
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
Cyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping, compliance with the General Data Protection Regulation, cyber culture, ethics and crisis management. It is intended for anyone concerned about the protection of their data, as well as decision makers in any organization.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
1
An Increasingly Vulnerable World
1.1. The context
1.1.1. Technological disruptions and globalization

- – the totally decentralized structure of the Internet, based on a multitude of different networks (at the beginning of June “Swisscom’s data passed through China”, the customers of the Dutch operator KDN, as well as those of the French operators Bouygues and Numéricable, were also affected, according to the newspaper Le Temps on June 12, 2019);
- – the architecture of IP addresses and domain names;
- – the “backdoors” of the equipment;
- – irregularities in the design of telecom operators’ services;
- – insufficient cryptographic tools for software and equipment.
1.1.2. Data at the heart of industrial productivity
1.1.3. Cyberspace, an area without boundaries
1.1.4. IT resources
1.2. Cybercrime
1.2.1. The concept of cybercrime

Table of contents
- Cover
- Table of Contents
- Foreword
- Preface
- Introduction
- 1 An Increasingly Vulnerable World
- 2 Corporate Governance and Digital Responsibility
- 3 Risk Mapping
- 4 Regulations
- 5 Best Practices of the Board of Directors
- 6 Resilience and Crisis Management
- Conclusion: The Digital Committee
- Appendices
- Glossary
- References
- Index
- End User License Agreement