Cyber Security Policy Guidebook

Overview

Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current approaches to the security of cyberspace. It includes thorough descriptions—as well as the pros and cons—of a plethora of issues, and documents policy alternatives for the sake of clarity with respect to policy alone. The ...

See more details below
Hardcover (New Edition)
$79.89
BN.com price
(Save 14%)$92.95 List Price
Other sellers (Hardcover)
  • All (7) from $74.16   
  • New (6) from $74.16   
  • Used (1) from $79.88   
Cyber Security Policy Guidebook

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$52.99
BN.com price
(Save 42%)$92.95 List Price

Overview

Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current approaches to the security of cyberspace. It includes thorough descriptions—as well as the pros and cons—of a plethora of issues, and documents policy alternatives for the sake of clarity with respect to policy alone. The Guidebook also delves into organizational implementation issues, and equips readers with descriptions of the positive and negative impact of specific policy choices.

Inside are detailed chapters that:

  • Explain what is meant by cyber security and cyber security policy
  • Discuss the process by which cyber security policy goals are set
  • Educate the reader on decision-making processes related to cyber security
  • Describe a new framework and taxonomy for explaining cyber security policy issues
  • Show how the U.S. government is dealing with cyber security policy issues

With a glossary that puts cyber security language in layman's terms—and diagrams that help explain complex topics—Cyber Security Policy Guidebook gives students, scholars, and technical decision-makers the necessary knowledge to make informed decisions on cyber security policy.

Read More Show Less

Editorial Reviews

From the Publisher
“This very readable and organized guidebook equips readers with a consistent methodology for turning their answers to those questions into cyber security policy.” (Computing Reviews, 24 April 2013)
Read More Show Less

Product Details

  • ISBN-13: 9781118027806
  • Publisher: Wiley
  • Publication date: 4/24/2012
  • Edition description: New Edition
  • Edition number: 1
  • Pages: 288
  • Sales rank: 471,105
  • Product dimensions: 7.40 (w) x 9.30 (h) x 0.80 (d)

Meet the Author

Dr. Jennifer L. Bayuk is an independent cyber security consultant and industry professor at Stevens Institute of Technology in Hoboken, New Jersey.

Jason Healey runs the Cyber Statecraft Initiative at the Atlantic Council in Washington, DC.

Dr. Paul Rohmeyer directs the Technology Information Management program at Stevens Institute of Technology in Hoboken, New Jersey.

Marcus H. Sachs is the Vice President for National Security Policy at Verizon Communications.

Jeffrey Schmidt is a cyber security technology entrepreneur.

Joseph Weiss is an industrial control system cyber security author and consultant.

Read More Show Less

Table of Contents

Foreword ix

Preface xi

Acknowledgments xv

1 Introduction 1

1.1 What Is Cyber Security? 1

1.2 What Is Cyber Security Policy? 3

1.3 Domains of Cyber Security Policy 7

1.3.1 Laws and Regulations 7

1.3.2 Enterprise Policy 9

1.3.3 Technology Operations 10

1.3.4 Technology Configuration 10

1.4 Strategy versus Policy 11

2 Cyber Security Evolution 15

2.1 Productivity 15

2.2 Internet 21

2.3 e-Commerce 28

2.4 Countermeasures 34

2.5 Challenges 37

3 Cyber Security Objectives 39

3.1 Cyber Security Metrics 40

3.2 Security Management Goals 45

3.3 Counting Vulnerabilities 49

3.4 Security Frameworks 51

3.4.1 e-Commerce Systems 52

3.4.2 Industrial Control Systems 57

3.4.3 Personal Mobile Devices 62

3.5 Security Policy Objectives 67

4 Guidance for Decision Makers 69

4.1 Tone at the Top 69

4.2 Policy as a Project 71

4.3 Cyber Security Management 73

4.3.1 Arriving at Goals 74

4.3.2 Cyber Security Documentation 77

4.4 Using the Catalog 79

5 The Catalog Approach 83

5.1 Catalog Format 87

5.2 Cyber Security Policy Taxonomy 89

6 Cyber Security Policy Catalog 93

6.1 Cyber Governance Issues 94

6.1.1 Net Neutrality 95

6.1.2 Internet Names and Numbers 96

6.1.3 Copyrights and Trademarks 103

6.1.4 Email and Messaging 107

6.2 Cyber User Issues 112

6.2.1 Malvertising 116

6.2.2 Impersonation 117

6.2.3 Appropriate Use 121

6.2.4 Cyber Crime 125

6.2.5 Geolocation 136

6.2.6 Privacy 138

6.3 Cyber Conflict Issues 140

6.3.1 Intellectual Property Theft 144

6.3.2 Cyber Espionage 145

6.3.3 Cyber Sabotage 150

6.3.4 Cyber Warfare 150

6.4 Cyber Management Issues 155

6.4.1 Fiduciary Responsibility 162

6.4.2 Risk Management 163

6.4.3 Professional Certification 171

6.4.4 Supply Chain 172

6.4.5 Security Principles 175

6.4.6 Research and Development 185

6.5 Cyber Infrastructure Issues 186

6.5.1 Banking and Finance 190

6.5.2 Health Care 194

6.5.3 Industrial Control Systems 197

7 One Government’s Approach to Cyber Security Policy 211

7.1 U.S. Federal Cyber Security Strategy 211

7.2 A Brief History of Cyber Security Public Policy Development in the U.S. Federal Government 212

7.2.1 The Bombing of New York's World Trade Center on February 26, 1993 212

7.2.2 Cyber Attacks against the United States Air Force, March–May 1994: Targeting the Pentagon 213

7.2.3 The Citibank Caper, June–October, 1994: How to Catch a Hacker 214

7.2.4 Murrah Federal Building, Oklahoma City—April 19, 1995: Major Terrorism Events and Their U.S. Outcomes 215

7.2.5 President’s Commission on Critical Infrastructure Protection—1996 216

7.2.6 Presidential Decision Directive 63—1998 218

7.2.7 National Infrastructure Protection Center (NIPC) and ISACs—1998 219

7.2.8 Eligible Receiver—1997 219

7.2.9 Solar Sunrise—1998 220

7.2.10 Joint Task Force—Computer Network Defense (JTF-CND)—1998 221

7.2.11 Terrorist Attacks against the United States—September 11, 2001 Effects of Catastrophic Events on Transportation System Management and Operations 222

7.2.12 U.S. Government Response to the September 11, 2001 Terrorist Attacks 224

7.2.13 Homeland Security Presidential Directives 226

7.2.14 National Strategies 227

7.3 The Rise of Cyber Crime 230

7.4 Espionage and Nation-State Actions 232

7.5 Policy Response to Growing Espionage Threats: U.S. Cyber Command 233

7.6 Congressional Action 235

7.7 Summary 236

8 Conclusion 239

Glossary 243

References 255

Index 267

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)