Developing cybersecurity programs and policies
Series: Pearson IT cybersecurity curriculumPublication details: Pearson 2019 LondonDescription: 656pISBN:- 9780789759405
- 005.8 SAN
Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|
![]() |
Jammu General Stacks | Non-fiction | 005.8 SAN (Browse shelf(Opens below)) | Available | IIMJ-8167 |
1. Understanding cybersecurity policy and governance 2. Cybersecurity policy organization, format, and styles 3. Cybersecurity framework 4. Governance and risk management 5. Asset management and data loss prevention 6. Human resources security 7. Physical and environmental security 8. Communications and operations security 9. Access control management 10. Information systems acquisition, development, and maintenance 11. Cybersecurity incident response 12. Business continuity management 13. Regulatory compliance for financial institutions 14. Regulatory compliance for the health-care sector 15. PCI compliance for merchants 16. NIST cybersecurity framework
This book provides a comprehensive guide to establishing a cybersecurity program and governance in an organization. It covers creating cybersecurity policies, standards, procedures, guidelines, and plans, and the differences among them. It covers the Confidentiality, Integrity & Availability (CIA) security model, threat actors, the NIST Cybersecurity Framework, ISO/IEC 27000-series standards, and aligning security with business strategy. The book also teaches students how to identify, prioritize, and manage cybersecurity risks, reduce social engineering risks, implement effective security measures, respond to incidents, and comply with laws and regulations.
There are no comments on this title.