Description |
1 online resource (275 p.) |
Contents |
Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Acknowledgements -- About the Authors -- Preface -- 1 Critical Infrastructure and Cyber Resilience Frameworks -- 1.1 Cyber Resilience Framework Overview -- 1.1.1 Governance and Management -- 1.1.2 Identify -- 1.1.3 Protect -- 1.1.4 Detect -- 1.1.5 Respond -- 1.1.6 Recover -- 1.2 Identify Critical Assets, Systems, and Data -- 1.2.1 Methods for Identifying -- 1.2.2 Identify Process Based on FMI Example -- 1.2.2.1 Development -- 1.2.2.2 Advancement -- 1.2.2.3 Innovation -- 1.3 Protect Critical Infrastructure Services |
|
1.3.1 Enhancement of the Protection of Critical Infrastructure -- 1.3.2 Zero-Trust Approach -- 1.3.3 Protect Process Based on FMI Example -- 1.4 Detect Suspected Data Breaches or Leaks -- 1.4.1 Methods for Detecting -- 1.4.2 Detection Process -- 1.4.3 Detect Process Based on FMI Example -- 1.5 Respond to a Detected Security Breach -- 1.5.1 Incident Response Teams -- 1.5.2 Response Plan -- 1.5.3 Common Sorts of Cyberattacks -- 1.5.3.1 Insider Attacks -- 1.5.3.2 Social Engineering -- 1.5.3.3 Malware Attacks -- 1.5.4 Response Types -- 1.5.4.1 Technical Response -- 1.5.4.2 Management Response |
|
1.5.4.3 Communications Response -- 1.5.4.4 Legal Response -- 1.5.5 Incident Response Lifecycle -- 1.5.5.1 Preparation -- 1.5.5.2 Detection -- 1.5.5.3 Containment, Eradication, and Recovery -- 1.5.5.4 Post-Incident Activity -- 1.6 Recover to Restore During a Cybersecurity Incident -- 1.6.1 Determining a Recovery Strategy -- 1.6.1.1 Hot Site -- 1.6.1.2 Cold Site -- 1.6.1.3 Warm Site -- 1.6.1.4 Defining RPO and RTO -- 1.6.2 Recovery Plan Creation -- 1.6.2.1 Possible Effective Solutions for Incidents -- 1.6.2.2 Identify and Evaluate -- 1.6.2.3 Create -- 1.6.2.4 Training & Development |
|
1.6.2.5 Additional Suggestions -- 1.6.3 Plan Testing -- 1.7 Other Frameworks -- 1.7.1 Center for Internet Security (CIS) Critical Security Controls -- 1.7.2 The Center on Local Government Research Framework -- 1.7.3 ISO 27001 and ISO 27002 (International Organisation for Standardisation) -- 1.7.4 Payment Card Industry Data Security Standard (PCI DSS) -- 1.7.5 Less commonly Used Frameworks -- 1.7.5.1 Control Objectives for Information Technology (COBIT) -- 1.7.5.2 Health Information Trust Alliance Cybersecurity Framework (HITRUST CSF) -- 1.7.5.3 Cybersecurity Maturity Model Certification (CMMC) |
|
1.7.5.4 Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) -- References -- 2 Emergency Services Sector -- 2.1 What is Emergency Services as an Infrastructure? -- 2.2 Why are Emergency Services Important? -- 2.3 Key Players and Stakeholders -- 2.4 Cyber Resilience in Emergency Services Infrastructure -- 2.5 Case Studies -- 2.5.1 Case 1: BlueLeaks -- 2.5.2 Case 2: Baltimore's Emergency System -- 2.5.3 Case 3: DC Metropolitan Police Department -- 2.5.4 Case 4: AAA Ambulance Service -- References -- 3 Energy Sector -- 3.1 What is Energy as an Infrastructure? |
Notes |
Description based upon print version of record |
|
3.2 Why is Energy Infrastructure Important? |
Subject |
Computer security.
|
|
Data protection.
|
|
Environmental management.
|
|
Environmental policy.
|
|
environmental control.
|
|
environmental policy.
|
Form |
Electronic book
|
Author |
Akgün, Abdullah Talip
|
ISBN |
9781000983630 |
|
1000983633 |
|