Cybersecurity
Current Writings on Threats and Protection
Häftad, Engelska, 2019
469 kr
Produktinformation
- Utgivningsdatum2019-02-05
- Mått152 x 229 x 15 mm
- Vikt376 g
- FormatHäftad
- SpråkEngelska
- Antal sidor288
- FörlagMcFarland & Co Inc
- ISBN9781476674407
Tillhör följande kategorier
Joaquin Jay Gonzalez III, Ph.D., is vice provost for global affairs as well as chair and Mayor George Christopher Professor of Public Administration at Golden Gate University. He founded GGU’s law enforcement and security program and is a San Francisco advocate for the safety and security of Filipino American kids and their families. Roger L. Kemp, Ph.D., ICMA-CM, has been a city manager on both the East and West coasts for more than 25 years. He is presently Distinguished Adjunct Professor of Public Administration at Golden Gate University and a Fellow of The Academy of Political Science.
- Table of ContentsAcknowledgmentsPrefacePart I. An Overview1. Government Employees Unaware They Are Cyber Crime Victims (Chelsea Binns)2. Cybersecurity and America’s Governments (Roger L. Kemp)3. NACo Members Zero In on Cybersecurity, Tech Safety (Ariel Cohen)4. Growing Impact of Cybercrime in Local Government (Gerald Cliff)5. Cybersecurity: What’s Your Risk? (International City/County Management Association)6. Performance and Data Analytics: The Cincinnati Story (Harry Black)7. The Digital Solution (Shaun Mulholland)8. Digital Wallpapers Open Doors (Caitlin Cowart)9. Personal Privacy Is Eroding as Consent Policies of Google and Facebook Evoke “Fantasy World” (Fred H. Cate)Part II. Threats and Risks10. IoT Is Changing the Cybersecurity Industry (Larry Karisny)11. Equifax Breach Is a Reminder of Society’s Larger Cybersecurity Problems (Richard Forno)12. Cybersecurity: Protecting Court Data (Brian McLaughlin)13. Health-Care Industry Increasingly Faces Cybersecurity Breaches(Margaret Steen)14. It’s in the Mail: Aetna Agrees to $17M Payout in HIV Privacy Breach (Elana Gordon)15. Explainer: What Is Hacking? (James H. Hamlyn-Harris)16. How the Chinese Cyberthreat Has Evolved (Dorothy Denning)17. Now That Russia Has Apparently Hacked America’s Grid, Shoring Up Security Is More Important Than Ever (Theodore J. Kury)18. Ransomware Victims Urged to Report Infections to Federal Law Enforcement Federal Bureau of Investigation19. Ransomware Attacks Illustrate the Vulnerabilities That Local Government Entities Face (Mary Scott Nabers)20. Ransomware Attacks on the Rise in 2017 (Mary Ann Barton)21. The Two Faces of Social Media (Martha Perego)22. “Zero-Day” Stockpiling Puts Us All at Risk (Benjamin Dean)Part III. Prevention, Protection, Partnership: A. Practical Preventive Measures23. A Plan for Cybersecurity (Cory Fleming)24. How We Can Each Fight Cybercrime with Smarter Habits (Arun Vishwanath)25. Simple Steps to Online Safety (Alan Shark)26. Staying Safe on Social Networking Sites (U.S. Computer Emergency Readiness Team)27. Seven Keys to Strengthen Your Cybersecurity Culture (Daniel J. Lohrmann)28. Three Tips for Forming a Computer Emergency (Response TeamKelsey Brewer)29. Cybersecurity Strategies Governments Need (Gus “Ira” Hunt and Lalit Ahluwalia)30. Security Pros Need a Mentor: Here’s Why and How (Daniel J. Lohrmann)31. Mecklenburg County Refuses to Pay Ransom to Cyber Hackers(Mary Ann Barton)32. Fighting Fake News (Marcus Banks)33. How Airplane Crash Investigations Can Improve Cybersecurity (Scott Shackelford)III. B. Technical Protections34. National Cybersecurity Workforce FrameworkU.S. Department of Homeland Security35. Eliminating Network Blind Spots and Preventing BreachesReggie Best36. The Cloud and Enterprise Cybersecurity: Leveling the Playing Field (Microsoft)37. Government Data in the Cloud: Provider and User Responsibilities (Subrata Chakrabarti)38. Using Blockchain to Secure the “Internet of Things” (Nir Kshetri)39. How to Protect Patrons’ Digital Privacy (Anne Ford)40. Monitoring Employees’ Use of Company Computers and the Internet (Texas Workforce Commission)41. Disaster Recovery for Technology: Best PracticeGovernment Finance Officers AssociationIII. C. Using Partnerships and Networks42. Cybersecurity Partnerships: Strength in Numbers (Susan Miller)43. Intersector Briefing: Cross Sector Collaboration in CybersecurityIntersector Project44. Obama’s Cybersecurity Initiative (Frank J. Cilluffo and Sharon L. Cardash)45. New Trump Executive Order on Cybersecurity (Daniel J. Lohrmann)46. Sharing of Cyber Threat Indicators and Defensive Measures by the Federal Government (Office of the Director of National Intelligence and Other Agencies)47. Law Enforcement Partnerships Enhance Cybersecurity Investigations (Chelsea Binns)48. States Rush to Cash in on Cybersecurity Boom (Elaine S. Povich)49. How the National Guard Is Protecting Cybersecurity (Colin Wood)50. Cybersecurity and Local Governments in the United States (William Hatcher)Part IV. Future51. The Top 18 Security Predictions for 2018 (Daniel J. Lohrmann)52. Artificial Intelligence Cyber Attacks Are Coming—But What Does That Mean? (Jeremy Straub)53. FCC Group on 5G Deployment Short on Local Input (Mary Ann Barton)54. Thinking Strategically in the Cyber Domain (John O’Brien)55. Internet, E-mail and Computer Use Policy (Texas Workforce Commission)56. Consumers Who Froze Their Credit ReportsJulie ApplebyAppendix A: Glossary of Cybersecurity TermsJoaquin Jay Gonzalez IIIAppendix B: Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical InfrastructureAppendix C: City and County of San Francisco CybersecurityPolicyAppendix D: LaPorte County, Indiana, IT Computer Security PolicyAbout the ContributorsIndex
“The 56 separately authored articles contained in this volume effectively combine diverse resources under one cover, making it easier for those new to the cybersecurity discipline to find information relevant to their area of interest...the articles are relevant and informative...recommended”—Choice; “essential reading...recommended”—Midwest Book Review.