CONTENTS

List of figures and tables

Author

Acknowledgements

Preface

PART I CYBER SECURITY ISSUES

1. INTRODUCTION

Background

The expectations of users and organisations

Cyber security in the wider context

2. THE BIG ISSUES

Some thoughts on social, political and other issues

Cybercrime

Cyber harassment or cyber bullying

Cyber warfare

Cyber surveillance

Why we should care

What makes cyber security difficult?

3. CYBER TARGETS

Individual targets

Business targets

Critical national infrastructure (CNI) targets

Building targets

Academia and research targets

Manufacturing and industry targets

4. CYBER VULNERABILITIES AND IMPACTS

Cyber vulnerabilities

Cyber impacts

5. CYBER THREATS

Types of attacker

Motives: what drives an attacker

Means

Cyber-attack methods

Types of cyber-attack and attack vectors

The risks of conducting a cyber-attack

PART II CYBER SECURITY SOLUTIONS

6. INFORMATION RISK MANAGEMENT OVERVIEW

A general view of risk

Assets

Threats

Vulnerabilities

Likelihood or probability

Qualitative and quantitative assessments

The risk management process

7. BUSINESS CONTINUITY AND DISASTER RECOVERY

Failures

Business continuity

Disaster recovery

8. BASIC CYBER SECURITY STEPS

General security advice

Technical security advice

Mobile working

9. ORGANISATIONAL SECURITY STEPS

Security policies overview

Directive policies

Administrative policies

Communal policies

Technical policies

10. AWARENESS AND TRAINING

Awareness

Training

11. INFORMATION SHARING

Trust

Information classification

Protection of shared information

Anonymisation of shared information

Routes to information sharing

PART III APPENDICES

APPENDIX A – STANDARDS

Cyber security standards

ISO/IEC 27000 series standards

Other relevant ISO standards

Business continuity standards

National Institute of Standards and Technology (NIST) standards

APPENDIX B – GOOD PRACTICE GUIDELINES

General cyber security advice

UK government cyber security advice

APPENDIX C – CYBER SECURITY LAW

UK Law

EU Directives and Regulations

APPENDIX D – TRAINING AND QUALIFICATIONS

Generic cyber security training and qualifications

Specific cyber security training and qualifications

APPENDIX E – LINKS TO OTHER USEFUL ORGANISATIONS

APPENDIX F – FURTHER READING

APPENDIX G – ABBREVIATIONS AND GLOSSARY

Abbreviations

Glossary

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset