Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Class notes

Cyber Security

Rating
-
Sold
-
Pages
361
Uploaded on
05-06-2023
Written in
2020/2021

We live in a world where technology and vast quantities of data play a considerable role in everyday life, personal and professional. For the foreseeable future (and perhaps beyond), their growth and prominence are showing no signs of slowing down, even if the technology in question will likely change in ways perhaps unimaginable today. Naturally, all this innovation brings huge opportunities and benefits to companies and individuals alike. However, these come at more than just a financial cost. In the world as we know it, you can be attacked both physically and virtually. For today’s organisations, which rely so heavily on technology – particularly the Internet – to do business, the latter is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. Worse, when a vulnerability is identified, a tool that can exploit it is often developed and used within hours – faster than the time it normally takes for the vendor to release a patch, and certainly quicker than the time many organisations take to install that patch. The fact that technology is involved gives attackers a huge advantage over the defenders – not only can they attack anyone, anywhere, from the comfort of their home, they often have automated tools to identify their victims – and their vulnerabilities – for them. Moreover, from an attacker’s perspective, there is often a very good risk-to-reward ratio: for the victim, it can be hard enough to detect that the attack happened at all, never mind trace who was behind it. It is the very nature of the digital information that we are trying to protect that is easy to copy. In fact, stealing the information does not require removing it from its original location at all, meaning that the owner of that information may never realize that the theft happened.

Show more Read less
Institution
Course

Content preview

, The Cyber Security
Handbook
Prepare for, respond to and recover from
cyber attacks with the IT Governance Cyber
Resilience Framework (CRF)

, The Cyber Security
Handbook
Prepare for, respond to and recover from
cyber attacks with the IT Governance Cyber
Resilience Framework (CRF)




ALAN CALDER

, Every possible effort has been made to ensure that the information
contained in this book is accurate at the time of going to press, and the
publisher and the author cannot accept responsibility for any errors or
omissions, however caused. Any opinions expressed in this book are
those of the author, not the publisher. Websites identified are for
reference only, not endorsement, and any website visits are at the
reader’s own risk. No responsibility for loss or damage occasioned to
any person acting, or refraining from action, as a result of the material in
this publication can be accepted by the publisher or the author.
Apart from any fair dealing for the purposes of research or private study,
or criticism or review, as permitted under the Copyright, Designs and
Patents Act 1988, this publication may only be reproduced, stored or
transmitted, in any form, or by any means, with the prior permission in
writing of the publisher or, in the case of reprographic reproduction, in
accordance with the terms of licences issued by the Copyright Licensing
Agency. Enquiries concerning reproduction outside those terms should
be sent to the publisher at the following address:
IT Governance Publishing Ltd
Unit 3, Clive Court
Bartholomew’s Walk
Cambridgeshire Business Park
Ely, Cambridgeshire
CB7 4EA
United Kingdom
www.itgovernancepublishing.co.uk
© Alan Calder 2020
The authors have asserted their rights of the author under the Copyright,
Designs and Patents Act, 1988, to be identified as the authors of this
work.
First edition published in the United Kingdom in 2020 by IT Governance
Publishing
ISBN 978-1-78778-261-7

Written for

Institution
Course

Document information

Uploaded on
June 5, 2023
Number of pages
361
Written in
2020/2021
Type
Class notes
Professor(s)
Professor. omang
Contains
All classes

Subjects

$10.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
zaydenkim

Get to know the seller

Seller avatar
zaydenkim Kenya
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
2 year
Number of followers
0
Documents
4
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions