HOME > 상세정보

상세정보

Losing the cybersecurity war : and what we can do to stop it / 1st ed

Losing the cybersecurity war : and what we can do to stop it / 1st ed (2회 대출)

자료유형
단행본
개인저자
King, Steve, (Cybersecurity expert). Chaudry, Kiren.
서명 / 저자사항
Losing the cybersecurity war : and what we can do to stop it / Steve King ; edited by Kiren Chaudry.
판사항
1st ed.
발행사항
Boca Raton :   CRC Press,   2023.  
형태사항
xxiii, 148 p. ; 24 cm.
ISBN
9781032363851 9781032364087
요약
"An explanation of the five pillars or battlefields of Cybersecurity and how a Zero Trust approach can change the advantage on each battlefield. Deep dive into each of five battlefields where we have a decided disadvantage due to constitutional structure and moral behavioural guidelines and examples of how we got here, and what we can do about it, and moreover why we got here and how we can avoid those traps in the future. A unique viewpoint that has never been explored - five battlefields include Economics, Technology, Information, Education and Leadership - and how each has contributed to our current disadvantage on the global stage - and how Zero Trust can change the game to an advantage for us going forward. The Zero Trust credibility is directly from the father of Zero Trust, John Kindervag who says "And now, Steve has written a new book on Zero Trust called : LOSING THE CYBERSECURITY WAR: Reversing the Attacker/Defender Dynamic on the Five Battlefields of Cybersecurity. It is undeniably the best Zero Trust book yet written. While other writers have focused on implementing Zero Trust from their perspectives, Steve focuses on why Zero Trust is so important on the modern cybersecurity battlefield. His concept of the five cyber battlefields is a great insight that will help us win the cyberwar. By weaving Zero Trust principles throughout these five concepts, Steve demonstrates how the ideas and efforts involved in building Zero Trust environments will lead to a profound shift in terrain advantage. No longer will attackers own the high ground. As defenders and protectors, we can leverage modern technology in a Zero Trust way to keep our data and assets safe from exfiltration and exploitation.""--Provided by publisher.
일반주제명
Computer networks --Security measures. Computer security. Computer crimes --Prevention. Trust. Authentication.
000 00000cam u2200205 a 4500
001 000046166800
005 20231214090121
008 231212s2023 flu 000 0 eng
010 ▼a 2022027026
020 ▼a 9781032363851 ▼q (hardback)
020 ▼a 9781032364087 ▼q (paperback)
020 ▼z 9781003331773 ▼q (ebook)
035 ▼a (KERIS)REF000020064483
040 ▼a DLC ▼b eng ▼e rda ▼c DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a TK5105.59 ▼b .K56 2023
082 0 0 ▼a 005.8 ▼2 23
084 ▼a 005.8 ▼2 DDCK
090 ▼a 005.8 ▼b K54L
100 1 ▼a King, Steve, ▼c (Cybersecurity expert).
245 1 0 ▼a Losing the cybersecurity war : ▼b and what we can do to stop it / ▼c Steve King ; edited by Kiren Chaudry.
250 ▼a 1st ed.
260 ▼a Boca Raton : ▼b CRC Press, ▼c 2023.
264 1 ▼a Boca Raton : ▼b CRC Press, ▼c 2023.
300 ▼a xxiii, 148 p. ; ▼c 24 cm.
336 ▼a text ▼b txt ▼2 rdacontent
337 ▼a unmediated ▼b n ▼2 rdamedia
338 ▼a volume ▼b nc ▼2 rdacarrier
520 ▼a "An explanation of the five pillars or battlefields of Cybersecurity and how a Zero Trust approach can change the advantage on each battlefield. Deep dive into each of five battlefields where we have a decided disadvantage due to constitutional structure and moral behavioural guidelines and examples of how we got here, and what we can do about it, and moreover why we got here and how we can avoid those traps in the future. A unique viewpoint that has never been explored - five battlefields include Economics, Technology, Information, Education and Leadership - and how each has contributed to our current disadvantage on the global stage - and how Zero Trust can change the game to an advantage for us going forward. The Zero Trust credibility is directly from the father of Zero Trust, John Kindervag who says "And now, Steve has written a new book on Zero Trust called : LOSING THE CYBERSECURITY WAR: Reversing the Attacker/Defender Dynamic on the Five Battlefields of Cybersecurity. It is undeniably the best Zero Trust book yet written. While other writers have focused on implementing Zero Trust from their perspectives, Steve focuses on why Zero Trust is so important on the modern cybersecurity battlefield. His concept of the five cyber battlefields is a great insight that will help us win the cyberwar. By weaving Zero Trust principles throughout these five concepts, Steve demonstrates how the ideas and efforts involved in building Zero Trust environments will lead to a profound shift in terrain advantage. No longer will attackers own the high ground. As defenders and protectors, we can leverage modern technology in a Zero Trust way to keep our data and assets safe from exfiltration and exploitation.""--Provided by publisher.
650 0 ▼a Computer networks ▼x Security measures.
650 0 ▼a Computer security.
650 0 ▼a Computer crimes ▼x Prevention.
650 0 ▼a Trust.
650 0 ▼a Authentication.
700 1 ▼a Chaudry, Kiren.
945 ▼a ITMT

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 K54L 등록번호 121265188 (2회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

This book explains the five pillars or battlefields of cybersecurity and how a Zero Trust approach can change the advantage on each battlefield. We have taken a deep dive into each of five battlefields where we have a decided disadvantage due to constitutional structure and moral behavioral guidelines, where we provide examples of how we got here, what we can do about it, why we got here, and how we can avoid these traps in the future. This is a unique viewpoint that has never been explored ? the five battlefields include Economics, Technology, Information, Education, and Leadership ? and how each has contributed to our current disadvantage on the global stage. We go on to discuss how Zero Trust can change the game to create an advantage for us going forward. The credibility of Zero Trust stems directly from the father of Zero Trust, John Kindervag, who says, “And now, Steve has written a new book on Zero Trust called Losing the Cybersecurity War: And What We Can Do to Stop It. It is undeniably the best Zero Trust book yet written. While other writers have focused on implementing Zero Trust from their perspectives, Steve focuses on why Zero Trust is so important on the modern cybersecurity battlefield. His concept of the five cyber battlefields is a great insight that will help us win the cyberwar. By weaving Zero Trust principles throughout these five concepts, Steve demonstrates how the ideas and efforts involved in building Zero Trust environments will lead to a profound shift in terrain advantage. No longer will attackers own the high ground. As defenders and protectors, we can leverage modern technology in a Zero Trust way to keep our data and assets safe from infiltration and exploitation.”



An explanation of the five pillars or battlefields of Cybersecurity and how a Zero Trust approach can change the advantage on each battlefield. The five battlefields include Economics, Technology, Information, Education and Leadership.




정보제공 : Aladin

목차

1. What is Zero Trust?.
2. The Five Battlefields of Cybersecurity.

3. The Impact of the Last 20 Years.

4. The Connected World.

5. Cybersecurity Problems are Hard Problems.

6. Advertising Our Vulnerabilities.

7. Why We Got Here.

8. The Institutionalization.

9. The End and The Beginning.

관련분야 신착자료

Harvard Business Review (2025)