Syndetics cover image
Image from Syndetics

Business continuity in a cyber world : surviving cyberattacks / David Sutton.

By: Sutton, David (Information security practitioner) [author.].
Material type: TextTextSeries: Information systems collection: Publisher: New York : Business Expert Press, 2018Edition: First edition.General Notes: Available through the Business Expert Press e-library, which can be found on the Davenport University Library database page.Bibliography: Includes bibliographical references.Description: 1 online resource (1 volume) : illustrations.Content type: text Media type: computer Carrier type: online resourceISBN: 9781947441477.Subject(s): Computer security | Information technology -- Management | Computer crimes -- Investigation | Computer networks -- Security measures | Technology -- Risk assessmentGenre/Form: Electronic books. DDC classification: 363.325 Online resources: Access full text materials at no charge:
Contents:
1. The practice of business continuity management -- 2. A brief overview of the risk management process -- 3. The main cybersecurity issues -- 4. Information assets and impacts -- 5. Vulnerabilities and threats -- 6. Selecting strategic, tactical, and operational solutions -- 7. Business continuity activities and solutions -- 8. Testing, exercising, and maintaining plans -- 9. Embedding cybersecurity and business continuity -- Appendix A. Information on cybersecurity controls -- Appendix B. Standards and good practice guidelines -- Glossary -- Bibliography -- About the author -- Index.
Abstract: Until recently, if it has been considered at all in the context of business continuity, cybersecurity may have been thought of in terms of disaster recovery and little else. Recent events have shown that cyberattacks are now an everyday occurrence, and it is becoming clear that the impact of these can have devastating effects on organizations whether large and small, and whether in the public or the private sector. Cybersecurity is one aspect of information security, since the impacts or consequences of a cyberattack will inevitably damage one or more of the three pillars of information security: the confidentiality, integrity, or availability of an organization's information assets. The main difference between information security and cybersecurity is that while information security deals with all types of information assets, cybersecurity deals purely with those that are accessible by means of interconnected electronic networks, including the Internet. Many responsible organizations now have robust information security, business continuity, and disaster recovery programs in place, and it is not the intention of this book to rewrite those, but to inform organizations about the kind of precautions they should take to stave off successful cyberattacks and how they should deal with them when they arise in order to protect their day-to-day business.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

Available through the Business Expert Press e-library, which can be found on the Davenport University Library database page.

Includes bibliographical references.

1. The practice of business continuity management -- 2. A brief overview of the risk management process -- 3. The main cybersecurity issues -- 4. Information assets and impacts -- 5. Vulnerabilities and threats -- 6. Selecting strategic, tactical, and operational solutions -- 7. Business continuity activities and solutions -- 8. Testing, exercising, and maintaining plans -- 9. Embedding cybersecurity and business continuity -- Appendix A. Information on cybersecurity controls -- Appendix B. Standards and good practice guidelines -- Glossary -- Bibliography -- About the author -- Index.

Until recently, if it has been considered at all in the context of business continuity, cybersecurity may have been thought of in terms of disaster recovery and little else. Recent events have shown that cyberattacks are now an everyday occurrence, and it is becoming clear that the impact of these can have devastating effects on organizations whether large and small, and whether in the public or the private sector. Cybersecurity is one aspect of information security, since the impacts or consequences of a cyberattack will inevitably damage one or more of the three pillars of information security: the confidentiality, integrity, or availability of an organization's information assets. The main difference between information security and cybersecurity is that while information security deals with all types of information assets, cybersecurity deals purely with those that are accessible by means of interconnected electronic networks, including the Internet. Many responsible organizations now have robust information security, business continuity, and disaster recovery programs in place, and it is not the intention of this book to rewrite those, but to inform organizations about the kind of precautions they should take to stave off successful cyberattacks and how they should deal with them when they arise in order to protect their day-to-day business.

Description based on online resource; title from title page (Safari, viewed July 20, 2018).

There are no comments on this title.

to post a comment.

Powered by Koha