📦Darmowa dostawa od 69 zł - do Żabki oraz automatów i punktów GLS! Przy mniejszych zamówieniach zapłacisz jedynie 4,99 zł!🚚
Darmowa dostawa od 69,00 zł
Lessons Learned - Viira Toomas

Lessons Learned - Viira Toomas

  • Critical Information Infrastructure Protection: How to protect critical information infrastructure

Understand how to protect your critical information infrastructure (CII).

Billions of people use the services of critical infrastructure providers, such as ambulances, hospitals, and electricity and transport networks. This number is increasing rapidly, yet there appears to be little protection for many of these services.

IT solutions have allowed organisations to increase their efficiency in order to be competitive. However, do we even know or realise what happens when IT solutions are not working – when they simply don’t function at all or not in the way we expect? This book aims to teach the IT framework from within, allowing you to reduce dependence on IT systems and put in place the necessary processes and procedures to help protect your CII.

Lessons Learned: Critical Information Infrastructure Protection is aimed at people who organise the protection of critical infrastructure, such as chief executive officers, business managers, risk managers, IT managers, information security managers, business continuity managers and civil servants. Most of the principles and recommendations described are also valid in organisations that are not critical infrastructure service providers. The book covers the following:

· Lesson 1: Define critical infrastructure services.

· Lesson 2: Describe the critical infrastructure service and determine its service level.

· Lesson 3: Define the providers of critical infrastructure services.

· Lesson 4: Identify the critical activities, resources and responsible persons needed to provide the critical infrastructure service.

· Lesson 5: Analyse and identify the interdependencies of services and their reliance upon power supplies.

· Lesson 6: Visualise critical infrastructure data.

· Lesson 7: Identify important information systems and assess their importance.

· Lesson 8: Identify and analyse the interconnections and dependencies of information systems.

· Lesson 9: Focus on more critical services and prioritise your activities.

· Lesson 10: Identify threats and vulnerabilities.

· Lesson 11: Assess the impact of service disruptions.

· Lesson 12: Assess the risks associated with the service and information system.

· Lesson 13: Implement the necessary security measures.

· Lesson 14: Create a functioning organisation to protect CII.

· Lesson 15: Follow regulations to improve the cyber resilience of critical infrastructure services.

· Lesson 16: Assess the security level of your information systems yourself and ask external experts to assess them as well.

· Lesson 17: Scan networks yourself and ask external experts to scan them as well to find the systems that shouldn’t be connected to the Internet but still are.

· Lesson 18: Prepare business continuity and disaster recovery plans and test them at reasonable intervals.

· Lesson 19: Establish reliable relations and maintain them.

· Lesson 20: Share information and be a part of networks where information is shared.

· Lesson 21: Train people to make sure they are aware of cyber threats and know the correct behaviour.

· Lesson 22: If the CII protection system does not work as planned or give the desired output, make improvements.

· Lesson 23: Be prepared to provide critical infrastructure services without IT systems. If possible, reduce dependence on IT systems. If possible, during a crisis, provide critical services at reduced functionality and/or in reduced volumes.

Author

Toomas Viira is a highly motivated, experienced and results-orientated cyber security risk manager and IT auditor. He has more than 20 years’ experience in the IT and cyber security sectors.



EAN: 9781849289573
Symbol
637FFX03527KS
Rok wydania
2018
Elementy
120
Oprawa
Miekka
Format
14.0x21.6cm
Język
angielski
Więcej szczegółów
Bez ryzyka
14 dni na łatwy zwrot
Szeroki asortyment
ponad milion pozycji
Niskie ceny i rabaty
nawet do 50% każdego dnia
168,09 zł
/ szt.
Najniższa cena z 30 dni przed obniżką: / szt.
Cena regularna: / szt.
Możesz kupić także poprzez:
Do darmowej dostawy brakuje69,00 zł
Najtańsza dostawa 0,00 złWięcej
14 dni na łatwy zwrot
Bezpieczne zakupy
Kup teraz i zapłać za 30 dni jeżeli nie zwrócisz
Kup teraz, zapłać później - 4 kroki
Przy wyborze formy płatności, wybierz PayPo.PayPo - kup teraz, zapłać za 30 dni
PayPo opłaci twój rachunek w sklepie.
Na stronie PayPo sprawdź swoje dane i podaj pesel.
Po otrzymaniu zakupów decydujesz co ci pasuje, a co nie. Możesz zwrócić część albo całość zamówienia - wtedy zmniejszy się też kwota do zapłaty PayPo.
W ciągu 30 dni od zakupu płacisz PayPo za swoje zakupy bez żadnych dodatkowych kosztów. Jeśli chcesz, rozkładasz swoją płatność na raty.
Ten produkt nie jest dostępny w sklepie stacjonarnym
Symbol
637FFX03527KS
Kod producenta
9781849289573
Autorzy
Viira Toomas
Rok wydania
2018
Elementy
120
Oprawa
Miekka
Format
14.0x21.6cm
Język
angielski

Understand how to protect your critical information infrastructure (CII).

Billions of people use the services of critical infrastructure providers, such as ambulances, hospitals, and electricity and transport networks. This number is increasing rapidly, yet there appears to be little protection for many of these services.

IT solutions have allowed organisations to increase their efficiency in order to be competitive. However, do we even know or realise what happens when IT solutions are not working – when they simply don’t function at all or not in the way we expect? This book aims to teach the IT framework from within, allowing you to reduce dependence on IT systems and put in place the necessary processes and procedures to help protect your CII.

Lessons Learned: Critical Information Infrastructure Protection is aimed at people who organise the protection of critical infrastructure, such as chief executive officers, business managers, risk managers, IT managers, information security managers, business continuity managers and civil servants. Most of the principles and recommendations described are also valid in organisations that are not critical infrastructure service providers. The book covers the following:

· Lesson 1: Define critical infrastructure services.

· Lesson 2: Describe the critical infrastructure service and determine its service level.

· Lesson 3: Define the providers of critical infrastructure services.

· Lesson 4: Identify the critical activities, resources and responsible persons needed to provide the critical infrastructure service.

· Lesson 5: Analyse and identify the interdependencies of services and their reliance upon power supplies.

· Lesson 6: Visualise critical infrastructure data.

· Lesson 7: Identify important information systems and assess their importance.

· Lesson 8: Identify and analyse the interconnections and dependencies of information systems.

· Lesson 9: Focus on more critical services and prioritise your activities.

· Lesson 10: Identify threats and vulnerabilities.

· Lesson 11: Assess the impact of service disruptions.

· Lesson 12: Assess the risks associated with the service and information system.

· Lesson 13: Implement the necessary security measures.

· Lesson 14: Create a functioning organisation to protect CII.

· Lesson 15: Follow regulations to improve the cyber resilience of critical infrastructure services.

· Lesson 16: Assess the security level of your information systems yourself and ask external experts to assess them as well.

· Lesson 17: Scan networks yourself and ask external experts to scan them as well to find the systems that shouldn’t be connected to the Internet but still are.

· Lesson 18: Prepare business continuity and disaster recovery plans and test them at reasonable intervals.

· Lesson 19: Establish reliable relations and maintain them.

· Lesson 20: Share information and be a part of networks where information is shared.

· Lesson 21: Train people to make sure they are aware of cyber threats and know the correct behaviour.

· Lesson 22: If the CII protection system does not work as planned or give the desired output, make improvements.

· Lesson 23: Be prepared to provide critical infrastructure services without IT systems. If possible, reduce dependence on IT systems. If possible, during a crisis, provide critical services at reduced functionality and/or in reduced volumes.

Author

Toomas Viira is a highly motivated, experienced and results-orientated cyber security risk manager and IT auditor. He has more than 20 years’ experience in the IT and cyber security sectors.



EAN: 9781849289573
Potrzebujesz pomocy? Masz pytania?Zadaj pytanie a my odpowiemy niezwłocznie, najciekawsze pytania i odpowiedzi publikując dla innych.
Zapytaj o produkt
Jeżeli powyższy opis jest dla Ciebie niewystarczający, prześlij nam swoje pytanie odnośnie tego produktu. Postaramy się odpowiedzieć tak szybko jak tylko będzie to możliwe. Dane są przetwarzane zgodnie z polityką prywatności. Przesyłając je, akceptujesz jej postanowienia.
Napisz swoją opinię
Twoja ocena:
5/5
Dodaj własne zdjęcie produktu:
Prawdziwe opinie klientów
4.8 / 5.0 13723 opinii
pixel