Cybersecurity Best Practices : Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden
Material type:
- 978-3658216542
- 23 005.8 BAR
Item type | Current library | Collection | Call number | Status | Notes | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
Air University Central Library Islamabad Cyber Security | Cyber Security | 005.8 BAR (Browse shelf(Opens below)) | Available | Computer science. Leadership. Management information systems. | P6161 |
Browsing Air University Central Library Islamabad shelves, Shelving location: Cyber Security , Collection: Cyber Security Close shelf browser (Hides shelf browser)
Includes bibliographical references and index.
The topic of cybersecurity is more topical than ever, because it is difficult to set limits in terms of access to information, data and freedom of speech in cyberspace. Criminals often take advantage of the gaps. The large number of IT systems, their different types of use and their innovation and life cycles have led to high security risks for companies and government institutions. These risks will not be easily eliminated in the long term. Therefore institutions have to develop strategies and solutions for their self-protection. This book describes approaches and best practices from a wide variety of areas that have been shown to lead to greater resilience to cyberattacks.
Globally renowned IT security experts report in 40 articles how state institutions, including the military (cyber defense), authorities, international organizations and companies, can better protect themselves against cyber attacks and develop sustainable protection strategies. The authors address the reasons and goals underlying their respective strategies, report on how companies reacted to specific cyber attacks and how individual state institutions act in the face of national cyber strategies. In further chapters, scientists show what is already possible today in the defense against cyber attacks, which developments are in progress and how they can be used in the future to increase cyber security. In the last chapter, manufacturers, user companies and service providers report which best practices they have introduced in their companies and how other companies can follow their example.
The book is aimed at IT managers and security officers in companies and other organisations, but also at students in the various IT courses
There are no comments on this title.