000 | 04224nam a2200649 i 4500 | ||
---|---|---|---|
001 | 9781947441477 | ||
003 | BEP | ||
005 | 20241023114904.0 | ||
006 | m eo d | ||
007 | cr cn |||m|||a | ||
008 | 180721s2018 nyua foab 001 0 eng d | ||
020 |
_a9781947441477 _qe-book |
||
035 | _a(OCoLC)1045429075 | ||
035 | _a(CaBNVSL)swl000408570 | ||
040 |
_aCaBNVSL _beng _erda _cCaBNVSL _dCaBNVSL |
||
050 | 4 | _aHV6773.15.C97 | |
100 | 1 |
_aSutton, David _c(Information security practitioner), _eauthor. |
|
245 | 1 | 0 |
_aBusiness continuity in a cyber world : _bsurviving cyberattacks / _cDavid Sutton. |
250 | _aFirst edition. | ||
264 | 1 |
_aNew York, New York (222 East 46th Street, New York, NY 10017) : _bBusiness Expert Press, _c[(c)2018.] |
|
300 |
_a1 online resource (xix, 182 pages) : _billustrations. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_adata file _2rda |
||
490 | 1 |
_aInformation systems collection, _x2156-6593 |
|
504 | _aIncludes bibliographical references (pages 169-170) and index. | ||
505 | 0 |
_a1. The practice of business continuity management -- _t2. A brief overview of the risk management process -- _t3. The main cybersecurity issues -- _t4. Information assets and impacts -- _t5. Vulnerabilities and threats -- _t6. Selecting strategic, tactical, and operational solutions -- _t7. Business continuity activities and solutions -- _t8. Testing, exercising, and maintaining plans -- _t9. Embedding cybersecurity and business continuity -- _tAppendix A. Information on cybersecurity controls -- _tAppendix B. Standards and good practice guidelines -- _tGlossary -- _tBibliography -- _tAbout the author -- _tIndex. |
|
506 | _aAccess restricted to authorized users and institutions. | ||
520 | 3 | _aUntil recently, if it has been considered at all in the context of business continuity, cybersecurity may have been thought of in terms of disaster recovery and little else. Recent events have shown that cyberattacks are now an everyday occurrence, and it is becoming clear that the impact of these can have devastating effects on organizations whether large and small, and whether in the public or the private sector. Cybersecurity is one aspect of information security, since the impacts or consequences of a cyberattack will inevitably damage one or more of the three pillars of information security: the confidentiality, integrity, or availability of an organization's information assets. The main difference between information security and cybersecurity is that while information security deals with all types of information assets, cybersecurity deals purely with those that are accessible by means of interconnected electronic networks, including the Internet. Many responsible organizations now have robust information security, business continuity, and disaster recovery programs in place, and it is not the intention of this book to rewrite those, but to inform organizations about the kind of precautions they should take to stave off successful cyberattacks and how they should deal with them when they arise in order to protect their day-to-day business. | |
530 |
_a2 _ub |
||
530 | _aAlso available in printing. | ||
538 | _aMode of access: World Wide Web. | ||
538 | _aSystem requirements: Adobe Acrobat reader. | ||
588 | _aTitle from PDF title page (viewed on July 21, 2018). | ||
650 | 0 | _aCyberterrorism. | |
650 | 0 | _aRisk management. | |
653 | _aavailability | ||
653 | _acompromise | ||
653 | _aconfidentiality | ||
653 | _acontinuity | ||
653 | _acyber | ||
653 | _acyber threat | ||
653 | _acyberattack | ||
653 | _acybersecurity | ||
653 | _adenial of service | ||
653 | _ainformation security | ||
653 | _aintegrity | ||
653 | _aprevention | ||
653 | _aresponse | ||
653 | _arisk | ||
655 | 0 | _a[genre] | |
776 | 0 | 8 |
_iPrint version: _z9781947441460 |
830 | 0 |
_aInformation systems collection. _x2156-6593 |
|
856 | 4 | 0 | _uhttps://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000763.html |
942 |
_2lcc _bCIU _cOB _eBEP _QOL _zBEP9781947441477 |
||
999 |
_c72790 _d72790 |
||
902 |
_c1 _dCynthia Snell |