Books > Social sciences > Education > Higher & further education
|
Buy Now
Strategy, Policy, Practice, and Governance for AI in Higher Education Institutions (Hardcover)
Loot Price: R5,600
Discovery Miles 56 000
|
|
Strategy, Policy, Practice, and Governance for AI in Higher Education Institutions (Hardcover)
Series: e-Book Collection - Copyright 2022
Expected to ship within 10 - 15 working days
|
Data is the most important commodity, dubbed "the money of the
twenty-first century," which is why data protection has become a
global priority. Data breaches and security flaws can jeopardize
the global economy. Organizations face a greater risk of failing to
achieve strategy and business goals as cyber threat behavior grows
in frequency, sophistication, and destructiveness. A breach can
result in data loss, business interruption, brand, and reputation
harm, as well as regulatory and legal consequences. Furthermore,
cyber security has evolved into a critical component of national
defense. Furthermore, its sphere of control encompasses all facets
of a country's government, economy, and health, in addition to
military realms. Companies of all sizes, markets, and market
environments face the task of securing their vital systems and data
daily. A company needs a strategic, well-thought-out cybersecurity
strategy to secure its critical infrastructure and information
systems to overcome these challenges. As a result, businesses
should seek guidance from cybersecurity frameworks. When used
correctly, a cybersecurity system allows IT security leaders to
better handle their companies' cyber threats. The Framework can be
applied in phases and hence customized to suit the needs of any
organization. The Cybersecurity Framework is designed for
businesses of all sizes, divisions, and stages. The system can be
customized to be used by any company thanks to the built-in
customization feature, designed to be flexible enough to be used by
organizations that are developing information security and risk
management systems. This book examines potential solutions,
starting with an understanding of ICS security developments in
terms of cyber threats, weaknesses, attacks and patterns, agents,
dangers, and the effects of all of these on the industrial
environment and the organizations that depend on it. Equipped with
cybersecurity framework best practices, this book is an excellent
resource for PG students, Ph.D. scholars, industry practitioners,
manufacturing and service industries, researchers, professors, and
academicians. The book provides an understanding of the specific,
standards-based security controls that make up a best practice
cybersecurity program.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|