Cellular Communications - A Comprehensive and Prac

Effective Cybersecurity:

A Guide to Using Best Practices and Standards

by William Stallings

First Edition

ISBN-13: 978-0134772806

ISBN-10: 0134772806

 

Effective Cybersecurity:
A Guide to Using Best Practices and Standards

First Edition
by William Stallings

The changes in the protection, automation and control technology driven by the rapid developments of computers and communications bring significant benefits in the flexibility, efficiency and performance of PAC schemes. But this comes with a price - the threats of cyber-attacks that may lead to outages, local and wide area disturbances.
That is why it is important for the members of the PAC community to learn about the issues and the methods and tools that are available to provide some forms of intrusion detection and protection.

This book is a good place to start, because it takes care of a major issue for people like us ? the fact that there is a large number of organizations around the world that have developed standards and other documents describing best practices for evaluating and implementing cyber security.

The author of the book is Dr. William Stallings, who received his doctorate in computer science from Massachusetts Institute of Technology. He has written textbooks on computer science topics for more than 20 years. He has also worked as an executive with several high-technology firms and lately as an independent consultant. This experience makes him the perfect author for a book whose objective is to organize, summarize and explain all available material to make it possible for us to use.

The material in the book is presented in almost 800 pages divided in three parts.

  • Part I is Planning for Cybersecurity. Its three chapters provide guidelines for developing risk and security requirements that help define the cybersecurity mission of the organization.
  • The second part of the book focuses on Managing the cybersecurity function. It contains 13 chapters that cover a wide range of management, operational and technical means to enable the security controls required to meet the cybersecurity requirements.
  • The third part of the book covers topics related to security assessment.

It contains a single chapter that focuses on security monitoring and improvements. It describes techniques for auditing and monitoring the performance of cyber security controls.
The material of the book is presented in a very efficient way. Each chapter is structured with a clear technical overview, discussion of action items and appropriate policies.
The author provides lists of related keywords, defines clear learning objectives and review questions that help the reader with the understanding of the material. The references to the Information Security Forum?s document ?The Standard of Good Practice for Information Security,? and other documents from ISO, NIST, COBIT make the book a valuable tool for any PAC specialist with interest in cyber security.

Power. Flexible. Easergy.
BeijingSifang June 2016