000 | 05146cam a2200589Ii 4500 | ||
---|---|---|---|
001 | on1150959452 | ||
003 | OCoLC | ||
005 | 20220711203158.0 | ||
006 | m d | ||
007 | cr ||||||||||| | ||
008 | 200415s2020 enka o ||| 0 eng d | ||
040 |
_aYDX _beng _erda _cYDX _dN$T _dYDXIT _dEBLCP _dDG1 _dOCLCF |
||
019 | _a1151192901 | ||
020 |
_a1119720354 _qelectronic book |
||
020 |
_a9781119720355 _qelectronic book |
||
020 |
_z9781786305190 _qhardcover |
||
020 |
_a9781119720362 _q(electronic bk. : oBook) |
||
020 |
_a1119720362 _q(electronic bk. : oBook) |
||
020 | _a9781119720379 | ||
020 | _a1119720370 | ||
035 |
_a(OCoLC)1150959452 _z(OCoLC)1151192901 |
||
050 | 4 |
_aHF5548.37 _b.F74 2020 |
|
050 | 4 | _aQA76.9.A25 | |
082 | 0 | 4 |
_a658.478 _223 |
082 | 0 | 4 |
_a005.8 _223 |
049 | _aMAIN | ||
100 | 1 |
_aFréminville, Marie de, _eauthor. _94977 |
|
245 | 1 | 0 |
_aCybersecurity and decision makers : _bdata security and digital trust / _cMarie de Fréminville. |
264 | 1 |
_aLondon : _bISTE Ltd ; _aHoboken, NJ : _bJohn Wiley & Sons, Inc., _c2020. |
|
300 |
_a1 online resource : _billustrations. |
||
336 |
_atext _btxt _2rdacontent |
||
336 |
_astill image _bsti _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 | _aInformation systems, web and pervasive computing series | |
588 | _aDescription based on online resource; title from digital title page (viewed on May 14, 2020). | ||
505 | 0 | _aCover -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- Foreword -- Preface -- Introduction: Financial and Cyber Performance -- 1. An Increasingly Vulnerable World -- 1.1. The context -- 1.1.1. Technological disruptions and globalization -- 1.1.2. Data at the heart of industrial productivity -- 1.1.3. Cyberspace, an area without boundaries -- 1.1.4. IT resources -- 1.2. Cybercrime -- 1.2.1. The concept of cybercrime -- 1.2.2. Five types of threats -- 1.2.3. Five types of attackers -- 1.3. The cybersecurity market -- 1.3.1. The size of the market and its evolution | |
505 | 8 | _a1.3.2. The market by sector of activity -- 1.3.3. Types of purchases and investments -- 1.3.4. Geographical distribution -- 1.4. Cyber incidents -- 1.4.1. The facts -- 1.4.2. Testimonials versus silence -- 1.4.3. Trends -- 1.4.4. Examples -- 1.5. Examples of particularly exposed sectors of activity -- 1.5.1. Cinema -- 1.5.2. Banks -- 1.5.3. Health -- 1.5.4. Tourism and business hotels -- 1.5.5. Critical national infrastructure -- 1.6. Responsibilities of officers and directors -- 2. Corporate Governance and Digital Responsibility -- 2.1. Corporate governance and stakeholders | |
505 | 8 | _a2.2. The shareholders -- 2.2.1. Valuation of the company -- 2.2.2. Cyber rating agencies -- 2.2.3. Insider trading -- 2.2.4. Activist shareholders -- 2.2.5. The stock exchange authorities -- 2.2.6. The annual report -- 2.3. The board of directors -- 2.3.1. The facts -- 2.3.2. The four missions of the board of directors -- 2.3.3. Civil and criminal liability -- 2.3.4. The board of directors and cybersecurity -- 2.3.5. The board of directors and data protection -- 2.3.6. The statutory auditors -- 2.3.7. The numerical responsibility of the board of directors -- 2.4. Customers and suppliers | |
505 | 8 | _a2.5. Operational management -- 2.5.1. The impacts of digital transformation -- 2.5.2. The digital strategy -- 2.5.3. The consequences of poor digital performance -- 2.5.4. Cybersecurity -- 2.5.5. Merger and acquisition transactions -- 2.5.6. Governance and data protection, cybersecurity -- 3. Risk Mapping -- 3.1. Cyber-risks -- 3.2. The context -- 3.3. Vulnerabilities -- 3.3.1. Fraud against the president -- 3.3.2. Supplier fraud -- 3.3.3. Other economic impacts -- 3.4. Legal risks -- 3.4.1. Class actions -- 3.4.2. Sanctions by the CNIL and the ICO -- 3.5. The objectives of risk mapping | |
505 | 8 | _a3.6. The different methods of risk analysis -- 3.7. Risk assessment (identify) -- 3.7.1. The main actors -- 3.7.2. The steps -- 3.8. Protecting -- 3.9. Detecting -- 3.10. Reacting -- 3.11. Restoring -- 3.12. Decentralized mapping -- 3.12.1. The internal threat -- 3.12.2. Industrial risks -- 3.12.3. Suppliers, subcontractors and service providers -- 3.12.4. Connected objects -- 3.13. Insurance -- 3.14. Non-compliance risks and ethics -- 4. Regulations -- 4.1. The context -- 4.1.1. Complaints filed with the CNIL -- 4.1.2. Vectaury -- 4.1.3. Optical Center -- 4.1.4. Dailymotion | |
650 | 0 |
_aBusiness _xData processing _xSecurity measures. _94978 |
|
650 | 0 |
_aComputer security _xManagement. _94979 |
|
650 | 0 |
_aComputer security. _93970 |
|
650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 _93970 |
|
655 | 4 |
_aElectronic books. _93294 |
|
776 | 0 | 8 |
_iPrint version: _aDe éminville, Marie _tCybersecurity and Decision Makers : Data Security and Digital Trust _dNewark : John Wiley & Sons, Incorporated,c2020 _z9781786305190 |
830 | 0 |
_aInformation systems, web and pervasive computing series. _94739 |
|
856 | 4 | 0 |
_uhttps://doi.org/10.1002/9781119720362 _zWiley Online Library |
942 | _cEBK | ||
994 |
_a92 _bDG1 |
||
999 |
_c68392 _d68392 |