Muestra

Prime logotipo Exclusivo para miembros Prime: ¿Nuevo en Audible? Obtén 2 audiolibros gratis con tu prueba.
Elige 1 audiolibro al mes de nuestra inigualable colección.
Escucha todo lo que quieras de entre miles de audiolibros, Originals y podcasts incluidos.
Accede a ofertas y descuentos exclusivos.

Cyber Security - 3 Book Combo

De: Cybersecurity and Infrastructure Security Agency - FTC - US Department of Defense
Narrado por: Tom Brooks
Prueba por $0.00

$14.95 al mes después de 30 días. Cancela en cualquier momento.

Compra ahora por $14.95

Compra ahora por $14.95

la tarjeta con terminación
Al confirmar tu compra, aceptas las Condiciones de Uso de Audible y el Aviso de Privacidad de Amazon. Impuestos a cobrar según aplique.

Grandes primeros Títulos

(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Audiolibro Por Mike Chapple, James Michael Stewart, Darril Gibson arte de portada
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition De: Mike Chapple, y otros
Eleventh Hour CISSP® Audiolibro Por Eric Conrad, Seth Misenar, Joshua Feldman arte de portada
Eleventh Hour CISSP® De: Eric Conrad, y otros
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide Audiolibro Por Ben Malisow arte de portada
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide De: Ben Malisow
Hacking for Dummies, 7th Edition Audiolibro Por Kevin Beaver CISSP arte de portada
Hacking for Dummies, 7th Edition De: Kevin Beaver CISSP
Prepare for the ISACA Certified Information Security Manager Exam Audiolibro Por Gwen Bettwy, Mark Williams, Mike Beevers arte de portada
Prepare for the ISACA Certified Information Security Manager Exam De: Gwen Bettwy, y otros
Computer Networking and Cybersecurity Audiolibro Por Quinn Kiser arte de portada
Computer Networking and Cybersecurity De: Quinn Kiser
Essential CISSP Exam Guide: Updated for the 2018 CISSP Body of Knowledge Audiolibro Por Phil Martin arte de portada
Essential CISSP Exam Guide: Updated for the 2018 CISSP Body of Knowledge De: Phil Martin
A Leader’s Guide to Cybersecurity Audiolibro Por Thomas J. Parenty, Jack J. Domet arte de portada
A Leader’s Guide to Cybersecurity De: Thomas J. Parenty, y otros
RMF ISSO: Foundations (Guide) Audiolibro Por Bruce Brown arte de portada
RMF ISSO: Foundations (Guide) De: Bruce Brown
Cybersecurity Program Development for Business Audiolibro Por Chris Moschovitis arte de portada
Cybersecurity Program Development for Business De: Chris Moschovitis
Essential CISA Exam Guide: Updated for the 26th Edition Audiolibro Por Phil Martin arte de portada
Essential CISA Exam Guide: Updated for the 26th Edition De: Phil Martin
Alice and Bob Learn Application Security Audiolibro Por Tanya Janca arte de portada
Alice and Bob Learn Application Security De: Tanya Janca
Essential CISM: Updated for the 16th Edition CISM Review Manual Audiolibro Por Phil Martin arte de portada
Essential CISM: Updated for the 16th Edition CISM Review Manual De: Phil Martin
Cyber Security Audiolibro Por Noah Zhang arte de portada
Cyber Security De: Noah Zhang
Cybersecurity Audiolibro Por Harvard Business Review, Alex Blau, Andrew Burt, Boris Groysberg arte de portada
Cybersecurity De: Harvard Business Review, y otros
A Vulnerable System Audiolibro Por Andrew J. Stewart arte de portada
A Vulnerable System De: Andrew J. Stewart
Essential CSSLP Exam Guide: Updated for the 2nd Edition Audiolibro Por Phil Martin arte de portada
Essential CSSLP Exam Guide: Updated for the 2nd Edition De: Phil Martin
Cybersecurity Audiolibro Por Trust Genics arte de portada
Cybersecurity De: Trust Genics
The Threat Intelligence Handbook Audiolibro Por Recorded Future arte de portada
The Threat Intelligence Handbook De: Recorded Future
Cybersecurity for Beginners Audiolibro Por Raef Meeuwisse arte de portada
Cybersecurity for Beginners De: Raef Meeuwisse
Simple CISSP Audiolibro Por Phil Martin arte de portada
Simple CISSP De: Phil Martin
Essential CISM Exam Quiz: Updated for the 15th Edition CISM Review Manual Audiolibro Por Phil Martin arte de portada
Essential CISM Exam Quiz: Updated for the 15th Edition CISM Review Manual De: Phil Martin
Digital Resilience Audiolibro Por Ray A. Rothrock, Richard A. Clarke - foreword arte de portada
Digital Resilience De: Ray A. Rothrock, y otros
Cybersecurity and Cyberwar Audiolibro Por P. W. Singer, Allan Friedman arte de portada
Cybersecurity and Cyberwar De: P. W. Singer, y otros
You'll See This Message When It Is Too Late Audiolibro Por Josephine Wolff arte de portada
You'll See This Message When It Is Too Late De: Josephine Wolff
The CISO Guide to Zero Trust Security Audiolibro Por Raj Badhwar arte de portada
The CISO Guide to Zero Trust Security De: Raj Badhwar
Think Like a Hacker Audiolibro Por Michael J. Melone arte de portada
Think Like a Hacker De: Michael J. Melone
Breached! Audiolibro Por Daniel J. Solove, Woodrow Hartzog arte de portada
Breached! De: Daniel J. Solove, y otros
Start-Up Secure Audiolibro Por Chris Castaldo arte de portada
Start-Up Secure De: Chris Castaldo
The Cyber Risk Handbook Audiolibro Por Domenic Antonucci arte de portada
The Cyber Risk Handbook De: Domenic Antonucci

Resumen del Editor

Drive cybersecurity strategy, investment, and culture.

Your success depends on cyber-readiness. Both depend on you.

Being a cyber leader does not require technical expertise, but rather an ability to change the culture of your organization. Reducing your organization’s cyber risks requires awareness of cybersecurity basics.

As a leader, you need to drive your organization’s approach to cybersecurity as you would any other hazard (e.g. how you identify risk, reduce vulnerabilities, and plan for contingencies). This requires an investment of time and money as well as the collective buy-in of your management team. Your investment drives actions and activities, and these build and sustain a culture of cybersecurity.

Cybersecurity begins with strong physical security.

An employee accidentally leaves a flash drive on a coffeehouse table. When he returns hours later to get it, the drive - with hundreds of social security numbers saved on it - is gone.

Another employee throws stacks of old company bank records into a trash can, where a criminal finds them after business hours.

A burglar steals files and computers from your office after entering through an unlocked window.

Lapses in physical security can expose sensitive company data to identity theft, with potentially serious consequences.

The United States’ reliance on networked systems and the high costs associated with cyberattacks have led many leaders in the US government and the Department of Defense (DOD) to prioritize protecting our critical networked infrastructure. Part of that focus is trying to develop a strategy for deterring adversaries from attacking our networks in the first place.

This effort has led to much debate around the question of whether cyber deterrence is possible. Answering this question is difficult since the number of adversary groups capable of attacking US networks is large and our ability to deter each group will vary based on its motives and levels of risk tolerance.

The United States should not expect a cyber deterrence strategy to achieve the kind of results seen with our nuclear deterrence strategy during the Cold War. However, a limited US cyber deterrence strategy is possible.

To be effective, this strategy must be multilayered and use all instruments of US national power. The strategy employed against one adversary group (e.g., criminal actors) will be different than that against another group (e.g., state or state-sponsored actors).

This book explores:

  1. The difficulties of deterring unwanted cyber activities by each group of cyber threats
  2. Realistic expectations for a deterrence strategy
  3. Proposals to help mitigate the problems

For additional resources, visit CISA.gov/Cyber-Essentials or email CISAEssentials@cisa.dhs.gov.

©2021 Tom Brooks (P)2021 Tom Brooks

Lo que los oyentes dicen sobre Cyber Security - 3 Book Combo

Calificaciones medias de los clientes

Reseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.