Listing 1 - 10 of 702 | << page >> |
Sort by
|
Choose an application
This pocket guide offers practical advice on how to develop an IT Induction programme for staff that can help safeguard business information. By providing employees with simple instruction in good IT working practices, and by making sure they know what is expected of them, a company can strengthen their information security and reduce the risk that data will be stolen or lost.
Information technology --- Computer security. --- Data protection. --- Management. --- IT induction. --- information security awareness. --- information security breaches. --- information security. --- security awareness.
Choose an application
This book constitutes the revised selected papers of the 18th International Conference on Risks and Security of Internet and Systems, CRiSIS 2023, which took place in Rabat, Morocco, during December 6–8, 2023. The 13 full papers and 2 short papers included in this volume were carefully reviewed and selected from 25 submissions. The papers detail security issues in internet-related applications, networks and systems. .
Choose an application
This volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 15–17, 2024. The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Blockchain Technology, Privacy Enhancing Technologies, System Security, Network Security, AI Security. .
Choose an application
This volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 15–17, 2024. The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Post-Quantum Cryptography, Cryptanalysis, Secure Protocols, Application Security. .
Choose an application
This book reviews how to safeguard digital network infrastructures, emphasizing on the latest trends in cybersecurity. It addresses the evolution of network systems, AI-driven threat detection, and defense mechanisms, while also preparing readers for future technological impacts on security. This concise resource is essential to understanding and implementing advanced cyber defense strategies in an AI-integrated world. Readers are provided with methods and tips on how to evaluate the efficacy, suitability, and success of cybersecurity methods and AI/machine learning applications to safeguard their networks. Case studies are included; with examples of how security gaps have led to security breaches and how the methods discussed in the book would help combat these. This book is intended for those who wish to understand the latest trends in network security. It provides an exploration of how AI is revolutionizing cyber defense, offering readers from various fields including insights into strengthening security strategies. With its detailed content, the book empowers its audience to navigate complex regulations and effectively protect against a landscape of evolving cyber threats, ensuring they are well-equipped to maintain robust security postures within their respective sectors. What You Will Learn: The transformative role AI plays in enhancing network security, including threat detection, pattern recognition, and automated response strategies. Cutting-edge security protocols, encryption techniques, and the deployment of multi-layered defense systems for robust network protection. Insights into vulnerability assessments, risk analysis, and proactive measures to prevent and mitigate cyber threats in modern network environments. Who This Book is for: IT professionals and network administrators, cybersecurity specialists and analysts, students and researchers in computer science or cybersecurity programs, corporate decision-makers and C-level executives responsible for overseeing their organizations' security posture. Also security architects and engineers designing secure network infrastructures, government and defense agency personnel tasked with protecting national and organizational cyber assets. Finally technology enthusiasts and hobbyists with a keen interest in cybersecurity trends and AI developments and professionals in regulatory and compliance roles requiring an understanding of cybersecurity challenges and solutions.
Choose an application
This book delves into the critical realm of cyber security, specifically focusing on the ever-present threats that can cripple your organization. We will dissect real-world attacks methods and mitigation strategies, analyze industry and regulatory requirements as they impact your boardroom decisions, and expose the vulnerabilities that leave organizations susceptible to data breaches. But why should cyber security be a top priority for CEOs, directors, and board members? A successful cyber-attack can be catastrophic. Beyond financial losses, data breaches can erode customer trust, damage brand reputation, disrupt critical operations, and even lead to legal ramifications for the board and for directors, such as regulatory fines and lawsuits. This book empowers you to make informed decisions for your organization regarding cyber risk. We will equip you to not only understand the evolving threat landscape and the potential impact of an attack, but also to proactively reduce and mitigate those risks. This knowledge will ensure you fulfill your reporting obligations and demonstrate strong corporate governance in the face of ever-present cyber threats. The digital age presents immense opportunities, but it also demands a heightened awareness of cyber security risks. This book is your roadmap to navigating this complex landscape, understanding your obligations as a director or board member, and ensuring your organization remains secure and thrives in this increasingly digital world. What You Will Learn: Typical methods employed by cybercriminal gangs. Board and management responsibilities and obligations. Common governance principles and standards. What are the cybersecurity frameworks and how do they work together? Best practices for developing a cybersecurity strategy. Understanding penetration testing reports and compliance audits. Tips for reading and understanding the audit report. Who This Book is for: Boards, directors, and management who have a responsibility over cyber security and ensuring cyber resilience for their organization.
Choose an application
In today's digital landscape, safeguarding sensitive information is paramount. This book offers a comprehensive roadmap for managing and mitigating the impact of security incidents and data breaches. This essential guide goes beyond the basics, providing expert insights and strategies to help organizations of all sizes navigate the complexities of cybersecurity. With seven in-depth chapters and 10 appendices, this book covers everything from defining information security incidents and data breaches to understanding key privacy regulations such as GDPR and LGPD. You'll learn a practical, step-by-step approach to incident response, including how to assess and improve your organization's security posture. The book contains a well-tested and practical information security incident and breach management approach to manage information security incidents and data privacy breaches in four phases: Security and Breach Obligations and Requirements Comprehension; Security and Privacy Framework Assurance; Security Incident and Data Breach Response Management; and Security and Breach Response Process Evaluation. Knowing how to handle such security and breach issues will avoid compliance and sanctions to organizations of all types and protect the company’s reputation and brand name. What You Will Learn Identify and manage information security incidents and data breaches more effectively Understand the importance of incident response in avoiding compliance issues, sanctions, and reputational damage Review case studies and examples that illustrate best practices and common pitfalls in incident response and data breach management Benefit from a well-tested approach that goes beyond the NIST 800-61 standard, aligning with the international information security standard ISO 27001:2022 .
Choose an application
This unique new volume analyses source documents both previously known and recently declassified, generating an extremely broad and original synthesis about Enigma. The author uses his experience as a cryptologist to fill in gaps in the sources or to correct misguided interpretations, also adding the passion of a journalist, drawing a vivid picture of the characters and the story. As a Pole, he presents this story through the lens of the fate of the Polish mathematicians who were the first to break the cipher as early as 1932 and laid the foundations for the subsequent Allied success. The book’s coverage ranges from the mathematical foundations of codebreaking, through the complex fates of the people and organisations involved in the attacks on the Enigma ciphers, the impact of decrypts on the fate of the major campaigns of the Second World War, to the role that wartime cryptology and codebreakers played in the birth of digital civilisation. The Polish mathematicians’ story is presented in the full context of the struggle with the cipher, including the complex interplay between codebreakers, military commanders and politicians of the UK, US, Poland, France, and the Third Reich. By looking at events through the eyes of a cryptologist rather than solely as a historian, the reader is given a glimpse into the backstage of the cryptologic workshop; a better understanding of the scale and nature of the challenges codebreakers faced; and insights into their responses to those challenges, as well as the emotions, dilemmas, disappointments, and triumphs involved. Dr. Marek Grajek holds an M.Sc. in computer science, a Ph.D. in economics, and an M.A. in journalism. His research, authoring, and journalistic activities relate to the history of cryptology and the secret services. His related Polish-language book, Enigma: Bliżej Prawdy, was the Polish History Book of the Year in 2008.
Choose an application
This book covers all topics and requirements of the CompTIA A+ certification exam. It will allow readers to easily understand the concepts, information, and skills needed to obtain the associated certification. CompTIA A+ certification is at its core an entry-level certification to the information technology world, including cybersecurity. It is comprised of a set of two exams (Exams 220-1101 & 220-1102) created by IT industry professionals that validate skills needed for entry-level IT jobs, including cybersecurity. This certification stands as baseline proof of knowledge of these topics and is largely sought by recruiters. Main exam topics include hardware, networking, mobile devices, security, Windows operating system, other IOS technologies, software troubleshooting and operations procedures. This book has been designed to follow the core requirements for the full scope of the CompTIA A+ certification, covering both examination test requirements. It has been formatted to follow a logical and easy to follow order to allow a foundational level of understanding prior to moving onto more advanced topics. The book will provide all readers with the appropriate knowledge and information to have a foundational level of many Information Technology components. It will primarily serve the newer entrants to the field but will also support more experienced individuals that are looking towards certifications. What You Will Learn: Effective communication with clients and colleagues and interpersonal skills for collaboration in team environments. Understanding of motherboard components and architecture. Knowledge of CPU types and socket compatibility. Installation and configuration of operating systems. Software troubleshooting techniques. Installation and configuration of Windows, Linux, and macOS. Management of system settings and user accounts. Identification of laptop components and peripherals. Maintenance procedures for laptops, including cleaning and battery management. Configuration of mobile device settings and preferences. Understanding of mobile operating systems and app installation procedures. Troubleshooting common printer hardware and software issues. Basic networking concepts, including IP addressing and subnetting. Configuration of network devices such as routers and switches. Configuration and management of wireless access points. Implementation of wireless security protocols such as WPA2 and WPA3. Understanding of cloud service models (IaaS, PaaS, SaaS). Deployment and management of virtual machines in the cloud. Recognition of common security threats and vulnerabilities. Implementation of security best practices for data protection. Who this book is for: Anyone that is looking to get into the information technology or cybersecurity fields. This would also include academics looking to pursue bachelor’s or master’s degrees, as often programs include the A+ certification. There is no necessary prior skill experience or knowledge needed.
Choose an application
Today, it’s easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it’s not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities—whether human or machine, to initiate or progress their attack. Detecting and defending against these malicious activities should be the basis of all modern cybersecurity initiatives. This book details the risks associated with poor identity security hygiene, the techniques that external and internal threat actors leverage, and the operational best practices that organizations should adopt to protect against identity theft, account compromises, and to develop an effective identity and access security strategy. As a solution to these challenges, Identity Security has emerged as a cornerstone of modern Identity and Access Management (IAM) initiatives. Managing accounts, credentials, roles, entitlements, certifications, and attestation reporting for all identities is now a security and regulatory compliance requirement. In this book, you will discover how inadequate identity and privileged access controls can be exploited to compromise accounts and credentials within an organization. You will understand the modern identity threat landscape and learn how role-based identity assignments, entitlements, and auditing strategies can be used to mitigate the threats across an organization’s entire Identity Fabric. What You Will Learn Understand the concepts behind an identity and how its associated credentials and accounts can be leveraged as an attack vector Implement an effective identity security strategy to manage identities and accounts based on roles and entitlements, including the most sensitive privileged accounts Know the role that identity security controls play in the cyber kill chain and how privileges should be managed as a potential weak link Build upon industry standards and strategies such as Zero Trust to integrate key identity security technologies into a corporate ecosystem Plan for a successful identity and access security deployment; create an implementation scope and measurable risk reduction; design auditing, discovery, and regulatory reporting; and develop oversight based on real-world strategies to prevent identity attack vectors.
Computer security. --- Identity theft. --- Data protection. --- Data and Information Security.
Listing 1 - 10 of 702 | << page >> |
Sort by
|