000 02218cam a2200313 i 4500
005 20240117114546.0
008 200216s2019 xxua g b 001 0 eng d
020 _a9781119490937 (hardcover)
020 _z
020 _z
040 _aUISEK-EC
_bspa
_erda
082 0 4 _a005.8
_b C658s 2019
100 1 _aCoburn, Andrew
_95685
_eaut
245 1 0 _aSolving cyber risk :
_bprotecting your company and society /
_cAndrew Coburn, Eireann Leverett, Gordon Woo.
264 1 _aHoboken, New Jersey :
_bWiley,
_c2019
300 _axii, 387 páginas :
_bilustraciones ;
_c24 cm.
336 _atxt
337 _2rdamedia
_an
338 _2rdacarrier
_anc
490 0 _aWiley finance series
504 _aIncluye bibliografía y referencias
505 _aCounting the Costs of Cyber Attacks - Anatomy of a Data Exfiltration Attack - A Modern Scourge - Cyber Catastrophes - Preparing for Cyber Attacks - Cyber Loss Processes - Data Exfiltration - Contagious Malware Infection - Denial of Service Attacks - Cyber Enters the Physical World - A Brief History of Cyber-physical Interactions - Hacking Attacks on Cyber-physical Systems - Components of Cyber-physical Systems - How to Subvert Cyber-physical Systems - Ghosts in the Code - All Software Has Errors - Vulnerabilities, Exploits, and Zero Days - Counting Vulnerabilities - Know Your Enemy - Hackers - Taxonomy of Threat Actors - The Insider Threat - Threat Actors and Cyber Risk - Measuring the Cyber Threat - Measurement and Management - Cyber Threat Metrics - Rules, Regulations, and Law Enforcement - Cyber Laws - The Cyber-Resilient Organization - Changing Approaches to Risk Management - Cyber Insurance - Security Economics and Strategies - Ten Cyber Problems - Setting Problems - The Canal Safety Decision Problem - The Software Dependency Problem - Cyber Future - Cybergeddon - Cybertopia - Future Technology Trends - Getting the Cyber Risk Future We Want .
526 _aM. de Ciberseguridad
650 1 0 _aSeguridad informática
_2lemb
_94682
650 2 0 _aProtección de datos
_911277
700 1 _aLeverett, Eireann,
_d1975-
_98855
_eaut
700 1 _aWoo, Gordon
_98856
_eaut
942 _cBK
999 _c10549
_d10549