Cyber Security - 3 Book Combo cover art

Cyber Security - 3 Book Combo

Cyber Essentials - Cybersecurity for Small Business - Is Cyber Deterrence Possible?

Preview

£0.00 for first 30 days

Try for £0.00
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
£7.99/month after 30 days. Renews automatically. See here for eligibility.

Cyber Security - 3 Book Combo

By: Cybersecurity and Infrastructure Security Agency - FTC - US Department of Defense
Narrated by: Tom Brooks
Try for £0.00

£7.99/month after 30 days. Renews automatically. See here for eligibility.

Buy Now for £11.99

Buy Now for £11.99

Confirm Purchase
Pay using card ending in
By completing your purchase, you agree to Audible's Conditions of Use and authorise Audible to charge your designated card or any other card on file. Please see our Privacy Notice, Cookies Notice and Interest-based Ads Notice.
Cancel

About this listen

Drive cybersecurity strategy, investment, and culture.

Your success depends on cyber-readiness. Both depend on you.

Being a cyber leader does not require technical expertise, but rather an ability to change the culture of your organization. Reducing your organization’s cyber risks requires awareness of cybersecurity basics.

As a leader, you need to drive your organization’s approach to cybersecurity as you would any other hazard (e.g. how you identify risk, reduce vulnerabilities, and plan for contingencies). This requires an investment of time and money as well as the collective buy-in of your management team. Your investment drives actions and activities, and these build and sustain a culture of cybersecurity.

Cybersecurity begins with strong physical security.

An employee accidentally leaves a flash drive on a coffeehouse table. When he returns hours later to get it, the drive - with hundreds of social security numbers saved on it - is gone.

Another employee throws stacks of old company bank records into a trash can, where a criminal finds them after business hours.

A burglar steals files and computers from your office after entering through an unlocked window.

Lapses in physical security can expose sensitive company data to identity theft, with potentially serious consequences.

The United States’ reliance on networked systems and the high costs associated with cyberattacks have led many leaders in the US government and the Department of Defense (DOD) to prioritize protecting our critical networked infrastructure. Part of that focus is trying to develop a strategy for deterring adversaries from attacking our networks in the first place.

This effort has led to much debate around the question of whether cyber deterrence is possible. Answering this question is difficult since the number of adversary groups capable of attacking US networks is large and our ability to deter each group will vary based on its motives and levels of risk tolerance.

The United States should not expect a cyber deterrence strategy to achieve the kind of results seen with our nuclear deterrence strategy during the Cold War. However, a limited US cyber deterrence strategy is possible.

To be effective, this strategy must be multilayered and use all instruments of US national power. The strategy employed against one adversary group (e.g., criminal actors) will be different than that against another group (e.g., state or state-sponsored actors).

This book explores:

  1. The difficulties of deterring unwanted cyber activities by each group of cyber threats
  2. Realistic expectations for a deterrence strategy
  3. Proposals to help mitigate the problems

For additional resources, visit CISA.gov/Cyber-Essentials or email CISAEssentials@cisa.dhs.gov.

©2021 Tom Brooks (P)2021 Tom Brooks
Security & Encryption Computer Security Hacking Employment
activate_Holiday_promo_in_buybox_DT_T2

Listeners also enjoyed...

Zero Trust and Third-Party Risk cover art
Cybersecurity cover art
Cyber Security cover art
A Vulnerable System cover art
Ransomware Protection Playbook cover art
8 Steps to Better Security cover art
Fire Doesn't Innovate cover art
Cyber Intelligence Driven Risk cover art
Cybersecurity cover art
Cybersecurity cover art
Digital Resilience cover art
Introduction to Cyber Security: Fundamentals cover art
Navigating New Cyber Risks cover art
Cyber Essentials cover art
You'll See This Message When It Is Too Late cover art
Cybersecurity Program Development for Business cover art

What listeners say about Cyber Security - 3 Book Combo

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.