|
Showing 1 - 4 of
4 matches in All Departments
The probability of a world-wide cyber conflict is small. Yet the
probability of forms of cyber conflict, regional or even global,
could be argued as being very high. Small countries are usually
signatories to military and economic alliances with major world
powers but rely heavily on the technical ability of these powers in
protecting their own national interests. They may be considered to
be IT 'technology colonies'. Their cyber infrastructure is usually
fully imported and their ability to assess it is limited. This book
poses the question: to what extent should, or can, a small country
prepare itself for handling the broad range of cyber threats?
Looking at cyber-warfare, cyber-terrorism, cyber-crime and
associated concerns, national experts from New Zealand, Australia,
The Netherlands, and Poland present analyses of cyber-defence
realities, priorities and options for smaller countries. They show
that what is needed is the ability of small nations to be able to
define and prepare appropriate responses such as the role of
military/law enforcement/business entities, continuity and
resilience strategies, incident response and business continuity
plans and more for handing nationally-aimed cyber-attacks
particularly where these address national critical infrastructures.
The probability of a world-wide cyber conflict is small. Yet the
probability of forms of cyber conflict, regional or even global,
could be argued as being very high. Small countries are usually
signatories to military and economic alliances with major world
powers but rely heavily on the technical ability of these powers in
protecting their own national interests. They may be considered to
be IT 'technology colonies'. Their cyber infrastructure is usually
fully imported and their ability to assess it is limited. This book
poses the question: to what extent should, or can, a small country
prepare itself for handling the broad range of cyber threats?
Looking at cyber-warfare, cyber-terrorism, cyber-crime and
associated concerns, national experts from New Zealand, Australia,
The Netherlands, and Poland present analyses of cyber-defence
realities, priorities and options for smaller countries. They show
that what is needed is the ability of small nations to be able to
define and prepare appropriate responses such as the role of
military/law enforcement/business entities, continuity and
resilience strategies, incident response and business continuity
plans and more for handing nationally-aimed cyber-attacks
particularly where these address national critical infrastructures.
Focuses mainly on communications and communication standards with
emphasis also on risk analysis, ITSEC, EFT and EDI with numerous
named viruses described. The dictionary contains extended essays on
risk analysis, personal computing, key management, pin management
and authentication.
The purpose of this book is to answer the questions that all
responsible managers are asking or will ask on the subject of
information security. There are few managers with first hand
experience of serious attacks or catastrophic occurrences with
regard to integrated information systems.
|
You may like...
The Musketeers
Tom Burke, Luke Pasqualino, …
Blu-ray disc
(3)
R268
Discovery Miles 2 680
Loot
Nadine Gordimer
Paperback
(2)
R398
R369
Discovery Miles 3 690
|