Section I. The Working Environment of the Cyber Security Officer
Chapter 1. Understanding the Past and Present Cyber-Information World Environment
Global Information Infrastructure
National Information Infrastructure
How Did We Get from Adam to the Internet?
Changing Criminal Justice Systems
Chapter 2. Understanding the Past and Present Global Business and Management Environment
The Changing Business and Government Environments
Understanding the Business Environment
Management Responsibilities and Communicating with Management
Creating a Competitive Advantage through a Cyber Security Program
Service, Support, and a Business Orientation
Business Managers and Cyber security
What Company Managers Should Ask of Their Cyber Security Professionals
What Cyber Security Professionals Should Do
Chapter 3. An Overview of Related World Views of Cyber Security
Evolution of Laws, Standards, Policies, and Procedures
Chapter 4. A Glimpse at the History of Technology
From Cave Man to Cyber Security Professional and Information Warrior
Revolutions and Evolutions in High Technology
From the Twentieth Century to Today: Technology and the Advent of High Technology
The High-Technology-Driven Phenomenon
Faster and More Massive High-Technology-Driven Communications
Other High-Technology Tools in Cyber Security
Welcome to the Twenty-First-Century Technology
Chapter 5. Understanding Today’s Threats in the Cyber Vapor—“War Stories” from the Front Lines
Section II. The Duties and Responsibilities of a Cyber Security Officer
Chapter 6. The Cyber Security Officer’s Position, Duties, and Responsibilities
The Cyber Security Officer in a Global Corporation
Cyber Security Officer Duties and Responsibilities
Vision, Mission, and Quality Statements
Project and Risk Management Processes
Cyber Security Officer and Organizational Responsibilities
Chapter 7. The Cyber Security Program’s Strategic, Tactical, and Annual Plans
Corporate’s Cyber Security Strategic Plan
Corporate’s Cyber Security Tactical Plan
Chapter 8. Establishing a Cyber Security Program and Organization
Corporate Cyber Security Program
Cyber Security Officer Thought Process in Establishing the Cyber Security Organization
Chapter 9. Determining and Establishing Cyber Security Functions
International Widget Corporation (IWC) Cyber Security Program Functions Process Development
Cyber Security Officer’s Cyber Security Program Functions
Access Control and Access Control Systems
Evaluation of All Hardware, Firmware, and Software
Security Tests and Evaluations Program
Contingency and Emergency Planning and Disaster Recovery Program
Chapter 10. Establishing a Metrics Management System
Metrics 1: Cyber Security Program Level of Effort Drivers—Number of Users
Examples of Other Metrics Charts
Chapter 11. Annual Reevaluation and Future Plans
Cyber Security Program Strategic, Tactical, and Annual Plans
Linking Cyber Security Program Accomplishments to Corporate Goals
Chapter 12. High-Technology Crimes Investigative Support
Duties and Responsibilities of a Cyber Security Officer in Deterring High-Technology Crimes
Section III. The Global, Professional, and Personal Challenges of a Cyber Security Officer
Chapter 13. Introduction to Global Information Warfare
Introduction to Global Information Warfare
Information Warfare Will Hit You in Your Pocketbook
IW Broadly Encompasses Many Levels and Functions
Being Prepared-Bad Things Will Happen
The Possible Breakdowns in an Information Environment
Going beyond Three Blind Men Describing an Elephant: Information Warfare Terms of Reference
Information Warfare Is a Powerful Approach for Attaining and Maintaining a Competitive Advantage
How to Use IW to Achieve Goals and Objectives
Coherent Knowledge-Based Operations
Chapter 14. The Cyber Security Officer and Privacy, Ethical, and Liability Issues
Introduction to Privacy Issues
Corporate Ethics, Standards of Conduct, Business Practices, and Corporate Values
Chapter 15. A Career as a Cyber Security Officer
The Cyber Security Officer’s Career Development Program
Chapter 16. A Look at the Possible Future
New Old Approach to Security—Defensive Approach
The Need for Enlightened and Dedicated Leadership
52.14.77.134