Index

  •  
  • a
  • acceptable use policies (AUPs) 116–117, 123, 135
    • designing 117
    • and remote access 122
  • ARPANET 24
  • artificial intelligence (AI) 145, 217, 219
    • and automation 217, 219
    • definition 219
    • facial recognition 214–215
    • in law enforcement 214–215
    • regulation 215
    • and social engineering 145, 219
    • use against hackers 146, 205
    • use by hackers 145, 219
  • Atlanta, GA, ransomware attacks 3, 7–8, 31
  • Baltimore, MD, ransomware attacks 3, 9–10, 121, 189, 229
    • IT system 10
    • leadership 42
  • bitcoin, as ransom currency 8, 9, 29, 203
  • Black Frog 61–62
  • Boston, MA 80
  • Breithaupt, Jim 87
  • bring-your-own-device (BYOD) 209–210
  • bulk electric systems 173–174
  • Buszta, Ken 87
  •  
  • c
  • California
    • local government cybersecurity 115
    • state security legislation 177, 178
  • Census Bureau estimates 2, 232n1
  • Census of Governments (2017) 2
  • Center for Digital Government, Digital Counties Survey 202
  • change (configuration) management policies (CMPs) 123–124, 160
  • Chicago, IL 80
  • chief information officers (CIOs) 4, 38, 58, 79
  • chief information security officers (CISO) 60, 127, 128
  • city administrations 4, 29, 78
  • Coalition of City CISOs 79–80, 195
  • Collier County, FL 145
  • Colonial Pipeline, cyberattack on 30, 203, 214
  • Colorado Privacy Act (CPA) 178–180, 215
  • Colorado state security legislation 178–180
  • Commission on Information Technology (COIT), San Francisco 126, 129, 131, 132
  • Commonwealth of Massachusetts 116
    • cybersecurity policy 132–139
  • computer hardware 18, 19
    • cybersecurity 99
    • disposal of 119
    • inventories 156
    • obsolescence 216
    • operating systems 218
    • physical corruption 19
    • on personal devices 18
    • replacing 156
    • verification 159
    • vulnerability 33, 34
  • computing, management of 86–87
  • Computing Technology Industry Association 57–58
  • Conference of Mayors 29
  • Coveware 207
  • COVID-19 pandemic 6, 18, 31
    • and teleworking 35–36
    • unemployment claims 219
  • Criminal Justice Information Services (CJIS) 171–173
    • policy areas 171–173
  • cybersecurity cube 20–21, 20
  • Cybersecurity Enhancement Act (2014) 152
  • Cybersecurity Infrastructure and Security Agency (CISA) 17–18, 90, 206, 217
    • assistance to local governments 195, 121
    • training exercises 198
  • cybersecurity insurance 39–40, 58, 89–91, 196–197
    • benefits 196, 197
    • as best practice 197
    • exemptions 196–197
    • and ransomware attacks 197
    • and risk management 90
  • Cyberseek 205
  • cyberterrorists 32
  • Dedrick, Jason 86
  • defense in depth model of cybersecurity 115, 211–212
    • adaptability 212
    • categories 211
    • military origins 211
  • Deloitte surveys 89
    • with NASCIO (2020) 37–38, 58–59, 89–90
  • departmental information security officers (DISOs) 126, 129
  • Department of Health and Human Services (HSS) 31
  • Department of Homeland Security 206
  • Detroit, MI 80
  • disaster recovery/business continuity (DRBC) policies 121–122, 130–131
  • disinformation campaigns 5, 31, 146
  • Distributed Denial of Services (DDS) attacks 6, 31
  • Durham, NC, cyberattack 5
  • emergency (911) systems 9, 114, 214
  • Emisoft 61
  • Endless Frontier Act 181–182
  • Equifax 34
  • Ernst and Young Global Ltd (EY) 59
  • European Union
    • AI regulation 215
    • data protection 180–181, 215
  • European Union General Data Protection Regulation (GDPR) 180–181, 215
    • applicability to US local governments 181
    • EU citizen privacy rights 180
  •  
  • f
  • facial recognition software 19, 145, 214, 215, 220
  • Fairfax County, VA 80
  • Falco, Gregory 53
  • Family Educational Rights and Privacy Act (FERPA, 1974) 170–171
  • FBI
    • cybersecurity investigations 214
    • information sharing 194
  • federal cybersecurity policies 75, 114, 168–172
  • Federal Information Security Modernization Act (FISMA, 2006) 170
  • firewalls 107, 120, 194, 211
    • next generation (NGFW) 91, 92, 107
    • security of 9, 120
  •  
  • g
  • Gartner Cybersecurity 37–38, 191
  • Grimes, Roger 204
  •  
  • h
  • Healthcare Information Technology for Economic and Clinic Health (HITECH, 2009) 168
  • Health Insurance Portability and Accountability Act (HIPAA, 1996) 168, 178
  • home schooling 18
  • home working, during COVID-19 pandemic 6, 18, 35–36, 122, 204
  • human error, in cybersecurity incidents 41, 143–146, 147–148
    • accountability 147–148
    • and social engineering 29, 59, 144–145
  •  
  • i
  • IBM 22, 60, 62
    • Center for the Business of Government 60–61
  • Ibrahim, Ahmed 54
  • ICMA survey results
    • adequateness of technology 191
    • barriers to cybersecurity 37, 73
    • cybersecurity awareness 101, 102, 103
    • cybersecurity effectiveness 96, 98, 99–100
    • cybersecurity insurance 90, 91
    • cybersecurity investment 38, 104–105
    • cybersecurity management 69
    • cybersecurity policies 95, 96, 97–98
    • cybersecurity staffing 190
    • cybersecurity testing 92
    • cybersecurity tools 92
    • cybersecurity training 93, 94–95
    • frequency of breaches 28
    • frequency of cyberattacks 1, 68, 69, 70
    • leadership support 102, 103–104
    • local government preparedness 72, 100–101
    • location of responsibility for cybersecurity 38, 88, 90, 104
    • logging of attacks 68
    • respondent rating 100, 101, 102
    • types of cyberattackers 32, 71
    • use of forensic services 94
  • identity and access management (IAM) policies 119, 120, 123, 159
  • Illinois 59
  • incident handling processes
  • Information Sharing Analysis Centers (ISACs) 194–195
  • regional 195
    • information technology (IT) systems 2, 17, 34, 40, 58, 99
  • International Association of Privacy Professionals (IAPP) 178
  • International City/County Management Association (ICMA) 67–68, 76
  • internet, as computer network 18
    • and government services 24
    • history of 24
  • Internet of Things (IoT) 5–6, 51–52, 207–208
    • and COVID-19 pandemic 6
    • cybersecurity risks 36–37, 208
    • future of 208
    • and networks 18
    • scale of use 6, 207–208
    • security standards 52
    • and smart cities 51–52
  •  
  • j
  • Joint Terrorism Task Forces (JTTFs) 195
  • JP Morgan Chase 34
  •  
  • k
  • Kansas 59
  • Kaseya cyberattack 28, 30, 217
  • Kentucky 59
  • Kesan, Jay P. 54
  • King, John Leslie 86–87
  • Kraemer, Kenneth 86–87
  • K-12 education 117, 206
  • local government officials 187, 189
    • responsibility for cybersecurity 189
  • Lookout 209
  • Los Angeles, CA 80
  •  
  • m
  • machine learning (ML) 219–220
    • data processing 220
    • deepfakes 145–146
    • definition 219–220
    • regulation 214
    • uses 145–146, 205
  • Maine 215
  • Malaysia 52
  • malware 28–29
    • and back-ups 40
    • ransomware 7, 9, 29, 206–207
    • Russian 5
  • McAfee 62–63
  • McCumber, John 20–21
  • media and communications policies 123, 162, 164
  • Memphis, TN 80
  • MeriTalk survey (2021) 202, 203
  • Merko, Mark 87
  • Michigan 59
  • Microsoft 365, 203
  • Mirai Botnet 6
  • Mondelez International 196–197
  • Montgomery, Mark 104
  • Moschovitis, Chris 32, 33
  • Multi-State Information Sharing and Analysis Center (MS-ISAC) 195, 214
  • municipal demography 2, 232n1
  • Municipal Research and Services Center 210
  •  
  • n
  • Naples, FL 145
  • Nashville, TN 80
  • National Conference of State Legislature (NCSL) 174
  • National Cybersecurity and Communications Integration Center (CCIA) 195
  • National Security Agency (NSA) 211
  • National Survey of Local Government Cybersecurity Programs (2020) 58
  • negotiation theory 53
  • NERC Critical Information Protection Standards 173–174, 175–176
  • networks 18, 114
  • categories 159–161
  • NIST Risk Management Framework 22, 116, 128, 188
  • Norris, Donald F. 49, 60
  • North American Electrical Reliability Corporation (NERC) 173
  • North Dakota 59
  • Norton Security 41, 208
  • NotPetya cyberattack 197
  • Payment Card Industry Data Security Standard 168–169
  • personally identifiable information (PII) 3, 50, 170–171, 178–179
    • and data breaches 3, 70, 71, 144, 176
    • destruction and retention 178–179
    • protection 178–179
  • President’s Commission on Critical Infrastructure 32
  • PRISM model of local government 60–61, 64n1
    • and NIST Cybersecurity Framework 61
  • privacy see data privacy
  • privacy policies, local government 24, 119
  • public policy papers 27
  • Public Technology Institute (PTI) 57–58
  •  
  • r
  • ransomware attacks 3, 9, 29, 207, 214
    • Atlanta, GA 3, 7–8, 31
    • Baltimore, MD 9–10, 121, 189
    • Colonial Pipeline 203
    • during COVID-19 pandemic 188
    • Hall, GA 146
    • literature on 61–62
    • profitability 29–30, 203, 207
    • recovery from 71–72, 214
    • sector vulnerability 61
    • surveys 57, 60
    • tracking 62
  • Robbinhood ransomware 9
  • Robotic Process Automation (RPA) 217
  • Russia
    • government-sponsored cyberattacks 5, 146, 197
    • hackers 28
    • interference in US elections 5, 146
  • Ryuk malware 5
  •  
  • s
  • SamSam ransomware 7
  • San Francisco, CA 80
    • cybersecurity policy 126–131
  • Seattle, WA 80
  • security breach notification laws 176–177, 214
  • security information and event management (SIEM) 217
  • security orchestration, automation, and response (SOAR) 217
  • Security Scorecard 59
  • Shelby County, TN 144
  • 60 Minutes documentary (CBS) 31, 208
  • smart cities 5–6, 48, 50–52
    • security implications 51, 54–55
  • State and Local Government Workforce Survey (2020) 210
  • Statistica 5–6, 207
  • Stoll, Cliff 19
  • surveys see cybersecurity surveys
  • survey methodology 76–81
    • sampling 77–78
  • threat actors see cyberattackers
  • Threats-Vulnerability-Assets Worksheets 34
  • traffic light protocols (TLPs) 118–119, 118
  •  
  • v
  • Verizon Data Breach Investigations Reports (DBIRs) 59, 68
  • Virginia state security legislation 178
  • virtual private networks (VPNs) 91, 92, 107, 135
    • encryption 107
  • vulnerability and patch management policies 96, 97, 98, 121, 124–125
    • effectiveness 99
  •  
  • w
  • Washington Post 205–206
  • Wood, Charles Cresson 87
  •  
  • z
  • Zero Day vulnerability 22, 23, 30, 31
  • Zero Trust approach to cybersecurity 212–213
  • Zhang, Linfeng 54
  • Zurich American Insurance 197
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset