Amazon cover image
Image from Amazon.com

Developing cybersecurity programs and policies

By: Series: Pearson IT cybersecurity curriculumPublication details: Pearson 2019 LondonDescription: 656pISBN:
  • 9780789759405
Subject(s): DDC classification:
  • 005.8 SAN
Summary: This book provides a comprehensive guide to establishing a cybersecurity program and governance in an organization. It covers creating cybersecurity policies, standards, procedures, guidelines, and plans, and the differences among them. It covers the Confidentiality, Integrity & Availability (CIA) security model, threat actors, the NIST Cybersecurity Framework, ISO/IEC 27000-series standards, and aligning security with business strategy. The book also teaches students how to identify, prioritize, and manage cybersecurity risks, reduce social engineering risks, implement effective security measures, respond to incidents, and comply with laws and regulations.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
Book Book Jammu General Stacks Non-fiction 005.8 SAN (Browse shelf(Opens below)) Available IIMJ-8167
Total holds: 0

1. Understanding cybersecurity policy and governance 2. Cybersecurity policy organization, format, and styles 3. Cybersecurity framework 4. Governance and risk management 5. Asset management and data loss prevention 6. Human resources security 7. Physical and environmental security 8. Communications and operations security 9. Access control management 10. Information systems acquisition, development, and maintenance 11. Cybersecurity incident response 12. Business continuity management 13. Regulatory compliance for financial institutions 14. Regulatory compliance for the health-care sector 15. PCI compliance for merchants 16. NIST cybersecurity framework

This book provides a comprehensive guide to establishing a cybersecurity program and governance in an organization. It covers creating cybersecurity policies, standards, procedures, guidelines, and plans, and the differences among them. It covers the Confidentiality, Integrity & Availability (CIA) security model, threat actors, the NIST Cybersecurity Framework, ISO/IEC 27000-series standards, and aligning security with business strategy. The book also teaches students how to identify, prioritize, and manage cybersecurity risks, reduce social engineering risks, implement effective security measures, respond to incidents, and comply with laws and regulations.

There are no comments on this title.

to post a comment.

Powered by Koha