Next-Generation Enterprise Security and Governance:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Milton
Taylor & Francis Group
2022
|
Schriftenreihe: | Security, Audit and Leadership Ser
|
Schlagworte: | |
Online-Zugang: | DE-1050 DE-2070s |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 Online-Ressource (265 Seiten) |
ISBN: | 9781000569797 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV048830893 | ||
003 | DE-604 | ||
005 | 20230920 | ||
007 | cr|uuu---uuuuu | ||
008 | 230224s2022 xx o|||| 00||| eng d | ||
020 | |a 9781000569797 |9 978-1-00-056979-7 | ||
035 | |a (ZDB-30-PQE)EBC6949438 | ||
035 | |a (ZDB-30-PAD)EBC6949438 | ||
035 | |a (ZDB-89-EBL)EBL6949438 | ||
035 | |a (OCoLC)1311321155 | ||
035 | |a (DE-599)BVBBV048830893 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-2070s |a DE-1050 | ||
082 | 0 | |a 658.478 | |
100 | 1 | |a Ahmed, Mohiuddin |e Verfasser |4 aut | |
245 | 1 | 0 | |a Next-Generation Enterprise Security and Governance |
264 | 1 | |a Milton |b Taylor & Francis Group |c 2022 | |
264 | 4 | |c ©2022 | |
300 | |a 1 Online-Ressource (265 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Security, Audit and Leadership Ser | |
500 | |a Description based on publisher supplied metadata and other sources | ||
505 | 8 | |a Intro -- Half Title -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Contributors -- Chapter 1: Enterprise Threat Intelligence -- 1.1 Introduction: Security Risk & -- Intelligence -- 1.1.1 Chapter Roadmap -- 1.2 Organized Crime -- 1.2.1 Identity Theft -- 1.2.1.1 Countermeasures -- 1.2.2 Financial & -- Asset System Targeting -- 1.2.2.1 Payment Card Attacks -- 1.2.2.1.1 Countermeasures -- 1.2.2.2 Business Email Compromise (BEC) -- 1.2.2.2.1 Countermeasures -- 1.2.2.3 Direct Financial System Attacks -- 1.2.2.3.1 Countermeasures -- 1.2.2.4 Crypto Currency Attacks -- 1.2.2.4.1 Countermeasures -- 1.2.3 Extortion -- 1.2.3.1 Denial of Service (DoS) -- 1.2.3.1.1 Countermeasures -- 1.2.3.2 Ransomware -- 1.2.3.2.1 Countermeasures -- 1.2.4 Infrastructure Squatting -- 1.2.4.1 Countermeasures -- 1.3 Nation States -- 1.3.1 Espionage -- 1.3.1.1 Countermeasures -- 1.3.2 Financial Gain -- 1.3.2.1 Countermeasures -- 1.3.3 Sabotage -- 1.3.3.1 Countermeasures -- 1.3.4 Influence -- 1.3.4.1 Countermeasures -- 1.4 Hacktivists -- 1.4.1 Countermeasures -- 1.5 Cyber Terrorism -- 1.5.1 Countermeasures -- 1.6 Insider Threats -- 1.6.1 Countermeasures -- 1.7 Future Threats -- 1.7.1 Artificial Intelligence (AI) -- 1.7.1.1 AI: Cyber Offensive Applications -- 1.7.1.1.1 Deepfakes (Synthetic Media) -- 1.7.1.2 AI: Cyber Security Applications -- 1.7.2 Adversarial Machine Learning -- 1.7.3 Quantum-Insecure Cryptography -- 1.7.4 Cyber-Physical Systems -- 1.8 Conclusion -- Notes -- References -- Chapter 2: Enabling Corporate and Institutional Governance for Effective IT Governance -- 2.1 Introduction -- 2.2 Governance and Strategy -- 2.3 Current IT Governance Frameworks -- 2.3.1 COBIT -- 2.3.2 ITIL -- 2.3.3 ISO/IEC27001 -- 2.4 Business Goals and IT Investment Alignment -- 2.5 Chapter Summary -- References | |
505 | 8 | |a Chapter 3: The Non-Malicious Risky Behavior in the Enterprise Information System Security -- 3.1 Introduction -- 3.2 Fraud Triangle and Dysfunctional Behavior In Information System -- 3.2.1 Explaining the Psychological Dimensions of Dysfunctional Behavior -- 3.2.1.1 The Organizational Factors -- 3.2.1.2 Information System Characteristics -- 3.3 Methodology -- 3.3.1 Sample and Instrument -- 3.3.2 Analysis -- 3.4 Results and Findings -- 3.4.1 Behavioral Difference -- 3.4.2 The Effect of Organizational Factors and Information System Characteristics -- 3.5 Discussion and Implications -- 3.5.1 Dysfunctional Behavior -- 3.5.2 Implications for Organizations -- 3.6 Conclusion -- References -- Chapter 4: Cybersecurity Incident Response in the Enterprise -- 4.1 Introduction to Cybersecurity Incidence Response -- 4.1.1 Cybersecurity Incidents -- 4.1.2 Security Events -- 4.1.3 Responders -- 4.1.4 Cyber-Resilience -- 4.1.5 Security Operations Centers (SOCs) -- 4.1.6 Security Information and Event Management (SIEM) -- 4.1.7 Security as a Service (SECaaS) -- 4.2 Understanding Cybersecurity Incidents -- 4.2.1 Different Types of Cybersecurity Incidents -- 4.2.2 The Lockheed Martin Cyber Kill Chain -- 4.2.2.1 Reconnaissance -- 4.2.2.2 Weaponization -- 4.2.2.3 Delivery -- 4.2.2.4 Exploitation -- 4.2.2.5 Installation -- 4.2.2.6 Command & -- Control (C& -- C or C2) -- 4.2.2.7 Actions on Objectives -- 4.2.3 The MITRE ATT& -- CK Framework -- 4.2.4 Microsoft STRIDE -- 4.3 Challenges of Cybersecurity Incidents -- 4.3.1 Identifying a Suspected Incident -- 4.3.2 Establishing Objectives -- 4.3.3 Analyzing All Available Information -- 4.3.4 Identifying What Has Been Compromised -- 4.3.5 Identifying What Information Has Been Accessed or Stolen -- 4.3.6 Cyber-Attribution -- 4.3.7 Determining Business Impact -- 4.3.8 Incident Detection and Response Tools | |
505 | 8 | |a 4.3.8.1 Live Detection Tools -- 4.3.8.1.1 Private SIEMs -- 4.3.8.1.2 Public SIEMs -- 4.3.8.2 Intelligence Gathering Tools -- 4.3.8.3 Forensic Tools -- 4.3.8.4 Threat Maps -- 4.3.9 Risk Management -- 4.4 Preparing for Cybersecurity Incidents -- 4.4.1 Understanding CSIRTs -- 4.4.1.1 Criticality Assessment for the Organization -- 4.4.1.2 Threat Analysis -- 4.4.1.3 Implications of People, Process, and Technology -- 4.4.1.4 Create a Controlled Environment -- 4.4.1.5 Review the State of Readiness in Incidence Response -- 4.5 Hacking Techniques and Countermeasures -- 4.5.1 Reconnaissance -- 4.5.1.1 Active Reconnaissance -- 4.5.1.2 Passive Reconnaissance -- 4.5.1.3 Tools for Reconnaissance -- 4.5.1.4 Detecting Reconnaissance -- 4.5.2 Scanning -- 4.5.2.1 Port Scanning -- 4.5.2.2 Vulnerability Scanning -- 4.5.2.3 Network Mapping -- 4.5.3 Gaining Access -- 4.5.4 Maintaining Access -- 4.5.5 Covering Tracks -- 4.6 Detecting Network Events -- 4.6.1 Endpoint and Network Traffic Monitoring -- 4.6.2 Anomaly Detection -- 4.6.2.1 Signature-Based Detection -- 4.6.2.2 Complex Behavior Matching -- 4.6.2.3 Anomaly-Based Detection -- 4.7 Responding to Cybersecurity Incidents -- 4.7.1 Preparing an Incidence Response Plan -- 4.7.2 Incident Response Plan (IRP) Phases -- 4.7.3 Incident Prioritization -- 4.7.4 Disaster Recovery Plan -- 4.7.5 Following up a Cybersecurity Incident -- 4.7.6 Carrying Out a Post-Incident Analysis -- 4.7.7 Containment and Eradication -- 4.7.8 Recovery and Post-Incident Measures -- 4.7.9 Cybersecurity Incident Reports -- 4.8 Conclusions -- Acknowledgments -- Notes -- References -- Chapter 5: Cyber-Enabled Crime as an Enabler in Market Manipulation Schemes -- 5.1 Introduction -- 5.2 Literature Review -- 5.3 Three Market Manipulation Cases -- 5.3.1 Jonathan Moylan: Market Manipulation as a Protest -- 5.3.2 Fin7: Organized Crime and Market Manipulation | |
505 | 8 | |a 5.3.3 The Syrian Electronic Army (SEA) -- 5.3.4 Discussion: The Structure of a Market Manipulation Enabled by Cybercrime -- 5.4 Conclusion -- Acknowledgments -- Notes -- References -- Chapter 6: Data Lakes: A Panacea for Big Data Problems, Cyber Safety Issues, and Enterprise Security -- 6.1 Introduction -- 6.1.1 Chapter Roadmap -- 6.2 Big Data -- 6.3 Data Warehouse -- 6.4 Data Lakes -- 6.4.1 The Concept of a Data Lake -- 6.4.2 The Architecture of Data Lakes -- 6.4.3 Data Lake Life Cycle -- 6.4.4 Data Lakes Technologies -- 6.4.4.1 Data Ingestion -- 6.4.4.2 Data Extraction -- 6.4.4.3 Data Cleaning -- 6.4.4.4 Data Storage -- 6.4.4.5 Data Processing -- 6.4.4.6 Data Access -- 6.4.4.7 Data Integration -- 6.4.4.8 Dataset Discovery -- 6.4.4.9 Dataset Versioning -- 6.4.4.10 Metadata Management -- 6.5 Challenges of Data Lakes and Big Data -- 6.5.1 Challenges Ahead for Data Experts -- 6.5.2 Challenges with Big Data Storing and Processing -- 6.5.2.1 Heterogeneity -- 6.5.2.2 Scalability -- 6.5.2.3 Fidelity -- 6.5.2.4 Security and Privacy -- 6.6 Enterprise Security -- 6.7 Conclusion -- Notes -- References -- Chapter 7: The Battle for Cloud Supremacy and the Remaking of Enterprise Security -- 7.1 Introduction -- 7.2 Research Limitations -- 7.3 Prologue to the Cloud -- 7.4 The Genesis of Cloud -- 7.4.1 Cloud Shortfalls -- 7.5 Inside the Enterprise -- 7.5.1 Profit versus Overhead -- 7.5.2 Governance and Regulation -- 7.5.3 Resourcing Challenges -- 7.6 Cloud Security -- 7.6.1 Strategic Compatibility -- 7.6.2 Visibility and Clarity -- 7.7 Engineering Solutions -- 7.7.1 Mutable to Immutable Infrastructure -- 7.7.2 Reduced User Functionality -- 7.7.3 Throttling -- 7.8 Aggregate of Change -- 7.9 Conclusion -- Note -- References -- Chapter 8: Security, Privacy, and Trust of Emerging Intelligent Transportation: Cognitive Internet of Vehicles -- 8.1 Introduction | |
505 | 8 | |a 8.1.1 Chapter Roadmap -- 8.2 Evolution of Intelligent Transportation System -- 8.3 Cognitive Internet of Vehicles (C-IoV): Motivation and Framework -- 8.3.1 Overview of C-IoV -- 8.3.2 C-IoV Framework -- 8.3.3 Use Case Analysis -- 8.3.3.1 Application Scenario 1 -- 8.3.3.2 Application Scenario 2 -- 8.4 What Security, Privacy and Trust Means in ITS? -- 8.4.1 Attack Surface in Evolved Intelligent Transporation System -- 8.4.2 Trust in the Evolved C-ITS Framework -- 8.5 Prospective Countermeasures Enabled by Cognitive Engine in Legacy Security Issues -- 8.6 Security and Privacy Concerns in C-IoV -- 8.6.1 Issues Related to the Cloud Computing of the Cognitive Engine -- 8.6.2 Issues Related to Learning Algorithms in the Cognitive Engine -- 8.7 Conclusion -- References -- Chapter 9: IT Governance and Enterprise Security Policy in the 6G Era -- 9.1 Introduction -- 9.1.1 Chapter Roadmap -- 9.2 6G Technologies: Security and Privacy Issues -- 9.2.1 AI and 6G -- 9.2.1.1 Adversarial Attacks -- 9.2.1.2 Access Control -- 9.2.1.3 Authentication -- 9.2.1.4 Encryption of Data -- 9.2.1.5 Perturbation -- 9.2.1.6 Communication -- 9.2.2 Molecular Communication and 6G -- 9.2.3 Quantum Communication -- 9.2.4 Explainable Artificial Intelligence (XAI) for 6G -- 9.3 International Cyber Security Strategy -- 9.4 National Cyber Security Strategy -- 9.5 Enterprise Security Policy in Organizations -- 9.5.1 Vulnerability -- 9.5.2 Infrastructure -- 9.6 Human Centric Cyber Security View -- 9.6.1 User -- 9.6.1.1 Demographics and Culture -- 9.6.2 Usage -- 9.6.3 Usability -- 9.7 Conclusion -- References -- Index | |
650 | 4 | |a Computer security | |
650 | 4 | |a Business intelligence | |
650 | 4 | |a Internet of things | |
650 | 0 | 7 | |a Internet der Dinge |0 (DE-588)7713781-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Corporate Governance |0 (DE-588)4419850-4 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Corporate Governance |0 (DE-588)4419850-4 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Internet der Dinge |0 (DE-588)7713781-4 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Moustafa, Nour |e Sonstige |4 oth | |
700 | 1 | |a Barkat, Abu |e Sonstige |4 oth | |
700 | 1 | |a Haskell-Dowland, Paul |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Ahmed, Mohiuddin |t Next-Generation Enterprise Security and Governance |d Milton : Taylor & Francis Group,c2022 |z 9780367639624 |
912 | |a ZDB-30-PQE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034096471 | |
966 | e | |u https://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=6949438 |l DE-1050 |p ZDB-30-PQE |q FHD01_PQE_Kauf |x Aggregator |3 Volltext | |
966 | e | |u https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=6949438 |l DE-2070s |p ZDB-30-PQE |q HWR_PDA_PQE_Kauf |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1816888284495740928 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Ahmed, Mohiuddin |
author_facet | Ahmed, Mohiuddin |
author_role | aut |
author_sort | Ahmed, Mohiuddin |
author_variant | m a ma |
building | Verbundindex |
bvnumber | BV048830893 |
collection | ZDB-30-PQE |
contents | Intro -- Half Title -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Contributors -- Chapter 1: Enterprise Threat Intelligence -- 1.1 Introduction: Security Risk & -- Intelligence -- 1.1.1 Chapter Roadmap -- 1.2 Organized Crime -- 1.2.1 Identity Theft -- 1.2.1.1 Countermeasures -- 1.2.2 Financial & -- Asset System Targeting -- 1.2.2.1 Payment Card Attacks -- 1.2.2.1.1 Countermeasures -- 1.2.2.2 Business Email Compromise (BEC) -- 1.2.2.2.1 Countermeasures -- 1.2.2.3 Direct Financial System Attacks -- 1.2.2.3.1 Countermeasures -- 1.2.2.4 Crypto Currency Attacks -- 1.2.2.4.1 Countermeasures -- 1.2.3 Extortion -- 1.2.3.1 Denial of Service (DoS) -- 1.2.3.1.1 Countermeasures -- 1.2.3.2 Ransomware -- 1.2.3.2.1 Countermeasures -- 1.2.4 Infrastructure Squatting -- 1.2.4.1 Countermeasures -- 1.3 Nation States -- 1.3.1 Espionage -- 1.3.1.1 Countermeasures -- 1.3.2 Financial Gain -- 1.3.2.1 Countermeasures -- 1.3.3 Sabotage -- 1.3.3.1 Countermeasures -- 1.3.4 Influence -- 1.3.4.1 Countermeasures -- 1.4 Hacktivists -- 1.4.1 Countermeasures -- 1.5 Cyber Terrorism -- 1.5.1 Countermeasures -- 1.6 Insider Threats -- 1.6.1 Countermeasures -- 1.7 Future Threats -- 1.7.1 Artificial Intelligence (AI) -- 1.7.1.1 AI: Cyber Offensive Applications -- 1.7.1.1.1 Deepfakes (Synthetic Media) -- 1.7.1.2 AI: Cyber Security Applications -- 1.7.2 Adversarial Machine Learning -- 1.7.3 Quantum-Insecure Cryptography -- 1.7.4 Cyber-Physical Systems -- 1.8 Conclusion -- Notes -- References -- Chapter 2: Enabling Corporate and Institutional Governance for Effective IT Governance -- 2.1 Introduction -- 2.2 Governance and Strategy -- 2.3 Current IT Governance Frameworks -- 2.3.1 COBIT -- 2.3.2 ITIL -- 2.3.3 ISO/IEC27001 -- 2.4 Business Goals and IT Investment Alignment -- 2.5 Chapter Summary -- References Chapter 3: The Non-Malicious Risky Behavior in the Enterprise Information System Security -- 3.1 Introduction -- 3.2 Fraud Triangle and Dysfunctional Behavior In Information System -- 3.2.1 Explaining the Psychological Dimensions of Dysfunctional Behavior -- 3.2.1.1 The Organizational Factors -- 3.2.1.2 Information System Characteristics -- 3.3 Methodology -- 3.3.1 Sample and Instrument -- 3.3.2 Analysis -- 3.4 Results and Findings -- 3.4.1 Behavioral Difference -- 3.4.2 The Effect of Organizational Factors and Information System Characteristics -- 3.5 Discussion and Implications -- 3.5.1 Dysfunctional Behavior -- 3.5.2 Implications for Organizations -- 3.6 Conclusion -- References -- Chapter 4: Cybersecurity Incident Response in the Enterprise -- 4.1 Introduction to Cybersecurity Incidence Response -- 4.1.1 Cybersecurity Incidents -- 4.1.2 Security Events -- 4.1.3 Responders -- 4.1.4 Cyber-Resilience -- 4.1.5 Security Operations Centers (SOCs) -- 4.1.6 Security Information and Event Management (SIEM) -- 4.1.7 Security as a Service (SECaaS) -- 4.2 Understanding Cybersecurity Incidents -- 4.2.1 Different Types of Cybersecurity Incidents -- 4.2.2 The Lockheed Martin Cyber Kill Chain -- 4.2.2.1 Reconnaissance -- 4.2.2.2 Weaponization -- 4.2.2.3 Delivery -- 4.2.2.4 Exploitation -- 4.2.2.5 Installation -- 4.2.2.6 Command & -- Control (C& -- C or C2) -- 4.2.2.7 Actions on Objectives -- 4.2.3 The MITRE ATT& -- CK Framework -- 4.2.4 Microsoft STRIDE -- 4.3 Challenges of Cybersecurity Incidents -- 4.3.1 Identifying a Suspected Incident -- 4.3.2 Establishing Objectives -- 4.3.3 Analyzing All Available Information -- 4.3.4 Identifying What Has Been Compromised -- 4.3.5 Identifying What Information Has Been Accessed or Stolen -- 4.3.6 Cyber-Attribution -- 4.3.7 Determining Business Impact -- 4.3.8 Incident Detection and Response Tools 4.3.8.1 Live Detection Tools -- 4.3.8.1.1 Private SIEMs -- 4.3.8.1.2 Public SIEMs -- 4.3.8.2 Intelligence Gathering Tools -- 4.3.8.3 Forensic Tools -- 4.3.8.4 Threat Maps -- 4.3.9 Risk Management -- 4.4 Preparing for Cybersecurity Incidents -- 4.4.1 Understanding CSIRTs -- 4.4.1.1 Criticality Assessment for the Organization -- 4.4.1.2 Threat Analysis -- 4.4.1.3 Implications of People, Process, and Technology -- 4.4.1.4 Create a Controlled Environment -- 4.4.1.5 Review the State of Readiness in Incidence Response -- 4.5 Hacking Techniques and Countermeasures -- 4.5.1 Reconnaissance -- 4.5.1.1 Active Reconnaissance -- 4.5.1.2 Passive Reconnaissance -- 4.5.1.3 Tools for Reconnaissance -- 4.5.1.4 Detecting Reconnaissance -- 4.5.2 Scanning -- 4.5.2.1 Port Scanning -- 4.5.2.2 Vulnerability Scanning -- 4.5.2.3 Network Mapping -- 4.5.3 Gaining Access -- 4.5.4 Maintaining Access -- 4.5.5 Covering Tracks -- 4.6 Detecting Network Events -- 4.6.1 Endpoint and Network Traffic Monitoring -- 4.6.2 Anomaly Detection -- 4.6.2.1 Signature-Based Detection -- 4.6.2.2 Complex Behavior Matching -- 4.6.2.3 Anomaly-Based Detection -- 4.7 Responding to Cybersecurity Incidents -- 4.7.1 Preparing an Incidence Response Plan -- 4.7.2 Incident Response Plan (IRP) Phases -- 4.7.3 Incident Prioritization -- 4.7.4 Disaster Recovery Plan -- 4.7.5 Following up a Cybersecurity Incident -- 4.7.6 Carrying Out a Post-Incident Analysis -- 4.7.7 Containment and Eradication -- 4.7.8 Recovery and Post-Incident Measures -- 4.7.9 Cybersecurity Incident Reports -- 4.8 Conclusions -- Acknowledgments -- Notes -- References -- Chapter 5: Cyber-Enabled Crime as an Enabler in Market Manipulation Schemes -- 5.1 Introduction -- 5.2 Literature Review -- 5.3 Three Market Manipulation Cases -- 5.3.1 Jonathan Moylan: Market Manipulation as a Protest -- 5.3.2 Fin7: Organized Crime and Market Manipulation 5.3.3 The Syrian Electronic Army (SEA) -- 5.3.4 Discussion: The Structure of a Market Manipulation Enabled by Cybercrime -- 5.4 Conclusion -- Acknowledgments -- Notes -- References -- Chapter 6: Data Lakes: A Panacea for Big Data Problems, Cyber Safety Issues, and Enterprise Security -- 6.1 Introduction -- 6.1.1 Chapter Roadmap -- 6.2 Big Data -- 6.3 Data Warehouse -- 6.4 Data Lakes -- 6.4.1 The Concept of a Data Lake -- 6.4.2 The Architecture of Data Lakes -- 6.4.3 Data Lake Life Cycle -- 6.4.4 Data Lakes Technologies -- 6.4.4.1 Data Ingestion -- 6.4.4.2 Data Extraction -- 6.4.4.3 Data Cleaning -- 6.4.4.4 Data Storage -- 6.4.4.5 Data Processing -- 6.4.4.6 Data Access -- 6.4.4.7 Data Integration -- 6.4.4.8 Dataset Discovery -- 6.4.4.9 Dataset Versioning -- 6.4.4.10 Metadata Management -- 6.5 Challenges of Data Lakes and Big Data -- 6.5.1 Challenges Ahead for Data Experts -- 6.5.2 Challenges with Big Data Storing and Processing -- 6.5.2.1 Heterogeneity -- 6.5.2.2 Scalability -- 6.5.2.3 Fidelity -- 6.5.2.4 Security and Privacy -- 6.6 Enterprise Security -- 6.7 Conclusion -- Notes -- References -- Chapter 7: The Battle for Cloud Supremacy and the Remaking of Enterprise Security -- 7.1 Introduction -- 7.2 Research Limitations -- 7.3 Prologue to the Cloud -- 7.4 The Genesis of Cloud -- 7.4.1 Cloud Shortfalls -- 7.5 Inside the Enterprise -- 7.5.1 Profit versus Overhead -- 7.5.2 Governance and Regulation -- 7.5.3 Resourcing Challenges -- 7.6 Cloud Security -- 7.6.1 Strategic Compatibility -- 7.6.2 Visibility and Clarity -- 7.7 Engineering Solutions -- 7.7.1 Mutable to Immutable Infrastructure -- 7.7.2 Reduced User Functionality -- 7.7.3 Throttling -- 7.8 Aggregate of Change -- 7.9 Conclusion -- Note -- References -- Chapter 8: Security, Privacy, and Trust of Emerging Intelligent Transportation: Cognitive Internet of Vehicles -- 8.1 Introduction 8.1.1 Chapter Roadmap -- 8.2 Evolution of Intelligent Transportation System -- 8.3 Cognitive Internet of Vehicles (C-IoV): Motivation and Framework -- 8.3.1 Overview of C-IoV -- 8.3.2 C-IoV Framework -- 8.3.3 Use Case Analysis -- 8.3.3.1 Application Scenario 1 -- 8.3.3.2 Application Scenario 2 -- 8.4 What Security, Privacy and Trust Means in ITS? -- 8.4.1 Attack Surface in Evolved Intelligent Transporation System -- 8.4.2 Trust in the Evolved C-ITS Framework -- 8.5 Prospective Countermeasures Enabled by Cognitive Engine in Legacy Security Issues -- 8.6 Security and Privacy Concerns in C-IoV -- 8.6.1 Issues Related to the Cloud Computing of the Cognitive Engine -- 8.6.2 Issues Related to Learning Algorithms in the Cognitive Engine -- 8.7 Conclusion -- References -- Chapter 9: IT Governance and Enterprise Security Policy in the 6G Era -- 9.1 Introduction -- 9.1.1 Chapter Roadmap -- 9.2 6G Technologies: Security and Privacy Issues -- 9.2.1 AI and 6G -- 9.2.1.1 Adversarial Attacks -- 9.2.1.2 Access Control -- 9.2.1.3 Authentication -- 9.2.1.4 Encryption of Data -- 9.2.1.5 Perturbation -- 9.2.1.6 Communication -- 9.2.2 Molecular Communication and 6G -- 9.2.3 Quantum Communication -- 9.2.4 Explainable Artificial Intelligence (XAI) for 6G -- 9.3 International Cyber Security Strategy -- 9.4 National Cyber Security Strategy -- 9.5 Enterprise Security Policy in Organizations -- 9.5.1 Vulnerability -- 9.5.2 Infrastructure -- 9.6 Human Centric Cyber Security View -- 9.6.1 User -- 9.6.1.1 Demographics and Culture -- 9.6.2 Usage -- 9.6.3 Usability -- 9.7 Conclusion -- References -- Index |
ctrlnum | (ZDB-30-PQE)EBC6949438 (ZDB-30-PAD)EBC6949438 (ZDB-89-EBL)EBL6949438 (OCoLC)1311321155 (DE-599)BVBBV048830893 |
dewey-full | 658.478 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.478 |
dewey-search | 658.478 |
dewey-sort | 3658.478 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
discipline_str_mv | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV048830893</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230920</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230224s2022 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000569797</subfield><subfield code="9">978-1-00-056979-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC6949438</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC6949438</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL6949438</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1311321155</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048830893</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-2070s</subfield><subfield code="a">DE-1050</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.478</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ahmed, Mohiuddin</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Next-Generation Enterprise Security and Governance</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Milton</subfield><subfield code="b">Taylor & Francis Group</subfield><subfield code="c">2022</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (265 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Security, Audit and Leadership Ser</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Intro -- Half Title -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Contributors -- Chapter 1: Enterprise Threat Intelligence -- 1.1 Introduction: Security Risk &amp -- Intelligence -- 1.1.1 Chapter Roadmap -- 1.2 Organized Crime -- 1.2.1 Identity Theft -- 1.2.1.1 Countermeasures -- 1.2.2 Financial &amp -- Asset System Targeting -- 1.2.2.1 Payment Card Attacks -- 1.2.2.1.1 Countermeasures -- 1.2.2.2 Business Email Compromise (BEC) -- 1.2.2.2.1 Countermeasures -- 1.2.2.3 Direct Financial System Attacks -- 1.2.2.3.1 Countermeasures -- 1.2.2.4 Crypto Currency Attacks -- 1.2.2.4.1 Countermeasures -- 1.2.3 Extortion -- 1.2.3.1 Denial of Service (DoS) -- 1.2.3.1.1 Countermeasures -- 1.2.3.2 Ransomware -- 1.2.3.2.1 Countermeasures -- 1.2.4 Infrastructure Squatting -- 1.2.4.1 Countermeasures -- 1.3 Nation States -- 1.3.1 Espionage -- 1.3.1.1 Countermeasures -- 1.3.2 Financial Gain -- 1.3.2.1 Countermeasures -- 1.3.3 Sabotage -- 1.3.3.1 Countermeasures -- 1.3.4 Influence -- 1.3.4.1 Countermeasures -- 1.4 Hacktivists -- 1.4.1 Countermeasures -- 1.5 Cyber Terrorism -- 1.5.1 Countermeasures -- 1.6 Insider Threats -- 1.6.1 Countermeasures -- 1.7 Future Threats -- 1.7.1 Artificial Intelligence (AI) -- 1.7.1.1 AI: Cyber Offensive Applications -- 1.7.1.1.1 Deepfakes (Synthetic Media) -- 1.7.1.2 AI: Cyber Security Applications -- 1.7.2 Adversarial Machine Learning -- 1.7.3 Quantum-Insecure Cryptography -- 1.7.4 Cyber-Physical Systems -- 1.8 Conclusion -- Notes -- References -- Chapter 2: Enabling Corporate and Institutional Governance for Effective IT Governance -- 2.1 Introduction -- 2.2 Governance and Strategy -- 2.3 Current IT Governance Frameworks -- 2.3.1 COBIT -- 2.3.2 ITIL -- 2.3.3 ISO/IEC27001 -- 2.4 Business Goals and IT Investment Alignment -- 2.5 Chapter Summary -- References</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 3: The Non-Malicious Risky Behavior in the Enterprise Information System Security -- 3.1 Introduction -- 3.2 Fraud Triangle and Dysfunctional Behavior In Information System -- 3.2.1 Explaining the Psychological Dimensions of Dysfunctional Behavior -- 3.2.1.1 The Organizational Factors -- 3.2.1.2 Information System Characteristics -- 3.3 Methodology -- 3.3.1 Sample and Instrument -- 3.3.2 Analysis -- 3.4 Results and Findings -- 3.4.1 Behavioral Difference -- 3.4.2 The Effect of Organizational Factors and Information System Characteristics -- 3.5 Discussion and Implications -- 3.5.1 Dysfunctional Behavior -- 3.5.2 Implications for Organizations -- 3.6 Conclusion -- References -- Chapter 4: Cybersecurity Incident Response in the Enterprise -- 4.1 Introduction to Cybersecurity Incidence Response -- 4.1.1 Cybersecurity Incidents -- 4.1.2 Security Events -- 4.1.3 Responders -- 4.1.4 Cyber-Resilience -- 4.1.5 Security Operations Centers (SOCs) -- 4.1.6 Security Information and Event Management (SIEM) -- 4.1.7 Security as a Service (SECaaS) -- 4.2 Understanding Cybersecurity Incidents -- 4.2.1 Different Types of Cybersecurity Incidents -- 4.2.2 The Lockheed Martin Cyber Kill Chain -- 4.2.2.1 Reconnaissance -- 4.2.2.2 Weaponization -- 4.2.2.3 Delivery -- 4.2.2.4 Exploitation -- 4.2.2.5 Installation -- 4.2.2.6 Command &amp -- Control (C&amp -- C or C2) -- 4.2.2.7 Actions on Objectives -- 4.2.3 The MITRE ATT&amp -- CK Framework -- 4.2.4 Microsoft STRIDE -- 4.3 Challenges of Cybersecurity Incidents -- 4.3.1 Identifying a Suspected Incident -- 4.3.2 Establishing Objectives -- 4.3.3 Analyzing All Available Information -- 4.3.4 Identifying What Has Been Compromised -- 4.3.5 Identifying What Information Has Been Accessed or Stolen -- 4.3.6 Cyber-Attribution -- 4.3.7 Determining Business Impact -- 4.3.8 Incident Detection and Response Tools</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4.3.8.1 Live Detection Tools -- 4.3.8.1.1 Private SIEMs -- 4.3.8.1.2 Public SIEMs -- 4.3.8.2 Intelligence Gathering Tools -- 4.3.8.3 Forensic Tools -- 4.3.8.4 Threat Maps -- 4.3.9 Risk Management -- 4.4 Preparing for Cybersecurity Incidents -- 4.4.1 Understanding CSIRTs -- 4.4.1.1 Criticality Assessment for the Organization -- 4.4.1.2 Threat Analysis -- 4.4.1.3 Implications of People, Process, and Technology -- 4.4.1.4 Create a Controlled Environment -- 4.4.1.5 Review the State of Readiness in Incidence Response -- 4.5 Hacking Techniques and Countermeasures -- 4.5.1 Reconnaissance -- 4.5.1.1 Active Reconnaissance -- 4.5.1.2 Passive Reconnaissance -- 4.5.1.3 Tools for Reconnaissance -- 4.5.1.4 Detecting Reconnaissance -- 4.5.2 Scanning -- 4.5.2.1 Port Scanning -- 4.5.2.2 Vulnerability Scanning -- 4.5.2.3 Network Mapping -- 4.5.3 Gaining Access -- 4.5.4 Maintaining Access -- 4.5.5 Covering Tracks -- 4.6 Detecting Network Events -- 4.6.1 Endpoint and Network Traffic Monitoring -- 4.6.2 Anomaly Detection -- 4.6.2.1 Signature-Based Detection -- 4.6.2.2 Complex Behavior Matching -- 4.6.2.3 Anomaly-Based Detection -- 4.7 Responding to Cybersecurity Incidents -- 4.7.1 Preparing an Incidence Response Plan -- 4.7.2 Incident Response Plan (IRP) Phases -- 4.7.3 Incident Prioritization -- 4.7.4 Disaster Recovery Plan -- 4.7.5 Following up a Cybersecurity Incident -- 4.7.6 Carrying Out a Post-Incident Analysis -- 4.7.7 Containment and Eradication -- 4.7.8 Recovery and Post-Incident Measures -- 4.7.9 Cybersecurity Incident Reports -- 4.8 Conclusions -- Acknowledgments -- Notes -- References -- Chapter 5: Cyber-Enabled Crime as an Enabler in Market Manipulation Schemes -- 5.1 Introduction -- 5.2 Literature Review -- 5.3 Three Market Manipulation Cases -- 5.3.1 Jonathan Moylan: Market Manipulation as a Protest -- 5.3.2 Fin7: Organized Crime and Market Manipulation</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">5.3.3 The Syrian Electronic Army (SEA) -- 5.3.4 Discussion: The Structure of a Market Manipulation Enabled by Cybercrime -- 5.4 Conclusion -- Acknowledgments -- Notes -- References -- Chapter 6: Data Lakes: A Panacea for Big Data Problems, Cyber Safety Issues, and Enterprise Security -- 6.1 Introduction -- 6.1.1 Chapter Roadmap -- 6.2 Big Data -- 6.3 Data Warehouse -- 6.4 Data Lakes -- 6.4.1 The Concept of a Data Lake -- 6.4.2 The Architecture of Data Lakes -- 6.4.3 Data Lake Life Cycle -- 6.4.4 Data Lakes Technologies -- 6.4.4.1 Data Ingestion -- 6.4.4.2 Data Extraction -- 6.4.4.3 Data Cleaning -- 6.4.4.4 Data Storage -- 6.4.4.5 Data Processing -- 6.4.4.6 Data Access -- 6.4.4.7 Data Integration -- 6.4.4.8 Dataset Discovery -- 6.4.4.9 Dataset Versioning -- 6.4.4.10 Metadata Management -- 6.5 Challenges of Data Lakes and Big Data -- 6.5.1 Challenges Ahead for Data Experts -- 6.5.2 Challenges with Big Data Storing and Processing -- 6.5.2.1 Heterogeneity -- 6.5.2.2 Scalability -- 6.5.2.3 Fidelity -- 6.5.2.4 Security and Privacy -- 6.6 Enterprise Security -- 6.7 Conclusion -- Notes -- References -- Chapter 7: The Battle for Cloud Supremacy and the Remaking of Enterprise Security -- 7.1 Introduction -- 7.2 Research Limitations -- 7.3 Prologue to the Cloud -- 7.4 The Genesis of Cloud -- 7.4.1 Cloud Shortfalls -- 7.5 Inside the Enterprise -- 7.5.1 Profit versus Overhead -- 7.5.2 Governance and Regulation -- 7.5.3 Resourcing Challenges -- 7.6 Cloud Security -- 7.6.1 Strategic Compatibility -- 7.6.2 Visibility and Clarity -- 7.7 Engineering Solutions -- 7.7.1 Mutable to Immutable Infrastructure -- 7.7.2 Reduced User Functionality -- 7.7.3 Throttling -- 7.8 Aggregate of Change -- 7.9 Conclusion -- Note -- References -- Chapter 8: Security, Privacy, and Trust of Emerging Intelligent Transportation: Cognitive Internet of Vehicles -- 8.1 Introduction</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">8.1.1 Chapter Roadmap -- 8.2 Evolution of Intelligent Transportation System -- 8.3 Cognitive Internet of Vehicles (C-IoV): Motivation and Framework -- 8.3.1 Overview of C-IoV -- 8.3.2 C-IoV Framework -- 8.3.3 Use Case Analysis -- 8.3.3.1 Application Scenario 1 -- 8.3.3.2 Application Scenario 2 -- 8.4 What Security, Privacy and Trust Means in ITS? -- 8.4.1 Attack Surface in Evolved Intelligent Transporation System -- 8.4.2 Trust in the Evolved C-ITS Framework -- 8.5 Prospective Countermeasures Enabled by Cognitive Engine in Legacy Security Issues -- 8.6 Security and Privacy Concerns in C-IoV -- 8.6.1 Issues Related to the Cloud Computing of the Cognitive Engine -- 8.6.2 Issues Related to Learning Algorithms in the Cognitive Engine -- 8.7 Conclusion -- References -- Chapter 9: IT Governance and Enterprise Security Policy in the 6G Era -- 9.1 Introduction -- 9.1.1 Chapter Roadmap -- 9.2 6G Technologies: Security and Privacy Issues -- 9.2.1 AI and 6G -- 9.2.1.1 Adversarial Attacks -- 9.2.1.2 Access Control -- 9.2.1.3 Authentication -- 9.2.1.4 Encryption of Data -- 9.2.1.5 Perturbation -- 9.2.1.6 Communication -- 9.2.2 Molecular Communication and 6G -- 9.2.3 Quantum Communication -- 9.2.4 Explainable Artificial Intelligence (XAI) for 6G -- 9.3 International Cyber Security Strategy -- 9.4 National Cyber Security Strategy -- 9.5 Enterprise Security Policy in Organizations -- 9.5.1 Vulnerability -- 9.5.2 Infrastructure -- 9.6 Human Centric Cyber Security View -- 9.6.1 User -- 9.6.1.1 Demographics and Culture -- 9.6.2 Usage -- 9.6.3 Usability -- 9.7 Conclusion -- References -- Index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet of things</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Corporate Governance</subfield><subfield code="0">(DE-588)4419850-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Corporate Governance</subfield><subfield code="0">(DE-588)4419850-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Moustafa, Nour</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Barkat, Abu</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Haskell-Dowland, Paul</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Ahmed, Mohiuddin</subfield><subfield code="t">Next-Generation Enterprise Security and Governance</subfield><subfield code="d">Milton : Taylor & Francis Group,c2022</subfield><subfield code="z">9780367639624</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034096471</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=6949438</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">FHD01_PQE_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=6949438</subfield><subfield code="l">DE-2070s</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">HWR_PDA_PQE_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV048830893 |
illustrated | Not Illustrated |
index_date | 2024-07-03T21:35:28Z |
indexdate | 2024-11-27T15:01:32Z |
institution | BVB |
isbn | 9781000569797 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034096471 |
oclc_num | 1311321155 |
open_access_boolean | |
owner | DE-2070s DE-1050 |
owner_facet | DE-2070s DE-1050 |
physical | 1 Online-Ressource (265 Seiten) |
psigel | ZDB-30-PQE ZDB-30-PQE FHD01_PQE_Kauf ZDB-30-PQE HWR_PDA_PQE_Kauf |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Taylor & Francis Group |
record_format | marc |
series2 | Security, Audit and Leadership Ser |
spelling | Ahmed, Mohiuddin Verfasser aut Next-Generation Enterprise Security and Governance Milton Taylor & Francis Group 2022 ©2022 1 Online-Ressource (265 Seiten) txt rdacontent c rdamedia cr rdacarrier Security, Audit and Leadership Ser Description based on publisher supplied metadata and other sources Intro -- Half Title -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Contributors -- Chapter 1: Enterprise Threat Intelligence -- 1.1 Introduction: Security Risk & -- Intelligence -- 1.1.1 Chapter Roadmap -- 1.2 Organized Crime -- 1.2.1 Identity Theft -- 1.2.1.1 Countermeasures -- 1.2.2 Financial & -- Asset System Targeting -- 1.2.2.1 Payment Card Attacks -- 1.2.2.1.1 Countermeasures -- 1.2.2.2 Business Email Compromise (BEC) -- 1.2.2.2.1 Countermeasures -- 1.2.2.3 Direct Financial System Attacks -- 1.2.2.3.1 Countermeasures -- 1.2.2.4 Crypto Currency Attacks -- 1.2.2.4.1 Countermeasures -- 1.2.3 Extortion -- 1.2.3.1 Denial of Service (DoS) -- 1.2.3.1.1 Countermeasures -- 1.2.3.2 Ransomware -- 1.2.3.2.1 Countermeasures -- 1.2.4 Infrastructure Squatting -- 1.2.4.1 Countermeasures -- 1.3 Nation States -- 1.3.1 Espionage -- 1.3.1.1 Countermeasures -- 1.3.2 Financial Gain -- 1.3.2.1 Countermeasures -- 1.3.3 Sabotage -- 1.3.3.1 Countermeasures -- 1.3.4 Influence -- 1.3.4.1 Countermeasures -- 1.4 Hacktivists -- 1.4.1 Countermeasures -- 1.5 Cyber Terrorism -- 1.5.1 Countermeasures -- 1.6 Insider Threats -- 1.6.1 Countermeasures -- 1.7 Future Threats -- 1.7.1 Artificial Intelligence (AI) -- 1.7.1.1 AI: Cyber Offensive Applications -- 1.7.1.1.1 Deepfakes (Synthetic Media) -- 1.7.1.2 AI: Cyber Security Applications -- 1.7.2 Adversarial Machine Learning -- 1.7.3 Quantum-Insecure Cryptography -- 1.7.4 Cyber-Physical Systems -- 1.8 Conclusion -- Notes -- References -- Chapter 2: Enabling Corporate and Institutional Governance for Effective IT Governance -- 2.1 Introduction -- 2.2 Governance and Strategy -- 2.3 Current IT Governance Frameworks -- 2.3.1 COBIT -- 2.3.2 ITIL -- 2.3.3 ISO/IEC27001 -- 2.4 Business Goals and IT Investment Alignment -- 2.5 Chapter Summary -- References Chapter 3: The Non-Malicious Risky Behavior in the Enterprise Information System Security -- 3.1 Introduction -- 3.2 Fraud Triangle and Dysfunctional Behavior In Information System -- 3.2.1 Explaining the Psychological Dimensions of Dysfunctional Behavior -- 3.2.1.1 The Organizational Factors -- 3.2.1.2 Information System Characteristics -- 3.3 Methodology -- 3.3.1 Sample and Instrument -- 3.3.2 Analysis -- 3.4 Results and Findings -- 3.4.1 Behavioral Difference -- 3.4.2 The Effect of Organizational Factors and Information System Characteristics -- 3.5 Discussion and Implications -- 3.5.1 Dysfunctional Behavior -- 3.5.2 Implications for Organizations -- 3.6 Conclusion -- References -- Chapter 4: Cybersecurity Incident Response in the Enterprise -- 4.1 Introduction to Cybersecurity Incidence Response -- 4.1.1 Cybersecurity Incidents -- 4.1.2 Security Events -- 4.1.3 Responders -- 4.1.4 Cyber-Resilience -- 4.1.5 Security Operations Centers (SOCs) -- 4.1.6 Security Information and Event Management (SIEM) -- 4.1.7 Security as a Service (SECaaS) -- 4.2 Understanding Cybersecurity Incidents -- 4.2.1 Different Types of Cybersecurity Incidents -- 4.2.2 The Lockheed Martin Cyber Kill Chain -- 4.2.2.1 Reconnaissance -- 4.2.2.2 Weaponization -- 4.2.2.3 Delivery -- 4.2.2.4 Exploitation -- 4.2.2.5 Installation -- 4.2.2.6 Command & -- Control (C& -- C or C2) -- 4.2.2.7 Actions on Objectives -- 4.2.3 The MITRE ATT& -- CK Framework -- 4.2.4 Microsoft STRIDE -- 4.3 Challenges of Cybersecurity Incidents -- 4.3.1 Identifying a Suspected Incident -- 4.3.2 Establishing Objectives -- 4.3.3 Analyzing All Available Information -- 4.3.4 Identifying What Has Been Compromised -- 4.3.5 Identifying What Information Has Been Accessed or Stolen -- 4.3.6 Cyber-Attribution -- 4.3.7 Determining Business Impact -- 4.3.8 Incident Detection and Response Tools 4.3.8.1 Live Detection Tools -- 4.3.8.1.1 Private SIEMs -- 4.3.8.1.2 Public SIEMs -- 4.3.8.2 Intelligence Gathering Tools -- 4.3.8.3 Forensic Tools -- 4.3.8.4 Threat Maps -- 4.3.9 Risk Management -- 4.4 Preparing for Cybersecurity Incidents -- 4.4.1 Understanding CSIRTs -- 4.4.1.1 Criticality Assessment for the Organization -- 4.4.1.2 Threat Analysis -- 4.4.1.3 Implications of People, Process, and Technology -- 4.4.1.4 Create a Controlled Environment -- 4.4.1.5 Review the State of Readiness in Incidence Response -- 4.5 Hacking Techniques and Countermeasures -- 4.5.1 Reconnaissance -- 4.5.1.1 Active Reconnaissance -- 4.5.1.2 Passive Reconnaissance -- 4.5.1.3 Tools for Reconnaissance -- 4.5.1.4 Detecting Reconnaissance -- 4.5.2 Scanning -- 4.5.2.1 Port Scanning -- 4.5.2.2 Vulnerability Scanning -- 4.5.2.3 Network Mapping -- 4.5.3 Gaining Access -- 4.5.4 Maintaining Access -- 4.5.5 Covering Tracks -- 4.6 Detecting Network Events -- 4.6.1 Endpoint and Network Traffic Monitoring -- 4.6.2 Anomaly Detection -- 4.6.2.1 Signature-Based Detection -- 4.6.2.2 Complex Behavior Matching -- 4.6.2.3 Anomaly-Based Detection -- 4.7 Responding to Cybersecurity Incidents -- 4.7.1 Preparing an Incidence Response Plan -- 4.7.2 Incident Response Plan (IRP) Phases -- 4.7.3 Incident Prioritization -- 4.7.4 Disaster Recovery Plan -- 4.7.5 Following up a Cybersecurity Incident -- 4.7.6 Carrying Out a Post-Incident Analysis -- 4.7.7 Containment and Eradication -- 4.7.8 Recovery and Post-Incident Measures -- 4.7.9 Cybersecurity Incident Reports -- 4.8 Conclusions -- Acknowledgments -- Notes -- References -- Chapter 5: Cyber-Enabled Crime as an Enabler in Market Manipulation Schemes -- 5.1 Introduction -- 5.2 Literature Review -- 5.3 Three Market Manipulation Cases -- 5.3.1 Jonathan Moylan: Market Manipulation as a Protest -- 5.3.2 Fin7: Organized Crime and Market Manipulation 5.3.3 The Syrian Electronic Army (SEA) -- 5.3.4 Discussion: The Structure of a Market Manipulation Enabled by Cybercrime -- 5.4 Conclusion -- Acknowledgments -- Notes -- References -- Chapter 6: Data Lakes: A Panacea for Big Data Problems, Cyber Safety Issues, and Enterprise Security -- 6.1 Introduction -- 6.1.1 Chapter Roadmap -- 6.2 Big Data -- 6.3 Data Warehouse -- 6.4 Data Lakes -- 6.4.1 The Concept of a Data Lake -- 6.4.2 The Architecture of Data Lakes -- 6.4.3 Data Lake Life Cycle -- 6.4.4 Data Lakes Technologies -- 6.4.4.1 Data Ingestion -- 6.4.4.2 Data Extraction -- 6.4.4.3 Data Cleaning -- 6.4.4.4 Data Storage -- 6.4.4.5 Data Processing -- 6.4.4.6 Data Access -- 6.4.4.7 Data Integration -- 6.4.4.8 Dataset Discovery -- 6.4.4.9 Dataset Versioning -- 6.4.4.10 Metadata Management -- 6.5 Challenges of Data Lakes and Big Data -- 6.5.1 Challenges Ahead for Data Experts -- 6.5.2 Challenges with Big Data Storing and Processing -- 6.5.2.1 Heterogeneity -- 6.5.2.2 Scalability -- 6.5.2.3 Fidelity -- 6.5.2.4 Security and Privacy -- 6.6 Enterprise Security -- 6.7 Conclusion -- Notes -- References -- Chapter 7: The Battle for Cloud Supremacy and the Remaking of Enterprise Security -- 7.1 Introduction -- 7.2 Research Limitations -- 7.3 Prologue to the Cloud -- 7.4 The Genesis of Cloud -- 7.4.1 Cloud Shortfalls -- 7.5 Inside the Enterprise -- 7.5.1 Profit versus Overhead -- 7.5.2 Governance and Regulation -- 7.5.3 Resourcing Challenges -- 7.6 Cloud Security -- 7.6.1 Strategic Compatibility -- 7.6.2 Visibility and Clarity -- 7.7 Engineering Solutions -- 7.7.1 Mutable to Immutable Infrastructure -- 7.7.2 Reduced User Functionality -- 7.7.3 Throttling -- 7.8 Aggregate of Change -- 7.9 Conclusion -- Note -- References -- Chapter 8: Security, Privacy, and Trust of Emerging Intelligent Transportation: Cognitive Internet of Vehicles -- 8.1 Introduction 8.1.1 Chapter Roadmap -- 8.2 Evolution of Intelligent Transportation System -- 8.3 Cognitive Internet of Vehicles (C-IoV): Motivation and Framework -- 8.3.1 Overview of C-IoV -- 8.3.2 C-IoV Framework -- 8.3.3 Use Case Analysis -- 8.3.3.1 Application Scenario 1 -- 8.3.3.2 Application Scenario 2 -- 8.4 What Security, Privacy and Trust Means in ITS? -- 8.4.1 Attack Surface in Evolved Intelligent Transporation System -- 8.4.2 Trust in the Evolved C-ITS Framework -- 8.5 Prospective Countermeasures Enabled by Cognitive Engine in Legacy Security Issues -- 8.6 Security and Privacy Concerns in C-IoV -- 8.6.1 Issues Related to the Cloud Computing of the Cognitive Engine -- 8.6.2 Issues Related to Learning Algorithms in the Cognitive Engine -- 8.7 Conclusion -- References -- Chapter 9: IT Governance and Enterprise Security Policy in the 6G Era -- 9.1 Introduction -- 9.1.1 Chapter Roadmap -- 9.2 6G Technologies: Security and Privacy Issues -- 9.2.1 AI and 6G -- 9.2.1.1 Adversarial Attacks -- 9.2.1.2 Access Control -- 9.2.1.3 Authentication -- 9.2.1.4 Encryption of Data -- 9.2.1.5 Perturbation -- 9.2.1.6 Communication -- 9.2.2 Molecular Communication and 6G -- 9.2.3 Quantum Communication -- 9.2.4 Explainable Artificial Intelligence (XAI) for 6G -- 9.3 International Cyber Security Strategy -- 9.4 National Cyber Security Strategy -- 9.5 Enterprise Security Policy in Organizations -- 9.5.1 Vulnerability -- 9.5.2 Infrastructure -- 9.6 Human Centric Cyber Security View -- 9.6.1 User -- 9.6.1.1 Demographics and Culture -- 9.6.2 Usage -- 9.6.3 Usability -- 9.7 Conclusion -- References -- Index Computer security Business intelligence Internet of things Internet der Dinge (DE-588)7713781-4 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Corporate Governance (DE-588)4419850-4 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Corporate Governance (DE-588)4419850-4 s Computersicherheit (DE-588)4274324-2 s Internet der Dinge (DE-588)7713781-4 s DE-604 Moustafa, Nour Sonstige oth Barkat, Abu Sonstige oth Haskell-Dowland, Paul Sonstige oth Erscheint auch als Druck-Ausgabe Ahmed, Mohiuddin Next-Generation Enterprise Security and Governance Milton : Taylor & Francis Group,c2022 9780367639624 |
spellingShingle | Ahmed, Mohiuddin Next-Generation Enterprise Security and Governance Intro -- Half Title -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Contributors -- Chapter 1: Enterprise Threat Intelligence -- 1.1 Introduction: Security Risk & -- Intelligence -- 1.1.1 Chapter Roadmap -- 1.2 Organized Crime -- 1.2.1 Identity Theft -- 1.2.1.1 Countermeasures -- 1.2.2 Financial & -- Asset System Targeting -- 1.2.2.1 Payment Card Attacks -- 1.2.2.1.1 Countermeasures -- 1.2.2.2 Business Email Compromise (BEC) -- 1.2.2.2.1 Countermeasures -- 1.2.2.3 Direct Financial System Attacks -- 1.2.2.3.1 Countermeasures -- 1.2.2.4 Crypto Currency Attacks -- 1.2.2.4.1 Countermeasures -- 1.2.3 Extortion -- 1.2.3.1 Denial of Service (DoS) -- 1.2.3.1.1 Countermeasures -- 1.2.3.2 Ransomware -- 1.2.3.2.1 Countermeasures -- 1.2.4 Infrastructure Squatting -- 1.2.4.1 Countermeasures -- 1.3 Nation States -- 1.3.1 Espionage -- 1.3.1.1 Countermeasures -- 1.3.2 Financial Gain -- 1.3.2.1 Countermeasures -- 1.3.3 Sabotage -- 1.3.3.1 Countermeasures -- 1.3.4 Influence -- 1.3.4.1 Countermeasures -- 1.4 Hacktivists -- 1.4.1 Countermeasures -- 1.5 Cyber Terrorism -- 1.5.1 Countermeasures -- 1.6 Insider Threats -- 1.6.1 Countermeasures -- 1.7 Future Threats -- 1.7.1 Artificial Intelligence (AI) -- 1.7.1.1 AI: Cyber Offensive Applications -- 1.7.1.1.1 Deepfakes (Synthetic Media) -- 1.7.1.2 AI: Cyber Security Applications -- 1.7.2 Adversarial Machine Learning -- 1.7.3 Quantum-Insecure Cryptography -- 1.7.4 Cyber-Physical Systems -- 1.8 Conclusion -- Notes -- References -- Chapter 2: Enabling Corporate and Institutional Governance for Effective IT Governance -- 2.1 Introduction -- 2.2 Governance and Strategy -- 2.3 Current IT Governance Frameworks -- 2.3.1 COBIT -- 2.3.2 ITIL -- 2.3.3 ISO/IEC27001 -- 2.4 Business Goals and IT Investment Alignment -- 2.5 Chapter Summary -- References Chapter 3: The Non-Malicious Risky Behavior in the Enterprise Information System Security -- 3.1 Introduction -- 3.2 Fraud Triangle and Dysfunctional Behavior In Information System -- 3.2.1 Explaining the Psychological Dimensions of Dysfunctional Behavior -- 3.2.1.1 The Organizational Factors -- 3.2.1.2 Information System Characteristics -- 3.3 Methodology -- 3.3.1 Sample and Instrument -- 3.3.2 Analysis -- 3.4 Results and Findings -- 3.4.1 Behavioral Difference -- 3.4.2 The Effect of Organizational Factors and Information System Characteristics -- 3.5 Discussion and Implications -- 3.5.1 Dysfunctional Behavior -- 3.5.2 Implications for Organizations -- 3.6 Conclusion -- References -- Chapter 4: Cybersecurity Incident Response in the Enterprise -- 4.1 Introduction to Cybersecurity Incidence Response -- 4.1.1 Cybersecurity Incidents -- 4.1.2 Security Events -- 4.1.3 Responders -- 4.1.4 Cyber-Resilience -- 4.1.5 Security Operations Centers (SOCs) -- 4.1.6 Security Information and Event Management (SIEM) -- 4.1.7 Security as a Service (SECaaS) -- 4.2 Understanding Cybersecurity Incidents -- 4.2.1 Different Types of Cybersecurity Incidents -- 4.2.2 The Lockheed Martin Cyber Kill Chain -- 4.2.2.1 Reconnaissance -- 4.2.2.2 Weaponization -- 4.2.2.3 Delivery -- 4.2.2.4 Exploitation -- 4.2.2.5 Installation -- 4.2.2.6 Command & -- Control (C& -- C or C2) -- 4.2.2.7 Actions on Objectives -- 4.2.3 The MITRE ATT& -- CK Framework -- 4.2.4 Microsoft STRIDE -- 4.3 Challenges of Cybersecurity Incidents -- 4.3.1 Identifying a Suspected Incident -- 4.3.2 Establishing Objectives -- 4.3.3 Analyzing All Available Information -- 4.3.4 Identifying What Has Been Compromised -- 4.3.5 Identifying What Information Has Been Accessed or Stolen -- 4.3.6 Cyber-Attribution -- 4.3.7 Determining Business Impact -- 4.3.8 Incident Detection and Response Tools 4.3.8.1 Live Detection Tools -- 4.3.8.1.1 Private SIEMs -- 4.3.8.1.2 Public SIEMs -- 4.3.8.2 Intelligence Gathering Tools -- 4.3.8.3 Forensic Tools -- 4.3.8.4 Threat Maps -- 4.3.9 Risk Management -- 4.4 Preparing for Cybersecurity Incidents -- 4.4.1 Understanding CSIRTs -- 4.4.1.1 Criticality Assessment for the Organization -- 4.4.1.2 Threat Analysis -- 4.4.1.3 Implications of People, Process, and Technology -- 4.4.1.4 Create a Controlled Environment -- 4.4.1.5 Review the State of Readiness in Incidence Response -- 4.5 Hacking Techniques and Countermeasures -- 4.5.1 Reconnaissance -- 4.5.1.1 Active Reconnaissance -- 4.5.1.2 Passive Reconnaissance -- 4.5.1.3 Tools for Reconnaissance -- 4.5.1.4 Detecting Reconnaissance -- 4.5.2 Scanning -- 4.5.2.1 Port Scanning -- 4.5.2.2 Vulnerability Scanning -- 4.5.2.3 Network Mapping -- 4.5.3 Gaining Access -- 4.5.4 Maintaining Access -- 4.5.5 Covering Tracks -- 4.6 Detecting Network Events -- 4.6.1 Endpoint and Network Traffic Monitoring -- 4.6.2 Anomaly Detection -- 4.6.2.1 Signature-Based Detection -- 4.6.2.2 Complex Behavior Matching -- 4.6.2.3 Anomaly-Based Detection -- 4.7 Responding to Cybersecurity Incidents -- 4.7.1 Preparing an Incidence Response Plan -- 4.7.2 Incident Response Plan (IRP) Phases -- 4.7.3 Incident Prioritization -- 4.7.4 Disaster Recovery Plan -- 4.7.5 Following up a Cybersecurity Incident -- 4.7.6 Carrying Out a Post-Incident Analysis -- 4.7.7 Containment and Eradication -- 4.7.8 Recovery and Post-Incident Measures -- 4.7.9 Cybersecurity Incident Reports -- 4.8 Conclusions -- Acknowledgments -- Notes -- References -- Chapter 5: Cyber-Enabled Crime as an Enabler in Market Manipulation Schemes -- 5.1 Introduction -- 5.2 Literature Review -- 5.3 Three Market Manipulation Cases -- 5.3.1 Jonathan Moylan: Market Manipulation as a Protest -- 5.3.2 Fin7: Organized Crime and Market Manipulation 5.3.3 The Syrian Electronic Army (SEA) -- 5.3.4 Discussion: The Structure of a Market Manipulation Enabled by Cybercrime -- 5.4 Conclusion -- Acknowledgments -- Notes -- References -- Chapter 6: Data Lakes: A Panacea for Big Data Problems, Cyber Safety Issues, and Enterprise Security -- 6.1 Introduction -- 6.1.1 Chapter Roadmap -- 6.2 Big Data -- 6.3 Data Warehouse -- 6.4 Data Lakes -- 6.4.1 The Concept of a Data Lake -- 6.4.2 The Architecture of Data Lakes -- 6.4.3 Data Lake Life Cycle -- 6.4.4 Data Lakes Technologies -- 6.4.4.1 Data Ingestion -- 6.4.4.2 Data Extraction -- 6.4.4.3 Data Cleaning -- 6.4.4.4 Data Storage -- 6.4.4.5 Data Processing -- 6.4.4.6 Data Access -- 6.4.4.7 Data Integration -- 6.4.4.8 Dataset Discovery -- 6.4.4.9 Dataset Versioning -- 6.4.4.10 Metadata Management -- 6.5 Challenges of Data Lakes and Big Data -- 6.5.1 Challenges Ahead for Data Experts -- 6.5.2 Challenges with Big Data Storing and Processing -- 6.5.2.1 Heterogeneity -- 6.5.2.2 Scalability -- 6.5.2.3 Fidelity -- 6.5.2.4 Security and Privacy -- 6.6 Enterprise Security -- 6.7 Conclusion -- Notes -- References -- Chapter 7: The Battle for Cloud Supremacy and the Remaking of Enterprise Security -- 7.1 Introduction -- 7.2 Research Limitations -- 7.3 Prologue to the Cloud -- 7.4 The Genesis of Cloud -- 7.4.1 Cloud Shortfalls -- 7.5 Inside the Enterprise -- 7.5.1 Profit versus Overhead -- 7.5.2 Governance and Regulation -- 7.5.3 Resourcing Challenges -- 7.6 Cloud Security -- 7.6.1 Strategic Compatibility -- 7.6.2 Visibility and Clarity -- 7.7 Engineering Solutions -- 7.7.1 Mutable to Immutable Infrastructure -- 7.7.2 Reduced User Functionality -- 7.7.3 Throttling -- 7.8 Aggregate of Change -- 7.9 Conclusion -- Note -- References -- Chapter 8: Security, Privacy, and Trust of Emerging Intelligent Transportation: Cognitive Internet of Vehicles -- 8.1 Introduction 8.1.1 Chapter Roadmap -- 8.2 Evolution of Intelligent Transportation System -- 8.3 Cognitive Internet of Vehicles (C-IoV): Motivation and Framework -- 8.3.1 Overview of C-IoV -- 8.3.2 C-IoV Framework -- 8.3.3 Use Case Analysis -- 8.3.3.1 Application Scenario 1 -- 8.3.3.2 Application Scenario 2 -- 8.4 What Security, Privacy and Trust Means in ITS? -- 8.4.1 Attack Surface in Evolved Intelligent Transporation System -- 8.4.2 Trust in the Evolved C-ITS Framework -- 8.5 Prospective Countermeasures Enabled by Cognitive Engine in Legacy Security Issues -- 8.6 Security and Privacy Concerns in C-IoV -- 8.6.1 Issues Related to the Cloud Computing of the Cognitive Engine -- 8.6.2 Issues Related to Learning Algorithms in the Cognitive Engine -- 8.7 Conclusion -- References -- Chapter 9: IT Governance and Enterprise Security Policy in the 6G Era -- 9.1 Introduction -- 9.1.1 Chapter Roadmap -- 9.2 6G Technologies: Security and Privacy Issues -- 9.2.1 AI and 6G -- 9.2.1.1 Adversarial Attacks -- 9.2.1.2 Access Control -- 9.2.1.3 Authentication -- 9.2.1.4 Encryption of Data -- 9.2.1.5 Perturbation -- 9.2.1.6 Communication -- 9.2.2 Molecular Communication and 6G -- 9.2.3 Quantum Communication -- 9.2.4 Explainable Artificial Intelligence (XAI) for 6G -- 9.3 International Cyber Security Strategy -- 9.4 National Cyber Security Strategy -- 9.5 Enterprise Security Policy in Organizations -- 9.5.1 Vulnerability -- 9.5.2 Infrastructure -- 9.6 Human Centric Cyber Security View -- 9.6.1 User -- 9.6.1.1 Demographics and Culture -- 9.6.2 Usage -- 9.6.3 Usability -- 9.7 Conclusion -- References -- Index Computer security Business intelligence Internet of things Internet der Dinge (DE-588)7713781-4 gnd Computersicherheit (DE-588)4274324-2 gnd Corporate Governance (DE-588)4419850-4 gnd |
subject_GND | (DE-588)7713781-4 (DE-588)4274324-2 (DE-588)4419850-4 (DE-588)4143413-4 |
title | Next-Generation Enterprise Security and Governance |
title_auth | Next-Generation Enterprise Security and Governance |
title_exact_search | Next-Generation Enterprise Security and Governance |
title_exact_search_txtP | Next-Generation Enterprise Security and Governance |
title_full | Next-Generation Enterprise Security and Governance |
title_fullStr | Next-Generation Enterprise Security and Governance |
title_full_unstemmed | Next-Generation Enterprise Security and Governance |
title_short | Next-Generation Enterprise Security and Governance |
title_sort | next generation enterprise security and governance |
topic | Computer security Business intelligence Internet of things Internet der Dinge (DE-588)7713781-4 gnd Computersicherheit (DE-588)4274324-2 gnd Corporate Governance (DE-588)4419850-4 gnd |
topic_facet | Computer security Business intelligence Internet of things Internet der Dinge Computersicherheit Corporate Governance Aufsatzsammlung |
work_keys_str_mv | AT ahmedmohiuddin nextgenerationenterprisesecurityandgovernance AT moustafanour nextgenerationenterprisesecurityandgovernance AT barkatabu nextgenerationenterprisesecurityandgovernance AT haskelldowlandpaul nextgenerationenterprisesecurityandgovernance |