
Next-Generation Enterprise Security and Governance
- 248 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Next-Generation Enterprise Security and Governance
About this book
The Internet is making our daily lives as digital as possible, and this new era is called the Internet of Everything (IoE). The key force behind the rapid growth of the Internet is the technological advancement of enterprises. The digital world we live in is facilitated by these enterprises' advances and business intelligence. These enterprises need to deal with gazillions of bytes of data, and in today's age of General Data Protection Regulation, enterprises are required to ensure privacy and security of large-scale data collections. However, the increased connectivity and devices used to facilitate IoE are continually creating more room for cybercriminals to find vulnerabilities in enterprise systems and flaws in their corporate governance.
Ensuring cybersecurity and corporate governance for enterprises should not be an afterthought or present a huge challenge. In recent times, the complex diversity of cyber-attacks has been skyrocketing, and zero-day attacks, such as ransomware, botnet, and telecommunication attacks, are happening more frequently than before. New hacking strategies would easily bypass existing enterprise security and governance platforms using advanced, persistent threats. For example, in 2020, the Toll Group firm was exploited by a new crypto-attack family for violating its data privacy, where an advanced ransomware technique was launched to exploit the corporation and request a huge figure of monetary ransom. Even after applying rational governance hygiene, cybersecurity configuration and software updates are often overlooked when they are most needed to fight cyber-crime and ensure data privacy. Therefore, the threat landscape in the context of enterprises has become wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of this network.
In this context, this book addresses the cybersecurity and cooperate governance challenges associated with enterprises, which will provide a bigger picture of the concepts, intelligent techniques, practices, and open research directions in this area. This book serves as a single source of reference for acquiring the knowledge on the technology, process, and people involved in next-generation privacy and security.
Trusted by 375,005 students
Access to over 1 million titles for a fair monthly price.
Study more efficiently using our study tools.
Information
Chapter 1 Enterprise Threat Intelligence
- 1.1 Introduction: Security Risk & Intelligence
- 1.1.1 Chapter Roadmap
- 1.2 Organized Crime
- 1.2.1 Identity Theft
- 1.2.1.1 Countermeasures
- 1.2.2 Financial & Asset System Targeting
- 1.2.2.1 Payment Card Attacks
- 1.2.2.2 Business Email Compromise (BEC)
- 1.2.2.3 Direct Financial System Attacks
- 1.2.2.4 Crypto Currency Attacks
- 1.2.3 Extortion
- 1.2.3.1 Denial of Service (DoS)
- 1.2.3.2 Ransomware
- 1.2.4 Infrastructure Squatting
- 1.2.4.1 Countermeasures
- 1.3 Nation States
- 1.3.1 Espionage
- 1.3.1.1 Countermeasures
- 1.3.2 Financial Gain
- 1.3.2.1 Countermeasures
- 1.3.3 Sabotage
- 1.3.3.1 Countermeasures
- 1.3.4 Influence
- 1.3.4.1 Countermeasures
- 1.4 Hacktivists
- 1.4.1 Countermeasures
- 1.5 Cyber Terrorism
- 1.5.1 Countermeasures
- 1.6 Insider Threats
- 1.6.1 Countermeasures
- 1.7 Future Threats
- 1.7.1 Artificial Intelligence (AI)
- 1.7.1.1 AI: Cyber Offensive Applications
- 1.7.1.2 AI: Cyber Security Applications
- 1.7.2 Adversarial Machine Learning
- 1.7.3 Quantum-Insecure Cryptography
- 1.7.4 Cyber-Physical Systems
- 1.8 Conclusion
- Notes
- References
1.1 Introduction: Security Risk & Intelligence
1.1.1 Chapter Roadmap
1.2 Organized Crime
1.2.1 Identity Theft
1.2.1.1 Countermeasures
1.2.2 Financial & Asset System Targeting
1.2.2.1 Payment Card Attacks
Table of contents
- Cover
- Half Title
- Series Page
- Title Page
- Copyright Page
- Dedication
- Contents
- Preface
- Contributors
- 1 Enterprise Threat Intelligence
- 2 Enabling Corporate and Institutional Governance for Effective IT Governance
- 3 The Non-Malicious Risky Behavior in the Enterprise Information System Security
- 4 Cybersecurity Incident Response in the Enterprise
- 5 Cyber-Enabled Crime as an Enabler in Market Manipulation Schemes
- 6 Data Lakes: A Panacea for Big Data Problems, Cyber Safety Issues, and Enterprise Security
- 7 The Battle for Cloud Supremacy and the Remaking of Enterprise Security
- 8 Security, Privacy, and Trust of Emerging Intelligent Transportation: Cognitive Internet of Vehicles
- 9 IT Governance and Enterprise Security Policy in the 6G Era
- Index
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app