Assessing Information Security
Strategies, Tactics, Logic and FrameworkUnknown - 2014
Build a strategic response to cyber attacks The activities of the cyber criminal are both deliberate and hostile, and they can be compared to military operations. Many people in business understand that the insights from the classics of military strategy are as relevant to modern commerce as they are to war. It is clear that organisations need to develop a view of cybersecurity that goes beyond technology: all staff in the organisation have a role to play, and it is the senior managers who must ensure, like generals marshalling their forces, that all staff know the cyber security policies that.
Publisher: Ely, Cambridgeshire : IT Governance Publishing, 2014.
Edition: Second edition.
Characteristics: 1 online resource (424 pages).