Listing 1 - 6 of 6 |
Sort by
|
Choose an application
"This book is a taxonomy and thesaurus of current cybersecurity policy issues, including a thorough description of each issue and a corresponding list of pros and cons with respect to identified stances on each issue"--Provided by publisher. "Drawing upon a wealth of experience from academia, industry, and government service, this book details and dissects current organizational cybersecurity policy issues on a global scale. Using simple language, it includes a thorough description of each issue, lists pros and cons, documents policy alternatives for the sake of clarity with respect to policy alone, and dives into organizational implementation issues. It also equips the reader with descriptions of the impact of specific policy choices, both positive and negative. This book gives students, scholars, and technical decision-makers the necessary knowledge of cybersecurity policy in order to make more informed decisions"--Provided by publisher.
Choose an application
Based on insider accounts and exclusive interviews with experts, this book offers a first-time chronicle and analysis of the Trump administration's approach to cybersecurity, its curious decisions and strategic choices, places where its work has earned applause, and the places where cyber pros see major signs of danger.
Choose an application
While technological threats to personal privacy have proliferated rapidly, legislation designed to protect privacy has been slow and incremental. In this study of legislative attempts to reconcile privacy and technology, Priscilla Regan examines congressional policy making in three key areas: computerized databases, wiretapping, and polygraph testing. In each case, she argues, legislation has represented an unbalanced compromise benefiting those with a vested interest in new technology over those advocating privacy protection. Legislating Privacy explores the dynamics of congressio
Choose an application
US national security compromised by WikiLeaks. Towns held hostage by ransomware. Corporate websites hacked. Cyber espionage and cybercrimes are increasing in both frequency and sophistication - requiring the collection of actionable intelligence in order to combat them. The author provides here a comprehensive overview of cyber intelligence, explaining what it is, why it is needed, who is doing it, and how it is done. Notably, the book : Outlines the roles of the major US intelligence agencies involved; Assesses significant laws and policies from the 1990s to the present; Compares methods and best practices across the public and private sectors; Looks beyond the US to explore the capabilities of actors like China, Iran, and Russia; Includes real-world examples and case studies. The result is an in-depth examination of the processes and applications of spying in cyberspace, accessible to a wide range of readers.
Computer networks --- Cyber intelligence (Computer security) --- National security --- Intelligence service --- Internet in espionage --- Security measures --- Government policy --- CYBER INTELLIGENCE (COMPUTER SECURITY)--GOVERNMENT POLICY--USA --- INTELLIGENCE SERVICE--USA --- USA--NATIONAL SECURITY --- COMPUTER NETWORKS--SECURITY MEASURES--GOVERNMENT POLICY--USA --- Computer networks - Security measures - Government policy - United States --- Cyber intelligence (Computer security) - Government policy - United States --- National security - United States --- Intelligence service - United States
Choose an application
Computer security --- Lie detectors and detection --- Privacy, Right of --- Wiretapping --- Government policy --- Privacy [Right of ] --- United States --- Computer security - Government policy - United States. --- Wiretapping - Government policy - United States. --- Lie detectors and detection - Government policy - United States.
Choose an application
In the last decade, the proliferation of billions of new Internet-enabled devices and users has significantly expanded concerns about cybersecurity. But should we believe the prophets of cyber war or worry about online government surveillance ? Are such security concerns real, exaggerated or just poorly understood ? The authors provide here a cutting-edge introduction to the key concepts, controversies and policy debates in cybersecurity. Exploring the interactions of individuals, groups and states in cyberspace, and the integrated security risks to which these give rise, they examine cyberspace as a complex socio-technical-economic domain that fosters both great potential and peril. Structured around ten chapters, the book explores the complexities and challenges of cybersecurity using case studies - from the Morris Worm and Titan Rain to BlackEnergy and the Cyber Caliphate - to highlight the evolution of attacks that can exploit and damage individual systems and critical infrastructures.
Internet --- Computer security --- Internet governance --- Computer crimes --- Security, International --- Security measures --- Government policy --- Political aspects --- Prevention --- Internet governance. --- Security, International. --- Systèmes informatiques --- Gouvernance d'Internet --- Criminalité informatique --- Sécurité internationale --- Government policy. --- Political aspects. --- Prevention. --- Mesures de sûreté --- Politique publique. --- Aspect politique --- Prévention. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- CYBERSPACE--SECURITY MEASURES --- INTERNET--SECURITY MEASURES --- COMPUTER SECURITY --- INTERNET--POLITICAL ASPECTS --- COMPUTER CRIMES--PREVENTION --- Computerbeveiliging --- Internet : beveiliging --- Computercriminaliteit --- Computernetwerken --- 681.3 --- 004.7 --- Internet - Security measures - Government policy --- Computer security - Government policy --- Internet - Political aspects --- Computer crimes - Prevention --- Cybercriminalité --- Systèmes informatiques --- Cybercriminalité --- Sécurité internationale --- Mesures de sûreté --- Prévention.
Listing 1 - 6 of 6 |
Sort by
|