Table of Contents

Cover image

Title page

Copyright

Dedication

About the Author

Preface

Acknowledgments

Introduction

Section I. The Working Environment of the Cyber Security Officer

Introduction

Chapter 1. Understanding the Past and Present Cyber-Information World Environment

Ah, the Good Ol’ Days!

Global Information Infrastructure

National Information Infrastructure

How Did We Get from Adam to the Internet?

Changing Criminal Justice Systems

The Human Factor

Summary

Chapter 2. Understanding the Past and Present Global Business and Management Environment

The Changing Business and Government Environments

Understanding the Business Environment

Management Responsibilities and Communicating with Management

Creating a Competitive Advantage through a Cyber Security Program

Service, Support, and a Business Orientation

Business Managers and Cyber security

What Company Managers Should Ask of Their Cyber Security Professionals

What Cyber Security Professionals Should Do

Questions to Consider

Summary

Chapter 3. An Overview of Related World Views of Cyber Security

Evolution of Laws, Standards, Policies, and Procedures

Global via the UN

The EU

Asia

South America

Africa

Canada

United States

Summary

Chapter 4. A Glimpse at the History of Technology

What Is Technology?

From Cave Man to Cyber Security Professional and Information Warrior

Revolutions and Evolutions in High Technology

From the Twentieth Century to Today: Technology and the Advent of High Technology

The Internet

The High-Technology-Driven Phenomenon

Faster and More Massive High-Technology-Driven Communications

The Beneficial Effect of Hacker Tools and Other Malicious Software on Network Security with Dual Roles as Cyber Security Tools

Other High-Technology Tools in Cyber Security

Welcome to the Twenty-First-Century Technology

Summary

Chapter 5. Understanding Today’s Threats in the Cyber Vapor—“War Stories” from the Front Lines

Reported Digital Battlefield Attacks and Related Stories

Summary

Section II. The Duties and Responsibilities of a Cyber Security Officer

Introduction

Chapter 6. The Cyber Security Officer’s Position, Duties, and Responsibilities

Introduction

The Cyber Security Officer in a Global Corporation

Cyber Security Officer Duties and Responsibilities

Goals and Objectives

Leadership Position

Vision, Mission, and Quality Statements

Cyber Security Principles

Project and Risk Management Processes

Cyber Security Officer and Organizational Responsibilities

Summary

Chapter 7. The Cyber Security Program’s Strategic, Tactical, and Annual Plans

Introduction

Corporate’s Cyber Security Strategic Plan

Corporate’s Cyber Security Tactical Plan

Cyber Security Annual Plan

Questions to Consider

Summary

Chapter 8. Establishing a Cyber Security Program and Organization

Introduction

Corporate Cyber Security Program

Cyber Security Officer Thought Process in Establishing the Cyber Security Organization

Questions to Consider

Summary

Chapter 9. Determining and Establishing Cyber Security Functions

Introduction

Processes

Valuing Information

International Widget Corporation (IWC) Cyber Security Program Functions Process Development

Cyber Security Officer’s Cyber Security Program Functions

Access Control and Access Control Systems

Evaluation of All Hardware, Firmware, and Software

Risk Management Program

Security Tests and Evaluations Program

Noncompliance Inquiries

Contingency and Emergency Planning and Disaster Recovery Program

Questions to Consider

Summary

Chapter 10. Establishing a Metrics Management System

Introduction

Metrics 1: Cyber Security Program Level of Effort Drivers—Number of Users

Examples of Other Metrics Charts

Project Management

Questions to Consider

Summary

Chapter 11. Annual Reevaluation and Future Plans

Introduction

One-Year Review

Cyber Security Program Strategic, Tactical, and Annual Plans

Linking Cyber Security Program Accomplishments to Corporate Goals

Metrics Analysis

Planning for Next Year

Questions to Consider

Summary

Chapter 12. High-Technology Crimes Investigative Support

Introduction

Duties and Responsibilities of a Cyber Security Officer in Deterring High-Technology Crimes

Assisting with Computer Forensics Support

Dealing with Law Enforcement

Questions to Consider

Summary

Section III. The Global, Professional, and Personal Challenges of a Cyber Security Officer

Introduction

Chapter 13. Introduction to Global Information Warfare

The Possibilities

Introduction to Warfare

Four Generations of Warfare

Introduction to Global Information Warfare

Information Warfare Will Hit You in Your Pocketbook

Business Is War

IW Broadly Encompasses Many Levels and Functions

What IW Is … and Is Not

Being Prepared-Bad Things Will Happen

The Possible Breakdowns in an Information Environment

Going beyond Three Blind Men Describing an Elephant: Information Warfare Terms of Reference

Information Warfare Is a Powerful Approach for Attaining and Maintaining a Competitive Advantage

How to Use IW to Achieve Goals and Objectives

Coherent Knowledge-Based Operations

Network-Centric Business

Knowledge Management

Summary

Note

Chapter 14. The Cyber Security Officer and Privacy, Ethical, and Liability Issues

Introduction to Privacy Issues

Introduction to Ethics Issues

Codes of Ethics

Corporate Ethics, Standards of Conduct, Business Practices, and Corporate Values

Liability Issues

Questions to Consider

Summary

Chapter 15. A Career as a Cyber Security Officer

Introduction

The Cyber Security Officer’s Career Development Program

Education

Questions

Summary

Chapter 16. A Look at the Possible Future

Surviving into the Future

New Old Approach to Security—Defensive Approach

The Changing Environment

The Need for Enlightened and Dedicated Leadership

Global Trends

Offensive–Defensive Cyber Attacks

The Future of the Internet

Questions

Summary

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset