000943631 000__ 07088nam\a2200613\i\4500 000943631 001__ 943631 000943631 003__ Credo 000943631 005__ 20221118003159.0 000943631 006__ m\\\\\o\\d\\\\\\\\ 000943631 007__ cr\cn\nnnunnun 000943631 008__ 201019r20202019ncu\\\\\ob\\\\000\0\eng\d 000943631 010__ $$z 2018058319 000943631 020__ $$a9781787857469$$q(electronic book) 000943631 020__ $$z9781476674407 000943631 020__ $$z147667440X 000943631 020__ $$a9781476635415$$qebook 000943631 035__ $$a(CaBNVSL)gtp00568605 000943631 035__ $$a(Credo)mcfccwotap2019 000943631 035__ $$a(OCoLC)1201540973 000943631 040__ $$aCaBNVSL$$beng$$erda$$cCaBNVSL$$dCaBNVSL 000943631 050_4 $$aQA76.9.A25$$bC925 2019eb 000943631 08204 $$a005.8$$223 000943631 24500 $$aCybersecurity :$$bcurrent writings on threats and protection /$$cedited by Joaquin Jay Gonzalez III and Roger L. Kemp. 000943631 250__ $$a[Enhanced Credo edition] 000943631 263__ $$a20201104 000943631 264_1 $$aJefferson, North Carolina :$$bMcFarland & Company, Inc., Publishers,$$c[2019] 000943631 264_4 $$c©2019 000943631 26431 $$aBoston, Massachusetts :$$bCredo Reference,$$c2020. 000943631 300__ $$a1 online resource (74 entries) 000943631 336__ $$atext$$2rdacontent 000943631 337__ $$aelectronic$$2isbdmedia 000943631 338__ $$aonline resource$$2rdacarrier 000943631 504__ $$aIncludes bibliographical references. 000943631 5050_ $$aAcknowledgments -- Preface -- Part I. An overview: 1. Government employees unaware they are cyber crime victims / Chelsea Binns; 2. Cybersecurity and America's governments / Roger L. Kemp; 3. NACo members zero in on cybersecurity, tech safety / Ariel Cohen; 4. Growing impact of cybercrime in local government / Gerald Cliff; 5. Cybersecurity: what's your risk? / International City/County Management Association; 6. Performance and data analytics: the Cincinnati story / Harry Black; 7. The digital solution / Shaun Mulholland; 8. Digital wallpapers open doors / Caitlin Cowart; 9. Personal privacy is eroding as consent policies of Google and Facebook evoke “fantasy world” / Fred H. Cate -- 000943631 5058_ $$aPart II. Threats and risks: 10. IoT is changing the cybersecurity industry / Larry Karisny; 11. Equifax breach is a reminder of society's larger cybersecurity problems / Richard Forno; 12. Cybersecurity: protecting court data / Brian McLaughlin; 13. Health-care industry increasingly faces cybersecurity breaches / Margaret Steen; 14. It's in the mail: Aetna agrees to $17M payout in HIV privacy breach / Elana Gordon; 15. Explainer: what is hacking? / James H. Hamlyn-Harris; 16. How the Chinese cyberthreat has evolved / Dorothy Denning; 17. Now that Russia has apparently hacked america's grid, shoring up security is more important than ever / Theodore J. Kury; 18. Ransomware victims urged to report infections to Federal law enforcement / Federal Bureau of Investigation; 19. Ransomware attacks illustrate the vulnerabilities that local government entities face / Mary Scott Nabers; 20. Ransomware attacks on the rise in 2017 / Mary Ann Barton; 21. The two faces of social media / Martha Perego; 22. “Zero-day” stockpiling puts us all at risk / Benjamin Dean -- 000943631 5058_ $$aPart III. Prevention, protection, partnership: a. practical preventive measures: 23. A plan for cybersecurity / Cory Fleming; 24. How we can each fight cybercrime with smarter habits / Arun Vishwanath; 25. Simple steps to online safety / Alan Shark; 26. Staying safe on social networking sites / U.S. Computer Emergency Readiness Team; 27. Seven keys to strengthen your cybersecurity culture / Daniel J. Lohrmann; 28. Three tips for forming a computer emergency response team / Kelsey Brewer; 29. Cybersecurity strategies governments need / Gus “Ira” Hunt and Lalit Ahluwalia; 30. Security pros need a mentor: here's why and how / Daniel J. Lohrmann; 31. Mecklenburg County refuses to pay ransom to cyber hackers / Mary Ann Barton; 32. Fighting fake news / Marcus Banks; 33. How airplane crash investigations can improve cybersecurity / Scott Shackelford -- III. B. Technical protections: 34. National cybersecurity workforce framework / U.S. Department of Homeland Security; 35. Eliminating network blind spots and preventing breaches / Reggie Best; 36. The cloud and enterprise cybersecurity: leveling the playing field / Microsoft; 37. Government data in the cloud: provider and user responsibilities / Subrata Chakrabarti; 38. Using blockchain to secure the “internet of things” / Nir Kshetri; 39. How to protect patrons' digital privacy / Anne Ford; 40. Monitoring employees' use of company computers and the Internet / Texas Workforce Commission; 41. Disaster recovery for technology: best practice / Government Finance Officers Association -- 000943631 5058_ $$aIII. C. Using partnerships and networks: 42. Cybersecurity partnerships: strength in numbers / Susan Miller; 43. Intersector briefing: cross sector collaboration in cybersecurity / Intersector Project; 44. Obama's cybersecurity initiative / Frank J. Cilluffo and Sharon L. Cardash; 45. New Trump executive order on cybersecurity / Daniel J. Lohrmann; 46. Sharing of cyber threat indicators and defensive measures by the Federal Government / Office of the Director of National Intelligence and Other Agencies; 47. Law enforcement partnerships enhance cybersecurity investigations / Chelsea Binns; 48. States rush to cash in on cybersecurity boom / Elaine S. Povich; 49. How the National Guard is protecting cybersecurity / Colin Wood; 50. Cybersecurity and local governments in the United States / William Hatcher -- Part IV. Future: 51. The top 18 security predictions for 2018 / Daniel J. Lohrmann; 52. Artificial intelligence cyber attacks are coming - but what does that mean? / Jeremy Straub; 53. FCC Group on 5G Deployment short on local input / Mary Ann Barton; 54. Thinking strategically in the cyber domain / John O'Brien; 55. Internet, e-mail and computer use policy / Texas Workforce Commission; 56. Consumers who froze their credit reports / Julie Appleby -- 000943631 5058_ $$aAppendix A. Glossary of cybersecurity terms / Joaquin Jay Gonzalez III -- Appendix B. Presidential executive order on strengthening the cybersecurity of federal networks and critical infrastructure -- Appendix C. City and County of San Francisco cybersecurity policy -- Appendix D. LaPorte County, Indiana, IT computer security policy -- About the contributors -- List of names and terms. 000943631 506__ $$aAccess limited to authorized users. 000943631 588__ $$aDescription based on print version record. 000943631 650_0 $$aComputer security. 000943631 650_0 $$aComputer networks$$xSecurity measures. 000943631 650_0 $$aComputer crimes$$xEconomic aspects. 000943631 655_0 $$aElectronic books 000943631 7001_ $$aGonzalez, Joaquin Jay,$$cIII,$$eeditor. 000943631 7001_ $$aKemp, Roger L.,$$eeditor. 000943631 7102_ $$aCredo Reference (Firm),$$edistributor. 000943631 7300_ $$aCybersecurity (McFarland & Company) 000943631 77608 $$iPrint version:$$z147667440X$$z9781476674407$$w(DLC) 2018058319 000943631 852__ $$bebk 000943631 85640 $$3Credo Reference $$uhttps://univsouthin.idm.oclc.org/login?url=https://search.credoreference.com/content/title/mcfccwotap?institutionId=3155$$zOnline Access 000943631 909CO $$ooai:library.usi.edu:943631$$pGLOBAL_SET 000943631 980__ $$aBIB 000943631 980__ $$aEBOOK 000943631 982__ $$aEbook 000943631 983__ $$aOnline