Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
This book is an essential guide for IT professionals, cybersecurity experts, and organizational leaders navigating the complex realm of cyber defense. It offers an in-depth analysis of the Critical Security Controls for Effective Cyber Defense, known as the CIS 18 Controls, which are vital actions for protecting organizations against prevalent cyber threats.
The core of the book is an exhaustive examination of each CIS 18 Control. Developed by the Center for Internet Security (CIS), these controls are the benchmark in cybersecurity, crafted to counteract the most common and impactful cyber threats. The book breaks down these controls into comprehensible segments, explaining their implementation, management, and effectiveness. This detailed approach is crucial in the context of the digital era's evolving cyber threats, heightened by the rise in remote work and cloud-based technologies. The book's relevance is magnified by its focus on contemporary challenges, offering strategies to strengthen cyber defenses in a fast-paced digital world.
What You Will Learn
Who This Book Is For
IT and cybersecurity professionals, business leaders and executives, small business owners and managers, students and academics in cybersecurity fields, government and on-profit sector professionals, and cybersecurity consultants and trainers
Dr. Jason Edwards is a seasoned cyber author and professional with over 20 years of experience in the cybersecurity field, having held diverse roles from IT operations and project management to cybersecurity strategy and governance. His strategic approach has enabled him to guide organizations through complex cyber defense challenges, ensuring robust protection against evolving threats. As the author of several books and dozens of articles, Dr. Edwards shares deep knowledge and practical insights with IT professionals, cybersecurity experts, and organizational leaders. Active on LinkedIn, he connects with over 70,000 professionals through daily and weekly posts, and manages a 20,000-subscriber mailing list called the Cyber Spear. Passionate about education and community engagement, he offers monthly group sessions, one-on-one consultations, and is a frequent podcast guest discussing cybersecurity trends, strategies, and best practices. For more information, visit his website at jason-edwards.me.
Chapter 1. Control 1: Inventory and Control of Enterprise (Hardware) Assets.- Chapter 2. Control 2: Inventory and Control of Software Assets.- Chapter 3. Control 3: Data Protection.- Chapter 4. Control 4: Secure Configuration of Enterprise Assets and software.- Chapter 5. Control 5: Account Management.- Chapter 6. Control 6: Access Control Management.- Chapter 7. Control 7: Continuous Vulnerability Management.- Chapter 8. Control 8: Audit Log Management.- Chapter 9. Control 9: Email and Web Browser Protections.- Chapter 10. Control 10: Malware Defenses.- Chapter 11. Control 11: Data Recovery.- Chapter 12. Control 12: Network Infrastructure Management.- Chapter 13. Control 13: Network Monitoring and Defense.- Chapter 14. Control 14: Security Awareness and Skills Training.- Chapter 15. Control 15: Service Provider Management.- Chapter 16. Control 16: Application Software Security.- Chapter 17. Control 17: Incident Response Management.- Chapter 18. Control 18: Penetration Testing.
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.