Home Page Icon
Home Page
Table of Contents for
Cover image
Close
Cover image
by Gerald L. Kovacich
The Information Systems Security Officer's Guide, 3rd Edition
Cover image
Title page
Table of Contents
Copyright
Dedication
About the Author
Preface
Acknowledgments
Introduction
Section I. The Working Environment of the Cyber Security Officer
Introduction
Chapter 1. Understanding the Past and Present Cyber-Information World Environment
Ah, the Good Ol’ Days!
Global Information Infrastructure
National Information Infrastructure
How Did We Get from Adam to the Internet?
Changing Criminal Justice Systems
The Human Factor
Summary
Chapter 2. Understanding the Past and Present Global Business and Management Environment
The Changing Business and Government Environments
Understanding the Business Environment
Management Responsibilities and Communicating with Management
Creating a Competitive Advantage through a Cyber Security Program
Service, Support, and a Business Orientation
Business Managers and Cyber security
What Company Managers Should Ask of Their Cyber Security Professionals
What Cyber Security Professionals Should Do
Questions to Consider
Summary
Chapter 3. An Overview of Related World Views of Cyber Security
Evolution of Laws, Standards, Policies, and Procedures
Global via the UN
The EU
Asia
South America
Africa
Canada
United States
Summary
Chapter 4. A Glimpse at the History of Technology
What Is Technology?
From Cave Man to Cyber Security Professional and Information Warrior
Revolutions and Evolutions in High Technology
From the Twentieth Century to Today: Technology and the Advent of High Technology
The Internet
The High-Technology-Driven Phenomenon
Faster and More Massive High-Technology-Driven Communications
The Beneficial Effect of Hacker Tools and Other Malicious Software on Network Security with Dual Roles as Cyber Security Tools
Other High-Technology Tools in Cyber Security
Welcome to the Twenty-First-Century Technology
Summary
Chapter 5. Understanding Today’s Threats in the Cyber Vapor—“War Stories” from the Front Lines
Reported Digital Battlefield Attacks and Related Stories
Summary
Section II. The Duties and Responsibilities of a Cyber Security Officer
Introduction
Chapter 6. The Cyber Security Officer’s Position, Duties, and Responsibilities
Introduction
The Cyber Security Officer in a Global Corporation
Cyber Security Officer Duties and Responsibilities
Goals and Objectives
Leadership Position
Vision, Mission, and Quality Statements
Cyber Security Principles
Project and Risk Management Processes
Cyber Security Officer and Organizational Responsibilities
Summary
Chapter 7. The Cyber Security Program’s Strategic, Tactical, and Annual Plans
Introduction
Corporate’s Cyber Security Strategic Plan
Corporate’s Cyber Security Tactical Plan
Cyber Security Annual Plan
Questions to Consider
Summary
Chapter 8. Establishing a Cyber Security Program and Organization
Introduction
Corporate Cyber Security Program
Cyber Security Officer Thought Process in Establishing the Cyber Security Organization
Questions to Consider
Summary
Chapter 9. Determining and Establishing Cyber Security Functions
Introduction
Processes
Valuing Information
International Widget Corporation (IWC) Cyber Security Program Functions Process Development
Cyber Security Officer’s Cyber Security Program Functions
Access Control and Access Control Systems
Evaluation of All Hardware, Firmware, and Software
Risk Management Program
Security Tests and Evaluations Program
Noncompliance Inquiries
Contingency and Emergency Planning and Disaster Recovery Program
Questions to Consider
Summary
Chapter 10. Establishing a Metrics Management System
Introduction
Metrics 1: Cyber Security Program Level of Effort Drivers—Number of Users
Examples of Other Metrics Charts
Project Management
Questions to Consider
Summary
Chapter 11. Annual Reevaluation and Future Plans
Introduction
One-Year Review
Cyber Security Program Strategic, Tactical, and Annual Plans
Linking Cyber Security Program Accomplishments to Corporate Goals
Metrics Analysis
Planning for Next Year
Questions to Consider
Summary
Chapter 12. High-Technology Crimes Investigative Support
Introduction
Duties and Responsibilities of a Cyber Security Officer in Deterring High-Technology Crimes
Assisting with Computer Forensics Support
Dealing with Law Enforcement
Questions to Consider
Summary
Section III. The Global, Professional, and Personal Challenges of a Cyber Security Officer
Introduction
Chapter 13. Introduction to Global Information Warfare
The Possibilities
Introduction to Warfare
Four Generations of Warfare
Introduction to Global Information Warfare
Information Warfare Will Hit You in Your Pocketbook
Business Is War
IW Broadly Encompasses Many Levels and Functions
What IW Is … and Is Not
Being Prepared-Bad Things Will Happen
The Possible Breakdowns in an Information Environment
Going beyond Three Blind Men Describing an Elephant: Information Warfare Terms of Reference
Information Warfare Is a Powerful Approach for Attaining and Maintaining a Competitive Advantage
How to Use IW to Achieve Goals and Objectives
Coherent Knowledge-Based Operations
Network-Centric Business
Knowledge Management
Summary
Note
Chapter 14. The Cyber Security Officer and Privacy, Ethical, and Liability Issues
Introduction to Privacy Issues
Introduction to Ethics Issues
Codes of Ethics
Corporate Ethics, Standards of Conduct, Business Practices, and Corporate Values
Liability Issues
Questions to Consider
Summary
Chapter 15. A Career as a Cyber Security Officer
Introduction
The Cyber Security Officer’s Career Development Program
Education
Questions
Summary
Chapter 16. A Look at the Possible Future
Surviving into the Future
New Old Approach to Security—Defensive Approach
The Changing Environment
The Need for Enlightened and Dedicated Leadership
Global Trends
Offensive–Defensive Cyber Attacks
The Future of the Internet
Questions
Summary
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Title page
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset