Losing the Cybersecurity War
portes grátis
Losing the Cybersecurity War
And What We Can Do to Stop It
Chaudry, Kiren; King, Steve
Taylor & Francis Ltd
12/2022
148
Mole
Inglês
9781032364087
15 a 20 dias
Descrição não disponível.
1. What is Zero Trust?.
2. The Five Battlefields of Cybersecurity.
3. The Impact of the Last 20 Years.
4. The Connected World.
5. Cybersecurity Problems are Hard Problems.
6. Advertising Our Vulnerabilities.
7. Why We Got Here.
8. The Institutionalization.
9. The End and The Beginning.
2. The Five Battlefields of Cybersecurity.
3. The Impact of the Last 20 Years.
4. The Connected World.
5. Cybersecurity Problems are Hard Problems.
6. Advertising Our Vulnerabilities.
7. Why We Got Here.
8. The Institutionalization.
9. The End and The Beginning.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
cybersecurity;zero trust approach;cyber attacks;intelligence information;cybersecurity education;cyber warfare;Ransomware Attack;Chief Information Security Officer;SIEM;CISO;NSA;IoT Device;CIO;ROI;Exploit Kits;Tcp;ERP System;Open Source Software;CPSs;SCADA;Information Security;Branded Content;Open Source;Open Source Code;High School Computer Science;CVE;VIT;Software Supply Chain;Agnostic;Trusted Computer System Evaluation Criteria
1. What is Zero Trust?.
2. The Five Battlefields of Cybersecurity.
3. The Impact of the Last 20 Years.
4. The Connected World.
5. Cybersecurity Problems are Hard Problems.
6. Advertising Our Vulnerabilities.
7. Why We Got Here.
8. The Institutionalization.
9. The End and The Beginning.
2. The Five Battlefields of Cybersecurity.
3. The Impact of the Last 20 Years.
4. The Connected World.
5. Cybersecurity Problems are Hard Problems.
6. Advertising Our Vulnerabilities.
7. Why We Got Here.
8. The Institutionalization.
9. The End and The Beginning.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
cybersecurity;zero trust approach;cyber attacks;intelligence information;cybersecurity education;cyber warfare;Ransomware Attack;Chief Information Security Officer;SIEM;CISO;NSA;IoT Device;CIO;ROI;Exploit Kits;Tcp;ERP System;Open Source Software;CPSs;SCADA;Information Security;Branded Content;Open Source;Open Source Code;High School Computer Science;CVE;VIT;Software Supply Chain;Agnostic;Trusted Computer System Evaluation Criteria