191-BEX)9781947441477 (OCoLC)1045429075 (DE-599)BVBBV045876467 |
dewey-full | 363.325 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325 |
dewey-search | 363.325 |
dewey-sort | 3363.325 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
edition | First edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03852nmm a2200457zc 4500</leader><controlfield tag="001">BV045876467</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240417 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190514s2018 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781947441477</subfield><subfield code="9">978-1-947441-47-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781947441460</subfield><subfield code="9">978-1-947441-46-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-191-BEX)9781947441477</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1045429075</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045876467</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.325</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sutton, David</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Business continuity in a cyber world</subfield><subfield code="b">surviving cyberattacks</subfield><subfield code="c">David Sutton</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, New York (222 East 46th Street, New York, NY 10017)</subfield><subfield code="b">Business Expert Press</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">Online-Ressource (xix, 182 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Information systems collection</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 169-170) and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">1. The practice of business continuity management -- 2. A brief overview of the risk management process -- 3. The main cybersecurity issues -- 4. Information assets and impacts -- 5. Vulnerabilities and threats -- 6. Selecting strategic, tactical, and operational solutions -- 7. Business continuity activities and solutions -- 8. Testing, exercising, and maintaining plans -- 9. Embedding cybersecurity and business continuity -- Appendix A. Information on cybersecurity controls -- Appendix B. Standards and good practice guidelines -- Glossary -- Bibliography -- About the author -- Index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Until recently, if it has been considered at all in the context of business continuity, cybersecurity may have been thought of in terms of disaster recovery and little else. Recent events have shown that cyberattacks are now an everyday occurrence, and it is becoming clear that the impact of these can have devastating effects on organizations whether large and small, and whether in the public or the private sector. Cybersecurity is one aspect of information security, since the impacts or consequences of a cyberattack will inevitably damage one or more of the three pillars of information security: the confidentiality, integrity, or availability of an organization's information assets. The main difference between information security and cybersecurity is that while information security deals with all types of information assets, cybersecurity deals purely with those that are accessible by means of interconnected electronic networks, including the Internet. Many responsible organizations now have robust information security, business continuity, and disaster recovery programs in place, and it is not the intention of this book to rewrite those, but to inform organizations about the kind of precautions they should take to stave off successful cyberattacks and how they should deal with them when they arise in order to protect their day-to-day business</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781947441460</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://portal.igpublish.com/iglibrary/search/BEPB0000763.html</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-191-BEX</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031259685</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/BEPB0000763.html</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-191-BEX</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://portal.igpublish.com/iglibrary/search/BEPB0000763.html</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-191-BEX</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://portal.igpublish.com/iglibrary/search/BEPB0000763.html</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-191-BEX</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://portal.igpublish.com/iglibrary/search/BEPB0000763.html</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-191-BEX</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045876467 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T14:29:09Z |
institution | BVB |
isbn | 9781947441477 9781947441460 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031259685 |
oclc_num | 1045429075 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-92 DE-706 |
owner_facet | DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-92 DE-706 |
physical | Online-Ressource (xix, 182 pages) |
psigel | ZDB-191-BEX |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Business Expert Press |
record_format | marc |
series2 | Information systems collection |
spellingShingle | Sutton, David Business continuity in a cyber world surviving cyberattacks Cyberterrorism Risk management |
title | Business continuity in a cyber world surviving cyberattacks |
title_auth | Business continuity in a cyber world surviving cyberattacks |
title_exact_search | Business continuity in a cyber world surviving cyberattacks |
title_full | Business continuity in a cyber world surviving cyberattacks David Sutton |
title_fullStr | Business continuity in a cyber world surviving cyberattacks David Sutton |
title_full_unstemmed | Business continuity in a cyber world surviving cyberattacks David Sutton |
title_short | Business continuity in a cyber world |
title_sort | business continuity in a cyber world surviving cyberattacks |
title_sub | surviving cyberattacks |
topic | Cyberterrorism Risk management |
topic_facet | Cyberterrorism Risk management |
url | http://portal.igpublish.com/iglibrary/search/BEPB0000763.html |
work_keys_str_mv | AT suttondavid businesscontinuityinacyberworldsurvivingcyberattacks |