
- 108 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Cybersecurity Lessons from CoVID-19
About this book
Using the SARS-CoV-2/CoVID-19 pandemic as a giant case study, and following the structure of the domains of information security, this book looks at what the crisis teaches us about security. It points out specific security fundamentals where social, medical, or business responses to the crisis failed or needed to make specific use of those concepts. For the most part, these lessons are simply reminders of factors that get neglected during times of non-crisis. The lessons particularly point out the importance of planning and resilience in systems and business.
Those studying cybersecurity and its preventive measures and applications, as well as those involved in risk management studies and assessments, will all benefit greatly from the book.
Robert Slade has had an extensive and prolific career in management, security, and telecommunications research, analysis, and consultancy. He has served as an educator visiting universities and delivering lecturers and seminars.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Half Title
- Title Page
- Copyright Page
- Dedication
- Table of Contents
- Author
- Introduction*
- Chapter 1: Expanding Security: The CIA Triad
- Chapter 2: Security Management
- Chapter 3: Access Control
- Chapter 4: Security Architecture
- Chapter 5: Business Continuity and Disaster Recovery Planning
- Chapter 6: Physical Security
- Chapter 7: Cryptography (Yes, Really)
- Chapter 8: Application Security
- Chapter 9: Security Operations
- Chapter 10: Telecommuni- cations and Networking Security
- Chapter 11: Law, Investigation, and Ethics
- Chapter 12: Be Kind. Be Calm. Be Safe
- Chapter 13: Will We Win?
- Index