Cyber Security Basics: Removing cognitive barriers by focusing on the fundamentals
Book Details
Author(s)Don Franke
PublisherDon Franke
ISBN / ASINB01A1XZSRK
ISBN-13978B01A1XZSR6
Sales Rank207,419
MarketplaceUnited States 🇺🇸
Description
The goal of this book is to help clear the fog that often gets in the way of gaining a clear understanding of how to approach cyber security. This book is for those tasked with leading, contributing to or improving an organization's cyber security program.
Vulnerability to cyber attacks can be significantly reduced if best practices are followed. Information security does not have to be complicated. A clear understanding of the fundamentals can help ensure that adequate detective and preventative controls are in place.
The security controls discussed herein are assigned a maturity level. This helps the reader determine which controls are most appropriate. Maturity of an infosec program is based on the age, resources and leadership support available. A newly-established infosec program is not ready for advanced controls, for example. You have to establish a solid foundation before you can build on it.
By making practical cyber security clearer for both beginning and seasoned practitioners, it will be easier to know where to start, how to improve, and what to pursue next. Reading this book will hopefully break down the cognitive barriers and enable an organization to detect and mitigate attacks, both common and sophisticated, on an ongoing basis.
Vulnerability to cyber attacks can be significantly reduced if best practices are followed. Information security does not have to be complicated. A clear understanding of the fundamentals can help ensure that adequate detective and preventative controls are in place.
The security controls discussed herein are assigned a maturity level. This helps the reader determine which controls are most appropriate. Maturity of an infosec program is based on the age, resources and leadership support available. A newly-established infosec program is not ready for advanced controls, for example. You have to establish a solid foundation before you can build on it.
By making practical cyber security clearer for both beginning and seasoned practitioners, it will be easier to know where to start, how to improve, and what to pursue next. Reading this book will hopefully break down the cognitive barriers and enable an organization to detect and mitigate attacks, both common and sophisticated, on an ongoing basis.
