Cybersecurity: Current Writings on Threats and Protection


Cybersecurity: Current Writings on Threats and Protection
Authors: Joaquin Jay Gonzalez III – Roger L. Kemp
ISBN-10: 147667440X
ISBN-13: 9781476674407
Released: 2019-01-22
Print Length 页数: 288 pages

Book Description


Billions of people are connected through billions of devices across the globe. In the age of this massive internet,professional and personal information is being transmitted and received constantly,and while this access is convenient,it comes at a risk.
This handbook of cybersecurity best practices is for public officials and citizens,employers and employees,corporations and consumers. Essays also address the development of state-of-the-art software systems and hardware for public and private organizations.
Contents
1. Government Employees Unaware They Are Cyber
Crime Victims(Chelsea Binns)
2. Cybersecurity and America’s Governments(Roger L.
Kemp)
3. NACo Members Zero In on Cybersecurity,Tech
Safety(Ariel Cohen)
4. Growing Impact of Cybercrime in Local Government
(Gerald Cliff)
5. Cybersecurity: What’s Your Risk?(International
City/County Management Association)
6. Performance and Data Analytics: The Cincinnati
Story(Harry Black)
7. The Digital Solution (Shaun Mulholland)
8. Digital Wallpapers Open Doors (Caitlin Cowart)
9. Personal Privacy Is Eroding as Consent Policies of
Google and Facebook Evoke “Fantasy World”(Fred H.
Cate)
10. loT Is Changing the Cybersecurity Industry(Larry
Karisny)
11. Equifax Breach Is a Reminder of Society’s Larger
Cybersecurity Problems(Ricgard Forno)
12. Cybersecurity: Protecting Court Data (Brian
McLaughlin)
13. Health-Care Industry Increasingly Faces
Cybersecurity Breaches(Margaret Steen)
14. It’s in the Mail: Aetna Agrees to $17m Payout in
HIV Privacy Breach(Elana Gordon)
15. Explainer: What is Hacking?(James H.
Hamlyn-Harris)
16. How the Chinese Cyberthreat Has Evolved
(Dorothy Denning)
17. Now That Russia Has Apparently Hacked America’
s Grid,Shoring Up Security Is More Important Than
Ever(Theodore J. Kury)
18. Ransomware Victims Urged to Report Infections to
Federal Law Enforcement(Federal Bureau of
Investigation)
19. Ransomware Attacks llustrate the Vulnerabilities
That Local Government Entities Face(Mary Scott
Nabers)
20. Ransomware Attacks on the Rise in 2017(Mary
Ann Barton)
21. The Two Faces of Social Media(Martha Perego)
22.”Zero-Day”Stockpiling Puts Us All At Risk
(Benjamin Dean)
23.A Plan for Cybersecurity(Cory Fleming)
24. How We Can Each Fight Cybercrime with Smarter Habits(Arun Vishwanath)
25. Simple Steps to Online Safety(Alan Shark)
26. Staying Safe on Social Networking Sites(U.S.
Computer Emergency Readiness Team)
27. Seven Keys to Strengthen Your Cybersecurity Culture(DanielJ. Lohrmann)
28. Three Tips for Forming a Computer Emergency Response Team(Kelsey Brewer)
29. Cybersecurity Strategies Governments Need
(Gus “Ira”Hunt and Lalit Ahluwalia)
30. Security Pros Need a Mentor: Here’s Why and How(Daniel J. Lohrmann)
31. Mecklenburg County Refuses to Pay Ransom to Cyber Hackers(Mary Ann Barton)
32. Fighting Fake News(Marcus Banks)
33. How Airplane Crash Investigations CanImprove Cybersecurity(Scott Shackelford)
Technical Protections
34. National Cybersecurity Workforce Framework*(U.S. Department of Homeland Security)
35. Eliminating Network Blind Spots and Preventing Breaches(Reggie Best)
36. The Cloud and Enterprise Cybersecurity.
Leveling the Playing Field (Microsoft)
37. Government Data in the Cloud: Provider and
User Responsibilities(Subrata Chakrabarti)
38. Using Blockchain to Secure the “Internet of Things”(Nir Kshetri)
39. How to Protect Patrons’ Digital Privacy(Anne Ford)
40. Monitoring Employees’ Use of Company Computers and the Internet(Texas Workforce Commission)
41. Disaster Recovery for Technology: Best Practice(Government Finance Officers Association)
42. Cybersecurity Partnerships* Strength in Numbers(Susan Miller)
43. Intersector Briefing: Cross Sector Collaboration in Cybersecurity(Intersector Project)
44. Obama’s Cybersecurity Initiative(FrankJ.
Cilluffo and Sharon L. Cardash)
45. New Trump Executive Order On Cybersecurity
(DanielJ. Lohrmann)
46. Sharing of Cyber Threat Indicators and Defensive Measures by the Federal Government
(Office of the Director of National Intelligence and Other Agencies)
47. Law Enforcement Partnerships Enhance Cybersecurity Investigations (Chelsea Binns)
48. States Rush to Cash in on Cybersecurity Boom
(Elaine S. Povich)
49. How the National Guard is Protecting Cybersecurity(Colin Wood)
50. Cybersecurity and Local Governments in the United States William HatCHeR
52.Artificial Intelligence Cyber Attacks Are Coming一But What Does That Mean?(Jeremy Straub)
53.FCC Group on 5G Deployment Short on Local Input(Mary Ann Barton)
54.Thinking Strategically in the Cyber Domain
(John O’Brien)
55.Internet,E-mail and Computer Use Policy(Texas Workforce Commission)
56.Consumers Who Froze Their Credit Reports
(Julie Appleby)

打赏
未经允许不得转载:finelybook » Cybersecurity: Current Writings on Threats and Protection

评论 抢沙发

觉得文章有用就打赏一下

您的打赏,我们将继续给力更多优质内容

支付宝扫一扫

微信扫一扫