This book gives a complete introduction to cybersecurity and its many subdomains. It’s unique by covering both technical and governance aspects of cybersecurity and is  easy to read with 150 full color figures. There are also exercises and study cases at the end of each chapter, with additional material on the book's website. The numerous high-profile cyberattacks being reported in the press clearly show that cyberthreats cause serious business risks. For this reason, cybersecurity has become a critical concern for global politics, national security, organizations as well for individual citizens. While cybersecurity has traditionally been a technological discipline, the field has grown so large and complex that proper governance of cybersecurity is needed. The primary audience for this book is advanced level students in computer science focusing on cybersecurity and cyber risk governance. The digital transformation of society also makes cybersecurity relevant in many other disciplines, hence this book is a useful resource for other disciplines, such as law, business management and political science. Additionally, this book is for anyone in the private or public sector, who wants to acquire or update their knowledge about cybersecurity both from a technological and governance perspective.  
Les mer
While cybersecurity has traditionally been a technological discipline, the field has grown so large and complex that proper governance of cybersecurity is needed.The primary audience for this book is advanced level students in computer science focusing on cybersecurity and cyber risk governance.
Les mer
Chapter 1 Basic concepts of cybersecurity.- Chapter 2 Attack vectors and malware.- Chapter 3 System security.- Chapter 4 Cryptography.- Chapter 5 Key management and PKI.- Chapter 6 Network security.- Chapter 7 Wireless Security.- Chapter 8 User authentication.- Chapter 9 IAM – Identity and Access Management.- Chapter 10 Digital Privacy.- Chapter 11Secure by design.- Chapter 12 Physical Information Security.- Chapter 13 Security culture.- Chapter 14 Cybersecurity readiness, security testing and audit.- Chapter 15 AI and cybersecurity.- Chapter 16Cyber operations.- Chapter 17 Cyber organizational structures and regulation.- Chapter 18 Governance and information security management.- Chapter 19 Cybersecurity risk management.
Les mer
This book gives a complete introduction to cybersecurity and its many subdomains. It’s unique by covering both technical and governance aspects of cybersecurity and is  easy to read with 150 full color figures. There are also exercises and study cases at the end of each chapter, with additional material on the book's website. The numerous high-profile cyberattacks being reported in the press clearly show that cyberthreats cause serious business risks. For this reason, cybersecurity has become a critical concern for global politics, national security, organizations as well for individual citizens. While cybersecurity has traditionally been a technological discipline, the field has grown so large and complex that proper governance of cybersecurity is needed. The primary audience for this book is advanced level students in computer science focusing on cybersecurity and cyber risk governance. The digital transformation of society also makes cybersecurity relevant in many other disciplines, hence this book is a useful resource for other disciplines, such as law, business management and political science. Additionally, this book is for anyone in the private or public sector, who wants to acquire or update their knowledge about cybersecurity both from a technological and governance perspective.
Les mer
Covers 19 self-contained chapters which focus on the technological and governance aspects for cybersecurity Textbook for students and for professionals working on the technological and governance perspective for cybersecurity Includes exercises and study cases at the end of each chapter
Les mer
GPSR Compliance The European Union's (EU) General Product Safety Regulation (GPSR) is a set of rules that requires consumer products to be safe and our obligations to ensure this. If you have any concerns about our products you can contact us on ProductSafety@springernature.com. In case Publisher is established outside the EU, the EU authorized representative is: Springer Nature Customer Service Center GmbH Europaplatz 3 69115 Heidelberg, Germany ProductSafety@springernature.com
Les mer

Produktdetaljer

ISBN
9783031684821
Publisert
2024-11-29
Utgiver
Vendor
Springer International Publishing AG
Høyde
235 mm
Bredde
155 mm
Aldersnivå
Lower undergraduate, P, 06
Språk
Product language
Engelsk
Format
Product format
Heftet
Orginaltittel
Informasjonssikkerhet, 2. utgave

Forfatter

Biographical note

Audun Jøsang is Professor in cybersecurity at the University of Oslo in Norway, and Adjunct Prof. at QUT in Australia. He has worked in the telecommunications industry for Alcatel Telecom in Belgium and Telenor in Norway. Prof. Jøsang has a master’s degree in information security from Royal Holloway College, University of London, and is also a telecommunications engineer. He holds a PhD from NTNU where he also worked as Associate Prof. He is a CISSP and CISM with broad expertise in cybersecurity.