000759923 000__ 03832cam\a2200457Ii\4500 000759923 001__ 759923 000759923 005__ 20230306141940.0 000759923 006__ m\\\\\o\\d\\\\\\\\ 000759923 007__ cr\un\nnnunnun 000759923 008__ 160808s2016\\\\xxua\\\\o\\\\\001\0\eng\d 000759923 020__ $$a9781484220535$$q(electronic book) 000759923 020__ $$a1484220536$$q(electronic book) 000759923 020__ $$z9781484220528 000759923 020__ $$z1484220528 000759923 035__ $$aSP(OCoLC)ocn956342150 000759923 035__ $$aSP(OCoLC)956342150 000759923 040__ $$aYDXCP$$beng$$erda$$epn$$cYDXCP$$dN$T$$dEBLCP$$dGW5XE$$dOCLCO$$dAZU$$dN$T$$dOCLCO$$dIDEBK$$dOCLCQ$$dOCLCO 000759923 049__ $$aISEA 000759923 050_4 $$aHD30.2 000759923 08204 $$a005.8$$223 000759923 1001_ $$aWittkop, Jeremy,$$eauthor. 000759923 24510 $$aBuilding a comprehensive IT security program$$h[electronic resource] :$$bpractical guidelines and best practices /$$cJeremy Wittkop. 000759923 264_1 $$a[United States] :$$bApress,$$c2016. 000759923 264_2 $$aNew York, NY :$$bDistributed to the Book trade worldwide by Springer 000759923 264_4 $$c©2016 000759923 300__ $$a1 online resource (xix, 195 pages) :$$billustrations. 000759923 336__ $$atext$$btxt$$2rdacontent 000759923 337__ $$acomputer$$bc$$2rdamedia 000759923 338__ $$aonline resource$$bcr$$2rdacarrier 000759923 500__ $$aIncludes index. 000759923 5050_ $$aChapter 1: The Problem We Are Facing -- Chapter 2 : Protecting Critical Assets -- Chapter 3: Monetizing Risk -- Chapter 4: Security Intelligence Model -- Chapter 5: Incident Response Planning -- Chapter 6: The People Problem -- Chapter 7: Assigning Accountability -- Chapter 8: Shifting the Paradigm -- Chapter 9: The Definition of Insanity -- Chapter 10: Déjà Vu -- Chapter 11: The Information Security Community -- Chapter 12: Partnering with Governments -- 000759923 506__ $$aAccess limited to authorized users. 000759923 520__ $$aThis book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the current situation as it relates to cybersecurity, the challenges facing private business, and the fundamental changes organizations can make to better protect themselves. The problems we face are difficult, but they are not hopeless. Cybercrime continues to grow at an astounding rate. With constant coverage of cyber-attacks in the media, there is no shortage of awareness of increasing threats. Budgets have increased and executives are implementing stronger defenses. Nonetheless, breaches continue to increase in frequency and scope. Building a Comprehensive IT Security Program shares why organizations continue to fail to secure their critical information assets and explains the internal and external adversaries facing organizations today. This book supplies the necessary knowledge and skills to protect organizations better in the future by implementing a comprehensive approach to security. Jeremy Wittkop's security expertise and critical experience provides insights into topics such as: Who is attempting to steal information and why? What are critical information assets? How are effective programs built? How is stolen information capitalized? How do we shift the paradigm to better protect our organizations? How we can make the cyber world safer for everyone to do business? 000759923 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed August 15, 2016). 000759923 650_0 $$aInformation technology$$xSecurity measures$$xManagement. 000759923 650_0 $$aComputer security$$xManagement. 000759923 77608 $$iPrint version:$$z1484220528$$z9781484220528$$w(OCoLC)951835220 000759923 852__ $$bebk 000759923 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-1-4842-2053-5$$zOnline Access$$91397441.1 000759923 909CO $$ooai:library.usi.edu:759923$$pGLOBAL_SET 000759923 980__ $$aEBOOK 000759923 980__ $$aBIB 000759923 982__ $$aEbook 000759923 983__ $$aOnline 000759923 994__ $$a92$$bISE