Описание: A non-biased, grounded, and practical approach to employee engagement For managers and business leaders who want to enhance performance, this easy-to-use guide to employee management offers real solutions for getting workers engaged and increasing productivity.
Описание: Cybersecurity needs a change in communication. It is time to show the world that cybersecurity is an exciting and diverse field to work in. Cybersecurity is not only about hackers and technical gobbledygook. It is a diverse field of work with a lot of collaboration with other disciplines. Over the years, security professionals have tried different awareness strategies to promote their work and to improve the knowledge of their audience but without much success. Communication problems are holding back advances in in the field.
Visual Communication for Cybersecurity explores the possibilities of visual communication as a tool to improve the communication about cybersecurity and to better connect with non-experts. Visual communication is useful to explain complex topics and to solve complex problems. Visual tools are easy to share through social media and have the possibility to reach a wide audience. When applied strategically, visual communication can contribute to a people-centric approach to security, where employees are encouraged to actively engage in security activities rather than simply complying with the policies.
Cybersecurity education does not usually include communication theory or creative skills. Many experts think that it is not part of their job and is best left to the communication department or they think that they lack any creative talent. This book introduces communication theories and models, gives practical tips, and shows many examples. The book can support students in cybersecurity education and professionals searching for alternatives to bullet-point presentations and textual reports. On top of that, if this book succeeds in inspiring the reader to start creating visuals, it may also give the reader the pleasure of seeing new possibilities and improving their performance.
The book is divided into different parts for readers with different interests. There is no need to read the book from cover to cover; the chapters are organized thematically. Readers that are interested in how to apply communication theory to cybersecurity will enjoy the chapters about learning, the context in which communication takes place, and how people are persuaded. Readers that are looking for inspiration and examples of how to use visuals in their daily tasks go straight to the third section of the book. The last section is a workbook that will help the reader to take the first steps towards using visual communication at work.
Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been demonstrated that common hackers can use tools and techniques downloaded from the Internet to attack government and commercial information systems. Although threats may come from mischief makers and pranksters, they are more likely to result from hackers working in concert for profit, hackers working under the protection of nation states, or malicious insiders.
Securing an IT Organization through Governance, Risk Management, and Audit introduces two internationally recognized bodies of knowledge: Control Objectives for Information and Related Technology (COBIT 5) from a cybersecurity perspective and the NIST Framework for Improving Critical Infrastructure Cybersecurity (CSF). Emphasizing the processes directly related to governance, risk management, and audit, the book provides details of a cybersecurity framework (CSF), mapping each of the CSF steps and activities to the methods defined in COBIT 5. This method leverages operational risk understanding in a business context, allowing the information and communications technology (ICT) organization to convert high-level enterprise goals into manageable, specific goals rather than unintegrated checklist models.
The real value of this methodology is to reduce the knowledge fog that frequently engulfs senior business management, and results in the false conclusion that overseeing security controls for information systems is not a leadership role or responsibility but a technical management task. By carefully reading, implementing, and practicing the techniques and methodologies outlined in this book, you can successfully implement a plan that increases security and lowers risk for you and your organization.
Описание: This title, first published in 1986, analyses the idea that the issue of informing and consulting with workers in multinational enterprises should best be examined within the context of the general economic and social evolution of the member countries and in relation to the national and international instruments and practices in place.
Описание: The recent emergence and prevalence of social network applications, sensor equipped mobile devices, and the availability of large amounts of geo-referenced data have enabled the analysis of new context dimensions that involve individual, social, and urban context.Creating Personal, Social, and Urban Awareness through Pervasive Computing provides an overview of the theories, techniques, and practical applications related to the three dimensions of context awareness. Through the exploration of emerging research trends of pervasive computing, this book is beneficial to professors, students, researchers, and developers interested this latest development in the field of context-awareness and pervasive computing.
Описание: This book presents the information from the collaborative efforts and perspectives of a current school district superintendent who has researched and worked day-to-day with the issues, and an attorney currently dealing with the legal issues relevant to cyberbullying.
Описание: The book seeks to assist information security professionals establish security-positive behaviours within the organisations they protect through effective communication, education and training.
Confidential data and our personal privacy are under threat as never before. With breaches and cyber attacks on the rise, political and legal pressure is growing on business and government to step up and meet this challenge.
Unfortunately, organisations are still putting data and lives at risk because of an over-reliance on technology and an entrenched mindset that views human error and misjudgement as unmanageable flaws.
This failure to address the 'human factor' is a missed opportunity, one that leaves them vulnerable and at a major commercial disadvantage. So, if they are to bring about a fundamental long-term shift in users' levels of awareness and behaviour that's effective and sustainable, organisations must adopt a different approach.
In 'Rethinking the Human Factor', information security expert, Bruce Hallas sets out a new philosophical approach. Rather than creating a separate security culture, Hallas' focus is on how to make risk mitigation an unconscious 'habit' that's embedded within the organisation.
His ground-breaking philosophy draws on insights from neuroscience, behavioural science and economics, marketing, psychology and culture, and shows it is possible to redesign information security initiatives by making 'the right behaviour become the easy behaviour'.
'Rethinking the Human Factor' is thought-provoking reading for CIOs, CTOs and CISOs, as well as the increasing number of managers, independent consultants or anyone in the information security sector responsible for education, awareness and behaviour change programmes.
Описание: In recent decades there has been incredible growth in the use of various internet applications by individuals and organizations who store sensitive information online on different servers. This greater reliance of organizations and individuals on internet technologies and applications increases the threat space and poses several challenges for implementing and maintaining cybersecurity practices.Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention provides innovative insights into how an ethical hacking knowledge base can be used for testing and improving the network and system security posture of an organization. It is critical for each individual and institute to learn hacking tools and techniques that are used by dangerous hackers in tandem with forming a team of ethical hacking professionals to test their systems effectively. Highlighting topics including cyber operations, server security, and network statistics, this publication is designed for technical experts, students, academicians, government officials, and industry professionals.
Описание: As IT professionals are depended upon to stay up-to-date on ever changing technology processes, they are essential in the functionality of an organisation. This presents research from the perspective of the information technology professional and illustrates the profession`s influence on enhancing the modern organisation.
Описание: As society continues to heavily rely on software and databases, the risks for cyberattacks have increased rapidly. As the dependence on computers has become gradually widespread throughout communities and governments, there is a need for cybersecurity programs that can assist in protecting sizeable networks and significant amounts of data at once. Implementing overarching security policies for software systems is integral to protecting community-wide data from harmful attacks.
Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) is an essential reference source that discusses methods in applying sustainable cybersecurity programs and policies within organizations, governments, and other communities. Featuring research on topics such as community engagement, incident planning methods, and information sharing, this book is ideally designed for cybersecurity professionals, security analysts, managers, researchers, policymakers, students, practitioners, and academicians seeking coverage on novel policies and programs in cybersecurity implementation.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru