000 04953cam a2200565Ki 4500
001 9781003121541
003 FlBoTFG
005 20240213122824.0
006 m o d
007 cr cnu|||unuuu
008 220302s2022 xx eo 000 0 eng d
040 _aOCoLC-P
_beng
_erda
_epn
_cOCoLC-P
020 _a9781003121541
_q(electronic bk.)
020 _a1003121543
_q(electronic bk.)
020 _z9780367639624
020 _a9781000569797
_q(electronic bk. : EPUB)
020 _a1000569799
_q(electronic bk. : EPUB)
020 _z9781032247755
020 _a9781000569759
_q(electronic bk. : PDF)
020 _a1000569756
_q(electronic bk. : PDF)
024 7 _a10.1201/9781003121541
_2doi
035 _a(OCoLC)1301430850
035 _a(OCoLC-P)1301430850
050 4 _aQA76.9.A25
072 7 _aCOM
_x005030
_2bisacsh
072 7 _aBUS
_x083000
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
072 7 _aUR
_2bicssc
082 0 4 _a005.8
_223
245 0 0 _aNext-Generation Enterprise Security and Governance.
250 _aFirst edition.
264 1 _a[Place of publication not identified] :
_bCRC Press,
_c2022.
300 _a1 online resource (xvi, 248 pages).
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 0 _aSecurity, Audit and Leadership Series
505 0 _aChapter 1: Enterprise Threat IntelligenceChapter 2: Enabling Corporate and Institutional Governance for Effective IT GovernanceChapter 3: The Non-Malicious Risky Behaviour in the Enterprise Information System SecurityChapter 4: Cybersecurity Incident Response in the EnterpriseChapter 5: Cyber-enabled crime as an enabler in market manipulation schemesChapter 6: Data Lakes: A Panacea for Big Data Problems, Cyber Safety Issues, and Enterprise Security Chapter 7: The Battle for Cloud Supremacy and the Remaking of Enterprise SecurityChapter 8: Security, Privacy and Trust of Emerging Intelligent Transportation: Cognitive Internet of VehiclesChapter 9: IT Governance and Enterprise Security Policy in the 6G Era
520 _aThe Internet is making our daily lives as digital as possible, and this new era is called the Internet of Everything (IoE). The key force behind the rapid growth of the Internet is the technological advancement of enterprises. The digital world we live in is facilitated by these enterprises' advances and business intelligence. These enterprises need to deal with gazillions of bytes of data, and in today's age of General Data Protection Regulation, enterprises are required to ensure privacy and security of large-scale data collections. However, the increased connectivity and devices used to facilitate IoE are continually creating more room for cybercriminals to find vulnerabilities in enterprise systems and flaws in their corporate governance. Ensuring cybersecurity and corporate governance for enterprises should not be an afterthought or present a huge challenge. In recent times, the complex diversity of cyber-attacks has been skyrocketing, and zero-day attacks, such as ransomware, botnet, and telecommunication attacks, are happening more frequently than before. New hacking strategies would easily bypass existing enterprise security and governance platforms using advanced, persistent threats. For example, in 2020, the Toll Group firm was exploited by a new crypto-attack family for violating its data privacy, where an advanced ransomware technique was launched to exploit the corporation and request a huge figure of monetary ransom. Even after applying rational governance hygiene, cybersecurity configuration and software updates are often overlooked when they are most needed to fight cyber-crime and ensure data privacy. Therefore, the threat landscape in the context of enterprises has become wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of this network. In this context, this book addresses the cybersecurity and cooperate governance challenges associated with enterprises, which will provide a bigger picture of the concepts, intelligent techniques, practices, and open research directions in this area. This book serves as a single source of reference for acquiring the knowledge on the technology, process, and people involved in next-generation privacy and security.
588 _aOCLC-licensed vendor bibliographic record.
650 0 _aComputer security.
650 7 _aBUSINESS & ECONOMICS / Information Management
_2bisacsh
650 7 _aCOMPUTERS / Security / General
_2bisacsh
700 1 _aĀhameda, Mahiuddina,
_eeditor.
700 1 _aMoustafa, Nour,
_eeditor.
700 1 _aBarkat, Abu,
_eeditor.
700 1 _aDowland, Paul,
_eeditor.
856 4 0 _3Taylor & Francis
_uhttps://www.taylorfrancis.com/books/9781003121541
856 4 2 _3OCLC metadata license agreement
_uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
999 _c4815
_d4815