000 04224nam a2200649 i 4500
001 9781947441477
003 BEP
005 20241023114904.0
006 m eo d
007 cr cn |||m|||a
008 180721s2018 nyua foab 001 0 eng d
020 _a9781947441477
_qe-book
035 _a(OCoLC)1045429075
035 _a(CaBNVSL)swl000408570
040 _aCaBNVSL
_beng
_erda
_cCaBNVSL
_dCaBNVSL
050 4 _aHV6773.15.C97
100 1 _aSutton, David
_c(Information security practitioner),
_eauthor.
245 1 0 _aBusiness continuity in a cyber world :
_bsurviving cyberattacks /
_cDavid Sutton.
250 _aFirst edition.
264 1 _aNew York, New York (222 East 46th Street, New York, NY 10017) :
_bBusiness Expert Press,
_c[(c)2018.]
300 _a1 online resource (xix, 182 pages) :
_billustrations.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _adata file
_2rda
490 1 _aInformation systems collection,
_x2156-6593
504 _aIncludes bibliographical references (pages 169-170) and index.
505 0 _a1. The practice of business continuity management --
_t2. A brief overview of the risk management process --
_t3. The main cybersecurity issues --
_t4. Information assets and impacts --
_t5. Vulnerabilities and threats --
_t6. Selecting strategic, tactical, and operational solutions --
_t7. Business continuity activities and solutions --
_t8. Testing, exercising, and maintaining plans --
_t9. Embedding cybersecurity and business continuity --
_tAppendix A. Information on cybersecurity controls --
_tAppendix B. Standards and good practice guidelines --
_tGlossary --
_tBibliography --
_tAbout the author --
_tIndex.
506 _aAccess restricted to authorized users and institutions.
520 3 _aUntil recently, if it has been considered at all in the context of business continuity, cybersecurity may have been thought of in terms of disaster recovery and little else. Recent events have shown that cyberattacks are now an everyday occurrence, and it is becoming clear that the impact of these can have devastating effects on organizations whether large and small, and whether in the public or the private sector. Cybersecurity is one aspect of information security, since the impacts or consequences of a cyberattack will inevitably damage one or more of the three pillars of information security: the confidentiality, integrity, or availability of an organization's information assets. The main difference between information security and cybersecurity is that while information security deals with all types of information assets, cybersecurity deals purely with those that are accessible by means of interconnected electronic networks, including the Internet. Many responsible organizations now have robust information security, business continuity, and disaster recovery programs in place, and it is not the intention of this book to rewrite those, but to inform organizations about the kind of precautions they should take to stave off successful cyberattacks and how they should deal with them when they arise in order to protect their day-to-day business.
530 _a2
_ub
530 _aAlso available in printing.
538 _aMode of access: World Wide Web.
538 _aSystem requirements: Adobe Acrobat reader.
588 _aTitle from PDF title page (viewed on July 21, 2018).
650 0 _aCyberterrorism.
650 0 _aRisk management.
653 _aavailability
653 _acompromise
653 _aconfidentiality
653 _acontinuity
653 _acyber
653 _acyber threat
653 _acyberattack
653 _acybersecurity
653 _adenial of service
653 _ainformation security
653 _aintegrity
653 _aprevention
653 _aresponse
653 _arisk
655 0 _a[genre]
776 0 8 _iPrint version:
_z9781947441460
830 0 _aInformation systems collection.
_x2156-6593
856 4 0 _uhttps://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000763.html
942 _2lcc
_bCIU
_cOB
_eBEP
_QOL
_zBEP9781947441477
999 _c72790
_d72790
902 _c1
_dCynthia Snell