Cyber Security Culture: Counteracting Cyber Threats Through Organizational Learning and Training
Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers of organizations across different industrial sectors and governmen...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Farnham
Routledge
2016
|
Schlagworte: | |
Zusammenfassung: | Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers of organizations across different industrial sectors and government agencies to better understand how organizational learning and training can be utilized to develop a culture that ultimately protects an organization from attacks. Peter Trim and David Upton believe that the speed and complexity of cyber-attacks demand a different approach to security management, including scenario-based planning and training, to supplement security policies and technical protection systems. The authors provide in-depth understanding of how organizational learning can produce cultural change addressing the behaviour of individuals, as well as machines. They provide information to help managers form policy to prevent cyber intrusions, to put robust security systems and procedures in place and to arrange appropriate training interventions such as table top exercises. Guidance embracing current and future threats and addressing issues such as social engineering is included. Although the work is embedded in a theoretical framework, non-technical staff will find the book of practical use because it renders highly technical subjects accessible and links firmly with areas beyond ICT, such as human resource management - in relation to bridging the education/training divide and allowing organizational learning to be embraced. This book will interest Government officials, policy advisors, law enforcement officers and senior managers within companies, as well as academics and students in a range of disciplines including management and computer science |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 online resource (235 pages) |
ISBN: | 9781409456957 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046074823 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190730s2016 |||| o||u| ||||||eng d | ||
020 | |a 9781409456957 |9 978-1-4094-5695-7 | ||
035 | |a (ZDB-30-PQE)EBC1128575 | ||
035 | |a (ZDB-89-EBL)EBL1128575 | ||
035 | |a (ZDB-38-EBR)ebr10658546 | ||
035 | |a (OCoLC)829461063 | ||
035 | |a (DE-599)BVBBV046074823 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 658.4/78 | |
084 | |a QH 740 |0 (DE-625)141614: |2 rvk | ||
100 | 1 | |a Trim, Peter |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyber Security Culture |b Counteracting Cyber Threats Through Organizational Learning and Training |
264 | 1 | |a Farnham |b Routledge |c 2016 | |
264 | 4 | |c © 2013 | |
300 | |a 1 online resource (235 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers of organizations across different industrial sectors and government agencies to better understand how organizational learning and training can be utilized to develop a culture that ultimately protects an organization from attacks. Peter Trim and David Upton believe that the speed and complexity of cyber-attacks demand a different approach to security management, including scenario-based planning and training, to supplement security policies and technical protection systems. The authors provide in-depth understanding of how organizational learning can produce cultural change addressing the behaviour of individuals, as well as machines. They provide information to help managers form policy to prevent cyber intrusions, to put robust security systems and procedures in place and to arrange appropriate training interventions such as table top exercises. Guidance embracing current and future threats and addressing issues such as social engineering is included. Although the work is embedded in a theoretical framework, non-technical staff will find the book of practical use because it renders highly technical subjects accessible and links firmly with areas beyond ICT, such as human resource management - in relation to bridging the education/training divide and allowing organizational learning to be embraced. This book will interest Government officials, policy advisors, law enforcement officers and senior managers within companies, as well as academics and students in a range of disciplines including management and computer science | ||
650 | 4 | |a Computer crimes -- Prevention | |
650 | 4 | |a Computer security | |
650 | 4 | |a Information technology -- Security measures | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Upton, David |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Trim, Peter |t Cyber Security Culture : Counteracting Cyber Threats Through Organizational Learning and Training |d Farnham : Routledge,c2016 |z 9781409456940 |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031455986 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804180360519483392 |
---|---|
any_adam_object | |
author | Trim, Peter |
author_facet | Trim, Peter |
author_role | aut |
author_sort | Trim, Peter |
author_variant | p t pt |
building | Verbundindex |
bvnumber | BV046074823 |
classification_rvk | QH 740 |
collection | ZDB-30-PQE |
ctrlnum | (ZDB-30-PQE)EBC1128575 (ZDB-89-EBL)EBL1128575 (ZDB-38-EBR)ebr10658546 (OCoLC)829461063 (DE-599)BVBBV046074823 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03587nmm a2200481zc 4500</leader><controlfield tag="001">BV046074823</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190730s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781409456957</subfield><subfield code="9">978-1-4094-5695-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC1128575</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1128575</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10658546</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)829461063</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046074823</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QH 740</subfield><subfield code="0">(DE-625)141614:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Trim, Peter</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber Security Culture</subfield><subfield code="b">Counteracting Cyber Threats Through Organizational Learning and Training</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Farnham</subfield><subfield code="b">Routledge</subfield><subfield code="c">2016</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (235 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers of organizations across different industrial sectors and government agencies to better understand how organizational learning and training can be utilized to develop a culture that ultimately protects an organization from attacks. Peter Trim and David Upton believe that the speed and complexity of cyber-attacks demand a different approach to security management, including scenario-based planning and training, to supplement security policies and technical protection systems. The authors provide in-depth understanding of how organizational learning can produce cultural change addressing the behaviour of individuals, as well as machines. They provide information to help managers form policy to prevent cyber intrusions, to put robust security systems and procedures in place and to arrange appropriate training interventions such as table top exercises. Guidance embracing current and future threats and addressing issues such as social engineering is included. Although the work is embedded in a theoretical framework, non-technical staff will find the book of practical use because it renders highly technical subjects accessible and links firmly with areas beyond ICT, such as human resource management - in relation to bridging the education/training divide and allowing organizational learning to be embraced. This book will interest Government officials, policy advisors, law enforcement officers and senior managers within companies, as well as academics and students in a range of disciplines including management and computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes -- Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology -- Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Upton, David</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Trim, Peter</subfield><subfield code="t">Cyber Security Culture : Counteracting Cyber Threats Through Organizational Learning and Training</subfield><subfield code="d">Farnham : Routledge,c2016</subfield><subfield code="z">9781409456940</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031455986</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV046074823 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:34:31Z |
institution | BVB |
isbn | 9781409456957 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031455986 |
oclc_num | 829461063 |
open_access_boolean | |
physical | 1 online resource (235 pages) |
psigel | ZDB-30-PQE |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Routledge |
record_format | marc |
spelling | Trim, Peter Verfasser aut Cyber Security Culture Counteracting Cyber Threats Through Organizational Learning and Training Farnham Routledge 2016 © 2013 1 online resource (235 pages) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers of organizations across different industrial sectors and government agencies to better understand how organizational learning and training can be utilized to develop a culture that ultimately protects an organization from attacks. Peter Trim and David Upton believe that the speed and complexity of cyber-attacks demand a different approach to security management, including scenario-based planning and training, to supplement security policies and technical protection systems. The authors provide in-depth understanding of how organizational learning can produce cultural change addressing the behaviour of individuals, as well as machines. They provide information to help managers form policy to prevent cyber intrusions, to put robust security systems and procedures in place and to arrange appropriate training interventions such as table top exercises. Guidance embracing current and future threats and addressing issues such as social engineering is included. Although the work is embedded in a theoretical framework, non-technical staff will find the book of practical use because it renders highly technical subjects accessible and links firmly with areas beyond ICT, such as human resource management - in relation to bridging the education/training divide and allowing organizational learning to be embraced. This book will interest Government officials, policy advisors, law enforcement officers and senior managers within companies, as well as academics and students in a range of disciplines including management and computer science Computer crimes -- Prevention Computer security Information technology -- Security measures Datensicherung (DE-588)4011144-1 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Internet (DE-588)4308416-3 s Datensicherung (DE-588)4011144-1 s 1\p DE-604 Upton, David Sonstige oth Erscheint auch als Druck-Ausgabe Trim, Peter Cyber Security Culture : Counteracting Cyber Threats Through Organizational Learning and Training Farnham : Routledge,c2016 9781409456940 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Trim, Peter Cyber Security Culture Counteracting Cyber Threats Through Organizational Learning and Training Computer crimes -- Prevention Computer security Information technology -- Security measures Datensicherung (DE-588)4011144-1 gnd Internet (DE-588)4308416-3 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4308416-3 |
title | Cyber Security Culture Counteracting Cyber Threats Through Organizational Learning and Training |
title_auth | Cyber Security Culture Counteracting Cyber Threats Through Organizational Learning and Training |
title_exact_search | Cyber Security Culture Counteracting Cyber Threats Through Organizational Learning and Training |
title_full | Cyber Security Culture Counteracting Cyber Threats Through Organizational Learning and Training |
title_fullStr | Cyber Security Culture Counteracting Cyber Threats Through Organizational Learning and Training |
title_full_unstemmed | Cyber Security Culture Counteracting Cyber Threats Through Organizational Learning and Training |
title_short | Cyber Security Culture |
title_sort | cyber security culture counteracting cyber threats through organizational learning and training |
title_sub | Counteracting Cyber Threats Through Organizational Learning and Training |
topic | Computer crimes -- Prevention Computer security Information technology -- Security measures Datensicherung (DE-588)4011144-1 gnd Internet (DE-588)4308416-3 gnd |
topic_facet | Computer crimes -- Prevention Computer security Information technology -- Security measures Datensicherung Internet |
work_keys_str_mv | AT trimpeter cybersecurityculturecounteractingcyberthreatsthroughorganizationallearningandtraining AT uptondavid cybersecurityculturecounteractingcyberthreatsthroughorganizationallearningandtraining |