Uneingeschränkter Zugang

Cyber Security Cookbook for Practitioners

   | 11. Nov. 2019

Zitieren

Morgan, S. (2015, November 24). IBM’s CEO On Hackers: ‘Cyber Crime Is The Greatest Threat To Every Company In The World’. Retrieved August 05, 2017, from https://www.forbes.com/sites/stevemorgan/2015/11/24/ibms-ceo-on-hackers-cyber-crime-is-the-greatest-threat-to-every-company-in-the-world/#75f85d3973f0MorganS.2015, November 24).IBM’s CEO On Hackers: ‘Cyber Crime Is The Greatest Threat To Every Company In The World’Retrieved August 05, 2017, from https://www.forbes.com/sites/stevemorgan/2015/11/24/ibms-ceo-on-hackers-cyber-crime-is-the-greatest-threat-to-every-company-in-the-world/#75f85d3973f0Search in Google Scholar

Global Cost of Cybercrime Predicted to Hit $6 Trillion Annually By 2021, Study Says. (2016, August 16). Retrieved August 05, 2017, from http://www.darkreading.com/attacks-breaches/global-cost-of-cybercrime-predicted-to-hit-$6-trillion-annually-by-2021-study-says/d/d-id/1326742Global Cost of Cybercrime Predicted to Hit $6 Trillion Annually By 2021, Study Says.2016, August 16). Retrieved August 05, 2017, from http://www.darkreading.com/attacks-breaches/global-cost-of-cybercrime-predicted-to-hit-$6-trillion-annually-by-2021-study-says/d/d-id/1326742Search in Google Scholar

Cybersecurity Questions for CEOs. (n.d.). Retrieved August 5, 2017, from https://www.us-cert.gov/sites/default/files/publications/DHS-Cybersecurity-Questions-for-CEOs.pdfSearch in Google Scholar

Fry, E. (2014, June 12). The 6 worst kinds of computer hackers. Retrieved August 05, 2017, from http://fortune.com/2013/02/26/the-6-worst-kinds-of-computer-hackers/FryE.2014, June 12).The 6 worst kinds of computer hackersRetrieved August 05, 2017, from http://fortune.com/2013/02/26/the-6-worst-kinds-of-computer-hackers/Search in Google Scholar

M. (2016, October 24). 7 Types of Hacker Motivations. Retrieved August 05, 2017, from https://securingtomorrow.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations/M.2016, October 24).7 Types of Hacker MotivationsRetrieved August 05, 2017, from https://securingtomorrow.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations/Search in Google Scholar

Enterprise Risk Management Consequence and Likelihood Tables. (n.d.). Retrieved August 6, 2017, from https://ppl.app.uq.edu.au/sites/default/files/Risk%20Consequence%20and%20Likelihood %20Table%20-%20Form.pdfSearch in Google Scholar

Touhill, Gregory J., and C. Joseph Touhill. Cybersecurity for Executives, Wiley, 2014. ProQuest Ebook Central, https://ebookcentral.proquest.com/lib/columbia/detail.action?docID=1707094.TouhillGregoryJ., and TouhillC. JosephCybersecurity for ExecutivesWiley2014ProQuest Ebook Central, https://ebookcentral.proquest.com/lib/columbia/detail.action?docID=170709410.1002/9781118908785Search in Google Scholar

Wheeler, E. (2011), Security Risk Management, Chapter 8, Risk Evaluation and Mitigation Strategies, Elsevier Inc.WheelerE.2011Security Risk Management, Chapter 8, Risk Evaluation and Mitigation StrategiesElsevier Inc10.1016/B978-1-59749-615-5.00008-6Search in Google Scholar

Institute, F. (n.d.). FAIR, an international standard by the Open Group. Retrieved August 08, 2017, from http://www.fairinstitute.org/an-international-standardInstitute, F.(n.d.).FAIR, an international standard by the Open GroupRetrieved August 08, 2017, from http://www.fairinstitute.org/an-international-standardSearch in Google Scholar

Deinert, A. (2016), “Cybersecurity Breach Playbook: What Every IT Administrator Needs to Know”, Vantage Point Solutions, Mitchell, SDDeinertA.2016“Cybersecurity Breach Playbook: What Every IT Administrator Needs to Know”Vantage Point SolutionsMitchell, SDSearch in Google Scholar

Framework for Improving Critical Infrastructure Cybersecurity. (n.d.). Retrieved August 8, 2017, fromSearch in Google Scholar

https://www.bing.com/cr?IG=46B942FD8FD04ED7A2EF4DE7E061BAE0&CID=18B3474BBA4361240BCE4D93BB45607D&rd=1&h=qHbOGImxzOpDg5E54Eh7p9I1gen0wVXVy1g-wVCQk6w&v=1&r=https%3a%2f%2fwww.nist.gov%2fdocument-3766&p=DevEx,5063.1Search in Google Scholar

Cichonski, P. R., Millar, T., Grance, T., & Scarfone, K. (2017, February 19). Computer Security Incident Handling Guide. Retrieved August 08, 2017, from https://www.nist.gov/publications/computer-security-incident-handling-guideCichonskiP. R.MillarT.GranceT., & ScarfoneK.2017, February 19).Computer Security Incident Handling GuideRetrieved August 08, 2017, from https://www.nist.gov/publications/computer-security-incident-handling-guideSearch in Google Scholar

Cichonski, P. R., Millar, T., Grance, T., & Scarfone, K. (2017, February 19). Computer Security Incident Handling Guide. Retrieved August 08, 2017, from https://www.nist.gov/publications/computer-security-incident-handling-guideCichonskiP. R.MillarT.GranceT., & ScarfoneK.2017, February 19).Computer Security Incident Handling GuideRetrieved August 08, 2017, from https://www.nist.gov/publications/computer-security-incident-handling-guideSearch in Google Scholar

NIST. (2014, February 12) Retrieved from https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdfSearch in Google Scholar

Scholtz, T., McMillan, R. (2017, January 26). Institute Cybersecurity and Risk Governance Practices to Improve Information Security. Gartner.ScholtzT.McMillanR.2017, January 26).Institute Cybersecurity and Risk Governance Practices to Improve Information SecurityGartnerSearch in Google Scholar

Kark, K., Francois, M., Aguas, T. (2016, July 25). The new CISO: Leading the strategic security organization. (n.d.). Retrieved August 09, 2017, from https://dupress.deloitte.com/dup-us-en/deloitte-review/issue-19/ciso-next-generation-strategic-security-organization.htmlKarkK.FrancoisM.AguasT.2016, July 25).The new CISO: Leading the strategic security organization. (n.d.). Retrieved August 09, 2017, from https://dupress.deloitte.com/dup-us-en/deloitte-review/issue-19/ciso-next-generation-strategic-security-organization.htmlSearch in Google Scholar

Fry, E. (2014, June 12). The 6 worst kinds of computer hackers. Retrieved August 09, 2017, from http://fortune.com/2013/02/26/the-6-worst-kinds-of-computer-hackers/FryE.2014, June 12).The 6 worst kinds of computer hackersRetrieved August 09, 2017, from http://fortune.com/2013/02/26/the-6-worst-kinds-of-computer-hackers/Search in Google Scholar

M. (2016, October 24). 7 Types of Hacker Motivations. Retrieved August 09, 2017, from https://securingtomorrow.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations/M. (2016, October 24).7 Types of Hacker MotivationsRetrieved August 09, 2017, from https://securingtomorrow.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations/Search in Google Scholar

https://www.us-cert.gov/sites/default/files/publications/DHS-Cybersecurity-Questions-for-CEOs.pdfSearch in Google Scholar

https://www.forbes.com/sites/stevemorgan/2015/11/24/ibms-ceo-on-hackers-cyber-crime-is-the-greatest-threat-to-every-company-in-the-world/#bfb909373f07Search in Google Scholar

http://www.darkreading.com/attacks-breaches/global-cost-of-cybercrime-predicted-to-hit-$6-trillion-annually-by-2021-study-says/d/d-id/1326742Search in Google Scholar

G. Eason, B. Noble, and I. N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp. 529–551, April 1955. (references)EasonG.NobleB., and SneddonI. N.“On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,”Phil. Trans. Roy. Soc. London, vol.A247, pp.529551, April1955(references)10.1098/rsta.1955.0005Search in Google Scholar

J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73.MaxwellJ. ClerkA Treatise on Electricity and Magnetism3rd ed., vol.2OxfordClarendon1892, pp.6873Search in Google Scholar

I. S. Jacobs and C. P. Bean, “Fine particles, thin films and exchange anisotropy,” in Magnetism, vol. III, G. T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271–350.JacobsI. S. and BeanC. P.“Fine particles, thin films and exchange anisotropy,”inMagnetism, vol.IIIRadoG. T. and SuhlH., Eds.New YorkAcademic1963, pp.27135010.1016/B978-0-12-575303-6.50013-0Search in Google Scholar

K. Elissa, “Title of paper if known,” unpublished.ElissaK.“Title of paper if known,”unpublishedSearch in Google Scholar

R. Nicole, “Title of paper with only first word capitalized,” J. Name Stand. Abbrev., in press.NicoleR.“Title of paper with only first word capitalized,”J. Name Stand. Abbrev.in pressSearch in Google Scholar

Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interface,” IEEE Transl. J. Magn. Japan, vol. 2, pp. 740–741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982].YorozuY.HiranoM.OkaK., and TagawaY.“Electron spectroscopy studies on magneto-optical media and plastic substrate interface,”IEEE Transl. J. Magn. Japan, vol.2, pp.740741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982]10.1109/TJMJ.1987.4549593Search in Google Scholar

M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989.YoungM.The Technical Writer’s HandbookMill Valley, CAUniversity Science1989Search in Google Scholar

Electronic Publication: Digital Object Identifiers (DOIs): Article in a journal:Electronic Publication: Digital Object Identifiers (DOIs): Article in a journal:Search in Google Scholar

D. Kornack and P. Rakic, “Cell Proliferation without Neurogenesis in Adult Primate Neocortex,” Science, vol. 294, Dec. 2001, pp. 2127-2130, doi:10.1126/science.1065467.KornackD. and RakicP.“Cell Proliferation without Neurogenesis in Adult Primate Neocortex,”Science, vol.294, Dec.2001, pp.21272130, doi:10.1126/science.106546710.1126/science.106546711739948Search in Google Scholar

H. Goto, Y. Hasegawa, and M. Tanaka, “Efficient Scheduling Focusing on the Duality of MPL Representatives,” Proc. IEEE Symp. Computational Intelligence in Scheduling (SCIS 07), IEEE Press, Dec. 2007, pp. 57-64, doi:10.1109/SCIS.2007.357670.GotoH.HasegawaY., and TanakaM.“Efficient Scheduling Focusing on the Duality of MPL Representatives,”Proc. IEEE Symp. Computational Intelligence in Scheduling (SCIS 07)IEEE Press, Dec.2007, pp.5764, doi:10.1109/SCIS.2007.357670Search in Google Scholar

eISSN:
2470-8038
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
4 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Informatik, andere