Buch, Englisch, 264 Seiten, Format (B × H): 240 mm x 162 mm, Gewicht: 508 g
Buch, Englisch, 264 Seiten, Format (B × H): 240 mm x 162 mm, Gewicht: 508 g
Reihe: Security, Audit and Leadership Series
ISBN: 978-0-367-63962-4
Verlag: Taylor & Francis Ltd
Ensuring cybersecurity and corporate governance for enterprises should not be an afterthought or present a huge challenge. In recent times, the complex diversity of cyber-attacks has been skyrocketing, and zero-day attacks, such as ransomware, botnet, and telecommunication attacks, are happening more frequently than before. New hacking strategies would easily bypass existing enterprise security and governance platforms using advanced, persistent threats. For example, in 2020, the Toll Group firm was exploited by a new crypto-attack family for violating its data privacy, where an advanced ransomware technique was launched to exploit the corporation and request a huge figure of monetary ransom. Even after applying rational governance hygiene, cybersecurity configuration and software updates are often overlooked when they are most needed to fight cyber-crime and ensure data privacy. Therefore, the threat landscape in the context of enterprises has become wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of this network.
In this context, this book addresses the cybersecurity and cooperate governance challenges associated with enterprises, which will provide a bigger picture of the concepts, intelligent techniques, practices, and open research directions in this area. This book serves as a single source of reference for acquiring the knowledge on the technology, process, and people involved in next-generation privacy and security.
Zielgruppe
Academic, Postgraduate, Professional, and Professional Practice & Development
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Business Application Unternehmenssoftware
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Sozialwissenschaften Politikwissenschaft Regierungspolitik Wirtschafts- und Finanzpolitik
- Mathematik | Informatik EDV | Informatik Informatik Rechnerarchitektur
- Wirtschaftswissenschaften Volkswirtschaftslehre Wirtschaftspolitik, politische Ökonomie
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Soziale und ethische Aspekte der EDV
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Software Engineering
- Wirtschaftswissenschaften Betriebswirtschaft Management Unternehmensorganisation & Entwicklungsstrategien
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Schadprogramme (Viren, Trojaner etc.)
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung
- Wirtschaftswissenschaften Betriebswirtschaft Management Unternehmensgründung
- Mathematik | Informatik EDV | Informatik Informatik Mensch-Maschine-Interaktion
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Wirtschaftswissenschaften Betriebswirtschaft Management Wissensmanagement
Weitere Infos & Material
Chapter 1: Enterprise Threat Intelligence
Chapter 2: Enabling Corporate and Institutional Governance for Effective IT Governance
Chapter 3: The Non-Malicious Risky Behaviour in the Enterprise Information System Security
Chapter 4: Cybersecurity Incident Response in the Enterprise
Chapter 5: Cyber-enabled crime as an enabler in market manipulation schemes
Chapter 6: Data Lakes: A Panacea for Big Data Problems, Cyber Safety Issues, and Enterprise Security
Chapter 7: The Battle for Cloud Supremacy and the Remaking of Enterprise Security
Chapter 8: Security, Privacy and Trust of Emerging Intelligent Transportation: Cognitive Internet of Vehicles
Chapter 9: IT Governance and Enterprise Security Policy in the 6G Era