Amazon cover image
Image from Amazon.com

Cybersecurity law : protect yourself and your customers / Shimon Brathwaite.

By: Material type: TextTextSeries: Publication details: New York, New York (222 East 46th Street, New York, NY 10017) : Business Expert Press, (c)2019.Description: 1 online resource (108 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781948976732
Subject(s): Genre/Form: LOC classification:
  • K3264 .C934 2019
Online resources: Available additional physical forms:
Contents:
Chapter 2. Cyber law and intellectual property -- Chapter 3. What are the corporate requirements for cybersecurity? -- Chapter 4. What are the financial and reputational implications of information security legislation -- Chapter 5. Required encryption standards -- Chapter 6. How to offload legal liability onto third parties -- Chapter 7. The importance of cybersecurity specific insurance -- Chapter 8. What type of people and policies should you have to ensure you are complying with regulations.
Abstract: Information security refers to a set of strategies for managing the processes, tools, and policies necessary to prevent, detect, document and counter threats to digital and non-digital information. Infosec responsibilities include establishing a set of business processes that will protect informa-tion assets regardless of how the information is formatted or whether it is in transit, being processes or is at rest in storage "Definition from WhatIs.com (n.d.). Retrieved from https://searchsecurity.techtarget.com/definition/information-security-infosec." With the growth and popularization of the Internet, the Internet of things (IOT) and e-commerce informa-tion security has become extremely important in most organizations. IOT refers to the connection of physical devices such as laptops, home appliances, cars, senors and other electronics to one another through the Internet. This mass connection of devices is constantly collecting infor-mation on their usage, location and user behaviors and this information is usually sent to and stored in a database somewhere on the Internet.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number URL Status Date due Barcode
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) G. Allen Fleece Library Non-fiction K3264.C65 (Browse shelf(Opens below)) Link to resource Available 9781948976732

Chapter 1. Introduction to information security law -- Chapter 2. Cyber law and intellectual property -- Chapter 3. What are the corporate requirements for cybersecurity? -- Chapter 4. What are the financial and reputational implications of information security legislation -- Chapter 5. Required encryption standards -- Chapter 6. How to offload legal liability onto third parties -- Chapter 7. The importance of cybersecurity specific insurance -- Chapter 8. What type of people and policies should you have to ensure you are complying with regulations.

Information security refers to a set of strategies for managing the processes, tools, and policies necessary to prevent, detect, document and counter threats to digital and non-digital information. Infosec responsibilities include establishing a set of business processes that will protect informa-tion assets regardless of how the information is formatted or whether it is in transit, being processes or is at rest in storage "Definition from WhatIs.com (n.d.). Retrieved from https://searchsecurity.techtarget.com/definition/information-security-infosec." With the growth and popularization of the Internet, the Internet of things (IOT) and e-commerce informa-tion security has become extremely important in most organizations. IOT refers to the connection of physical devices such as laptops, home appliances, cars, senors and other electronics to one another through the Internet. This mass connection of devices is constantly collecting infor-mation on their usage, location and user behaviors and this information is usually sent to and stored in a database somewhere on the Internet.

COPYRIGHT NOT covered - Click this link to request copyright permission:

https://lib.ciu.edu/copyright-request-form

Mode of access: World Wide Web.

System requirements: Adobe Acrobat reader.

Description based on PDF viewed 03/31/2019.

There are no comments on this title.

to post a comment.