Cyber Security Policy Guidebook

Cyber Security Policy Guidebook

by Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus H. Sachs
     
 

View All Available Formats & Editions

Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current approaches to the security of cyberspace. It includes

See more details below

Overview

Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current approaches to the security of cyberspace. It includes thorough descriptions—as well as the pros and cons—of a plethora of issues, and documents policy alternatives for the sake of clarity with respect to policy alone. The Guidebook also delves into organizational implementation issues, and equips readers with descriptions of the positive and negative impact of specific policy choices.

Inside are detailed chapters that:

  • Explain what is meant by cyber security and cyber security policy

  • Discuss the process by which cyber security policy goals are set

  • Educate the reader on decision-making processes related to cyber security

  • Describe a new framework and taxonomy for explaining cyber security policy issues

  • Show how the U.S. government is dealing with cyber security policy issues

With a glossary that puts cyber security language in layman's terms—and diagrams that help explain complex topics—Cyber Security Policy Guidebook gives students, scholars, and technical decision-makers the necessary knowledge to make informed decisions on cyber security policy.

Read More

Editorial Reviews

From the Publisher
“This very readable and organized guidebook equips readers with a consistent methodology for turning their answers to those questions into cyber security policy.”  (Computing Reviews, 24 April 2013)

Product Details

ISBN-13:
9781118027806
Publisher:
Wiley
Publication date:
04/24/2012
Edition description:
New Edition
Pages:
288
Sales rank:
1,498,786
Product dimensions:
7.40(w) x 9.30(h) x 0.80(d)

Related Subjects

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >