Cybersecurity: Ethics, Legal, Risks, and Policies

ยท
ยท CRC Press
เจˆ-เจ•เจฟเจคเจพเจฌ
434
เจชเฉฐเจจเฉ‡
เจฏเฉ‹เจ—
เจฐเฉ‡เจŸเจฟเฉฐเจ—เจพเจ‚ เจ…เจคเฉ‡ เจธเจฎเฉ€เจ–เจฟเจ†เจตเจพเจ‚ เจฆเฉ€ เจชเฉเจธเจผเจŸเฉ€ เจจเจนเฉ€เจ‚ เจ•เฉ€เจคเฉ€ เจ—เจˆ เจนเฉˆ ย เจนเฉ‹เจฐ เจœเจพเจฃเฉ‹

เจ‡เจธ เจˆ-เจ•เจฟเจคเจพเจฌ เจฌเจพเจฐเฉ‡

This book is the first of its kind to introduce the integration of ethics, laws, risks, and policies in cyberspace. The book provides understanding of the ethical and legal aspects of cyberspace along with the risks involved. It also addresses current and proposed cyber policies, serving as a summary of the state of the art cyber laws in the United States. It also, importantly, incorporates various risk management and security strategies from a number of organizations.

Using easy-to-understand language and incorporating case studies, the authors begin with the consideration of ethics and law in cybersecurity and then go on to take into account risks and security policies. The section on risk covers identification, analysis, assessment, management, and remediation. The very important topic of cyber insurance is covered as wellโ€”its benefits, types, coverage, etc. The section on cybersecurity policy acquaints readers with the role of policies in cybersecurity and how they are being implemented by means of frameworks. The authors provide a policy overview followed by discussions of several popular cybersecurity frameworks, such as NIST, COBIT, PCI/DSS, ISO series, etc.

เจฒเฉ‡เจ–เจ• เจฌเจพเจฐเฉ‡

Ishaani Priyadarshini, PhD, has authored book chapters and journal articles for SCIE-indexed journals. As a certified reviewer, she conducts peer review of research papers for IEEE, Elsevier, and Springer journals and is a member of the editorial board of the International Journal of Information Security and Privacy. She is a PhD candidate (Department of Electrical and Computer Engineering) at the University of Delaware, USA. Her areas of research include cybersecurity (authentication systems, cybersecurity ethics, and policies) and artificial intelligence.

Chase Cotton, PhD, CISSP, is Professor of Practice and Director of the University of Delaware Center for Intelligent CyberSecurity, USA. He is a successful researcher, telecommunications carrier executive, product manager, consultant, and educator for the technologies used in Internet and data services in the carrier environment. Dr. Cottonโ€™s varied background includes communications research at Bellcoreโ€™s Applied Research Area, creating new algorithms and methods in bridging multicast and many forms of packet-based applications, including voice and video, traffic monitoring, transport protocols, custom VLSI for communications (protocol engines and content addressable memories), and gigabit networking. Past work also included assisting carriers worldwide as they started their Internet businesses, including Internet Service Providers (ISPs), hosting and web services, and the first large-scale commercial deployment of Digital Subscriber Line (DSL) for consumer broadband services. In 2000, Dr. Cotton assumed research, planning, and engineering for Sprintโ€™s global Tier 1 Internet provider, SprintLink. His research interests include cybersecurity and high-availability software systems with funding drawn from the NSF, ARL, CERDEC, JPMorgan Chase, and other industrial sponsors. Dr. Cotton currently consults on communications and Internet architectures for many carriers and equipment vendors worldwide.

เจ‡เจธ เจˆ-เจ•เจฟเจคเจพเจฌ เจจเฉ‚เฉฐ เจฐเฉ‡เจŸ เจ•เจฐเฉ‹

เจ†เจชเจฃเฉ‡ เจตเจฟเจšเจพเจฐ เจฆเฉฑเจธเฉ‹

เจชเฉœเฉเจนเจจ เจธเฉฐเจฌเฉฐเจงเฉ€ เจœเจพเจฃเจ•เจพเจฐเฉ€

เจธเจฎเจพเจฐเจŸเจซเจผเฉ‹เจจ เจ…เจคเฉ‡ เจŸเฉˆเจฌเจฒเฉˆเฉฑเจŸ
Google Play Books เจเจช เจจเฉ‚เฉฐ Android เจ…เจคเฉ‡ iPad/iPhone เจฒเจˆ เจธเจฅเจพเจชเจค เจ•เจฐเฉ‹เฅค เจ‡เจน เจคเฉเจนเจพเจกเฉ‡ เจ–เจพเจคเฉ‡ เจจเจพเจฒ เจธเจตเฉˆเจšเจฒเจฟเจค เจคเฉŒเจฐ 'เจคเฉ‡ เจธเจฟเฉฐเจ• เจ•เจฐเจฆเฉ€ เจนเฉˆ เจ…เจคเฉ‡ เจคเฉเจนเจพเจจเฉ‚เฉฐ เจ•เจฟเจคเฉ‹เจ‚ เจตเฉ€ เจ†เจจเจฒเจพเจˆเจจ เจœเจพเจ‚ เจ†เจซเจผเจฒเจพเจˆเจจ เจชเฉœเฉเจนเจจ เจฆเจฟเฉฐเจฆเฉ€ เจนเฉˆเฅค
เจฒเฉˆเจชเจŸเจพเจช เจ…เจคเฉ‡ เจ•เฉฐเจชเจฟเจŠเจŸเจฐ
เจคเฉเจธเฉ€เจ‚ เจ†เจชเจฃเฉ‡ เจ•เฉฐเจชเจฟเจŠเจŸเจฐ เจฆเจพ เจตเฉˆเฉฑเจฌ เจฌเฉเจฐเจพเจŠเจœเจผเจฐ เจตเจฐเจคเจฆเฉ‡ เจนเฉ‹เจ Google Play 'เจคเฉ‡ เจ–เจฐเฉ€เจฆเฉ€เจ†เจ‚ เจ—เจˆเจ†เจ‚ เจ†เจกเฉ€เจ“-เจ•เจฟเจคเจพเจฌเจพเจ‚ เจธเฉเจฃ เจธเจ•เจฆเฉ‡ เจนเฉ‹เฅค
eReaders เจ…เจคเฉ‡ เจนเฉ‹เจฐ เจกเฉ€เจตเจพเจˆเจธเจพเจ‚
e-ink เจกเฉ€เจตเจพเจˆเจธเจพเจ‚ 'เจคเฉ‡ เจชเฉœเฉเจนเจจ เจฒเจˆ เจœเจฟเจตเฉ‡เจ‚ Kobo eReaders, เจคเฉเจนเจพเจจเฉ‚เฉฐ เฉžเจพเจˆเจฒ เจกเจพเจŠเจจเจฒเฉ‹เจก เจ•เจฐเจจ เจ…เจคเฉ‡ เจ‡เจธเจจเฉ‚เฉฐ เจ†เจชเจฃเฉ‡ เจกเฉ€เจตเจพเจˆเจธ 'เจคเฉ‡ เจŸเฉเจฐเจพเจ‚เจธเจซเจฐ เจ•เจฐเจจ เจฆเฉ€ เจฒเฉ‹เฉœ เจนเฉ‹เจตเฉ‡เจ—เฉ€เฅค เจธเจฎเจฐเจฅเจฟเจค eReaders 'เจคเฉ‡ เฉžเจพเจˆเจฒเจพเจ‚ เจŸเฉเจฐเจพเจ‚เจธเจซเจฐ เจ•เจฐเจจ เจฒเจˆ เจตเฉ‡เจฐเจตเฉ‡ เจธเจนเจฟเจค เจฎเจฆเจฆ เจ•เฉ‡เจ‚เจฆเจฐ เจนเจฟเจฆเจพเจ‡เจคเจพเจ‚ เจฆเฉ€ เจชเจพเจฒเจฃเจพ เจ•เจฐเฉ‹เฅค