Features - Developing Cybersecurity Programs and Policies
Overview - Developing Cybersecurity Programs and Policies
A complete guide to establishing a cybersecurity program and governance in your organization. In this book, students will learn how to create cybersecurity policies, standards, procedures, guidelines, and plans — and the differences among them. This book covers the Confidentiality, Integrity & Availability (CIA) security model. Students will also learn how threat actors are launching attacks against their victims compromising confidentiality, integrity, and availability of systems and networks. This book covers the NIST Cybersecurity Framework and ISO/IEC 27000-series standards. Readers will learn how to align security with business strategy, as well as define, inventory, and classify information and systems.
This book teaches students how to systematically identify, prioritize, and manage cybersecurity risks and reduce social engineering (human) risks with role-based Security Education, Awareness, and Training (SETA). They will also learn how to implement effective physical, environmental, communications, and operational security; and effectively manage access control. In this book students will learn how to respond to incidents and ensure continuity of operations and how to comply with laws and regulations, including GLBA, HIPAA/HITECH, FISMA, state data security and notification rules, and PCI DSS.
PEARSON, MYLAB, REVEL, Pearson Logo are trademarks owned and/or registered by Pearson plc and/or its affiliates. All other third party marks associated with these products are the property of their respective owners. Copyright in the works referenced herein is owned by Pearson Education, Inc. Pearson Education has control over the editorial content in these instructional materials.