Limit search to available items
334 results found. Sorted by relevance | date | title .
Book Cover
E-book
Author Fagan, Peter

Title The Business of Cyber Why You Should Question What Your Security Team Are Telling You
Published Milton : Taylor & Francis Group, 2023

Copies

Description 1 online resource (279 p.)
Contents Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Preface -- References -- About the Author -- 1 The Current and Future State of Cyber -- The Current State of Cyber -- Some Statistics -- It's Complicated -- Industry Growth and Positioning -- The Growth of Cyber -- Measuring Success -- Systems Thinking -- Outcomes for the Customer -- Achieving Protection -- Where the Money Goes -- The Importance of Decision-Making -- The Role of the Customer in the Cyber Market -- Conclusion -- The Future of Cyber -- One Possible Future -- The Definition of Cybersecurity
An End in Itself Vs a Means to an End -- Conclusions -- Drivers for Change -- Internal Drivers for Change -- External Drivers for Change -- Conclusion -- Case Study: Market Redefinition -- Background -- Causes -- KnowBe4: Conclusion -- Case Study: Meeting Unmet Needs -- Competitive Advantage -- Use of Niche Marketing -- Conclusions -- Notes -- References -- 2 Security Culture Will Fix Things -- Introduction to Security Culture -- Context -- Reviewing the Evidence -- The Basis for Security Culture -- Reviewing the Theory -- Background -- A Digression On Questionnaires -- Culture and Nudging
Context -- Background -- Biases and Heuristics -- Examples of Security Nudging -- Application of Nudging -- Debiasing -- Background -- Reducing the Effects of Biases -- Theoretical Background -- Debiasing: Summary -- Boosts -- Background -- Theoretical Background -- Boosts: Summary -- The Ethics of Security -- Background -- Example: Personalised Nudging -- Implications -- A Modest Suggestion -- Security Culture: Conclusions -- Security Culture -- Alternatives -- References -- 3 If Only Users Would "Get It" -- Why Won't They Listen? -- Users... -- Communication -- Impact On Behaviours -- Conclusions
Example -- Applying Behavioural Science -- Encouraging Honesty -- Neutralisations -- Security Decision-Making -- Coming to Terms With Our Decisions -- The Role of Emotion -- Security Decisions -- Naming and Shaming -- Background -- I-frames Vs S-Frames -- Background -- Application -- Awareness Training: Conclusions -- The Current Situation -- A Different Approach -- References -- 4 Security = Confidentiality + Integrity + Availability -- The General Idea -- Background -- The Parkerian Hexad -- Missing Components -- The Importance of Context -- Security and Morality -- A Different Viewpoint
Security as a Social Construct -- Credit Card Fraud -- Cyber Insurance -- Other Examples -- Applying the Model -- Security as a Negotiation -- Complexity and Emergence -- Practical Issues -- Available Tools -- The Chances of Success -- Social Construction: Conclusions -- Systems Thinking -- Likely Developments -- References -- 5 Security Is Best Done With Numbers -- Marketing Context -- Security and Marketing -- Market Developments -- A Suggestion -- Risk as a Number -- Calculating Risk -- The Case Against Numbers -- An Alternative View -- Risk and Reward -- Risk as a Perception
Summary This book examines the cybersecurity phenomenon, looking at the folklore, the hype, and the behaviour of its practitioners. The content is strongly rooted in available research, presented in an accessible manner, with a number of business-related case studies
Notes Description based upon print version of record
Communicating Risk
Form Electronic book
ISBN 9781003845447
1003845444