Cybersecurity for Information Professionals

Cybersecurity for Information Professionals

Author: Hsia-Ching Chang

Publisher: CRC Press

Published: 2020-06-28

Total Pages: 314

ISBN-13: 1000065766

DOWNLOAD EBOOK

Information professionals have been paying more attention and putting a greater focus on privacy over cybersecurity. However, the number of both cybersecurity and privacy breach incidents are soaring, which indicates that cybersecurity risks are high and growing. Utilizing cybersecurity awareness training in organizations has been an effective tool to promote a cybersecurity-conscious culture, making individuals more cybersecurity-conscious as well. However, it is unknown if employees’ security behavior at work can be extended to their security behavior at home and personal life. On the one hand, information professionals need to inherit their role as data and information gatekeepers to safeguard data and information assets. On the other hand, information professionals can aid in enabling effective information access and dissemination of cybersecurity knowledge to make users conscious about the cybersecurity and privacy risks that are often hidden in the cyber universe. Cybersecurity for Information Professionals: Concepts and Applications introduces fundamental concepts in cybersecurity and addresses some of the challenges faced by information professionals, librarians, archivists, record managers, students, and professionals in related disciplines. This book is written especially for educators preparing courses in information security, cybersecurity, and the integration of privacy and cybersecurity. The chapters contained in this book present multiple and diverse perspectives from professionals in the field of cybersecurity. They cover such topics as: Information governance and cybersecurity User privacy and security online and the role of information professionals Cybersecurity and social media Healthcare regulations, threats, and their impact on cybersecurity A socio-technical perspective on mobile cybersecurity Cybersecurity in the software development life cycle Data security and privacy Above all, the book addresses the ongoing challenges of cybersecurity. In particular, it explains how information professionals can contribute to long-term workforce development by designing and leading cybersecurity awareness campaigns or cybersecurity hygiene programs to change people’s security behavior.


Cybersecurity

Cybersecurity

Author: Joaquin Jay Gonzalez III

Publisher: McFarland

Published: 2019-02-05

Total Pages: 289

ISBN-13: 147667440X

DOWNLOAD EBOOK

Billions of people are connected through billions of devices across the globe. In the age of this massive internet, professional and personal information is being transmitted and received constantly, and while this access is convenient, it comes at a risk. This handbook of cybersecurity best practices is for public officials and citizens, employers and employees, corporations and consumers. Essays also address the development of state-of-the-art software systems and hardware for public and private organizations.


United States Code

United States Code

Author: United States

Publisher:

Published: 2013

Total Pages: 1552

ISBN-13:

DOWNLOAD EBOOK

"The United States Code is the official codification of the general and permanent laws of the United States of America. The Code was first published in 1926, and a new edition of the code has been published every six years since 1934. The 2012 edition of the Code incorporates laws enacted through the One Hundred Twelfth Congress, Second Session, the last of which was signed by the President on January 15, 2013. It does not include laws of the One Hundred Thirteenth Congress, First Session, enacted between January 2, 2013, the date it convened, and January 15, 2013. By statutory authority this edition may be cited "U.S.C. 2012 ed." As adopted in 1926, the Code established prima facie the general and permanent laws of the United States. The underlying statutes reprinted in the Code remained in effect and controlled over the Code in case of any discrepancy. In 1947, Congress began enacting individual titles of the Code into positive law. When a title is enacted into positive law, the underlying statutes are repealed and the title then becomes legal evidence of the law. Currently, 26 of the 51 titles in the Code have been so enacted. These are identified in the table of titles near the beginning of each volume. The Law Revision Counsel of the House of Representatives continues to prepare legislation pursuant to 2 U.S.C. 285b to enact the remainder of the Code, on a title-by-title basis, into positive law. The 2012 edition of the Code was prepared and published under the supervision of Ralph V. Seep, Law Revision Counsel. Grateful acknowledgment is made of the contributions by all who helped in this work, particularly the staffs of the Office of the Law Revision Counsel and the Government Printing Office"--Preface.


Critical Infrastructure Protection, Risk Management, and Resilience

Critical Infrastructure Protection, Risk Management, and Resilience

Author: Kelley A. Pesch-Cronin

Publisher: Taylor & Francis

Published: 2024-06-07

Total Pages: 304

ISBN-13: 104004624X

DOWNLOAD EBOOK

This second edition of Critical Infrastructure Protection, Risk Management, and Resilience continues to be an essential resource for understanding and protecting critical infrastructure across the U.S. Revised and thoroughly updated throughout, the textbook reflects and addresses the many changes that have occurred in critical infrastructure protection and risk management since the publication of the first edition. This new edition retains the book’s focus on understudied topics, while also continuing its unique, policy-based approach to topics, ensuring that material is presented in a neutral and unbiased manner. An accessible and up-to-date text, Critical Infrastructure Protection, Risk Management, and Resilience is a key textbook for upper-level undergraduate or graduate-level courses across Homeland Security, Critical Infrastructure, Cybersecurity, and Public Administration.


2018 CFR Title 3, The President e-Book

2018 CFR Title 3, The President e-Book

Author: Office of The Federal Register

Publisher: IntraWEB, LLC and Claitor's Law Publishing

Published: 2018-01-01

Total Pages: 607

ISBN-13:

DOWNLOAD EBOOK

This volume of ‘‘Title 3--The President’’ contains a compilation of Presidential documents and a codification of regulations issued by the Executive Office of the President. Including: Proclamations Executive Orders Other Presidential Documents Presidential Documents Affected During 2017 Statutes Cited as Authority for Presidential Documents


Code of Federal Regulations

Code of Federal Regulations

Author: United States. President

Publisher:

Published: 2017

Total Pages: 612

ISBN-13:

DOWNLOAD EBOOK

Special edition of the Federal Register, containing a codification of documents of general applicability and future effect ... with ancillaries.


Cyber Warfare

Cyber Warfare

Author: Paul J. Springer

Publisher: Bloomsbury Publishing USA

Published: 2020-07-08

Total Pages: 376

ISBN-13: 1440872791

DOWNLOAD EBOOK

Providing an invaluable introductory resource for students studying cyber warfare, this book highlights the evolution of cyber conflict in modern times through dozens of key primary source documents related to its development and implementation. This meticulously curated primary source collection is designed to offer a broad examination of key documents related to cyber warfare, covering the subject from multiple perspectives. The earliest documents date from the late 20th century, when the concept and possibility of cyber attacks became a reality, while the most recent documents are from 2019. Each document is accompanied by an introduction and analysis written by an expert in the field that provides the necessary context for readers to learn about the complexities of cyber warfare. The title's nearly 100 documents are drawn primarily but not exclusively from government sources and allow readers to understand how policy, strategy, doctrine, and tactics of cyber warfare are created and devised, particularly in the United States. Although the U.S. is the global leader in cyber capabilities and is largely driving the determination of norms within the cyber domain, the title additionally contains a small number of international documents. This invaluable work will serve as an excellent starting point for anyone seeking to understand the nature and character of international cyber warfare.


Digital Health

Digital Health

Author: Eric D. Perakslis

Publisher: Oxford University Press

Published: 2021-03-19

Total Pages: 304

ISBN-13: 0197503160

DOWNLOAD EBOOK

Digital health represents the fastest growing sector of healthcare. From internet-connected wearable sensors to diagnostics tests and disease treatments, it is often touted as the revolution set to solve the imperfections in healthcare delivery worldwide. While the health value of digital health technology includes greater convenience, more personalized treatments, and more accurate data capture of fitness and wellness, these devices also carry the concurrent risks of technological crime and abuses pervasive to cyber space. Even today, the medical world has been slow to respond to these emerging risks, despite the growing permanence of digital health technology within daily medical practice. With over 30 years of joint experience across the medical and cybersecurity industries, Eric D. Perakslis and Martin Stanley provide in this volume the first reference framework for the benefits and risks of digital health technologies in practice. Drawing on expert interviews, original research, and personal storytelling, they explore the theory, science, and mathematics behind the benefits, risks, and values of emerging digital technologies in healthcare. Moving from an overview of biomedical product regulation and the evolution of digital technologies in healthcare, Perakslis and Stanley propose from their research a set of ten categories of digital side effects, or "toxicities," that must be managed for digital health technology to realize its promise. These ten toxicities consist of adversary-driven threats to privacy such as physical security, cybersecurity, medical misinformation, and charlatanism, and non-adversary-driven threats such as deregulation, cyberchondria, over-diagnosis/over-treatment, user error, and financial toxicity. By arming readers with the knowledge to mitigate digital health harms, Digital Health empowers health practitioners, patients, and technology providers to move beyond fear of the unknown and embrace the full potential of digital health technology, paving the way for more conscientious digital technology use of the future.


Critical Perspectives on Cyberwarfare

Critical Perspectives on Cyberwarfare

Author: Jennifer Peters

Publisher: Enslow Publishing, LLC

Published: 2018-07-15

Total Pages: 226

ISBN-13: 0766098451

DOWNLOAD EBOOK

In the twenty-first century, political hostilities have moved largely from the battlefield to cyberspace. Since the Stuxnet virus was uncovered in 2010, built jointly by U.S. and Israeli intelligence to disarm the Iranian nuclear program, attention has been drawn to the real-life damage that such virtual programs can inflict. In this book, a range of experts, from journalists, to lawyers, to government officials, offer their varied opinions on the dawn of cyberwarfare, allowing readers to determine where they stand on this important issue.