Skip navigation

Bookboon.com Download von kostenlosen eBooks für Studium und Beruf

Choose a category

The modern information environment

Educating the cyber operator – Part I

The modern information environment
Noch keine Beurteilung
ISBN: 978-87-403-2232-3
1. Auflage
Seiten : 62
  • Preis: 75,50 kr
  • Preis: €8,99
  • Preis: £8,99
  • Preis: ₹150
  • Preis: $8,99
  • Preis: 75,50 kr
  • Preis: 75,50 kr

KOSTENLOS downloaden in 4 einfachen Schritten...

Um unsere Bücher herunterzuladen oder Videos anzusehen, benötigen Sie einen Browser, der JavaScript zulässt.
Sind Sie daran interessiert, Neuigkeiten zu unseren KOSTENLOSEN eBooks und relevanten Bookboon-Updates zu erhalten?
Nachdem Sie Ihre Email angegeben haben, schicken wir Ihnen eine Bestätigungsmail. Durch Klicken auf den dort angezeigten Link erhalten Sie unseren Newsletter. Wir geben Ihre Daten nicht an eine Dritte weiter.
eLib
Entdecken Sie das Lernpotenzial Ihrer Organisation
Demo anschauen

Unternehmens-eLibrary

Unsere Business Lösung für Weiterbildung

Das ist ein Premium eBook

Bookboon Premium - Erhalten Sie Zugang zu über 800 eBooks - ohne Werbeanzeigen

Erhalten Sie kostenlosen Zugang für einen Monat - und 800 andere Bücher mit dem Premium Abo. Sie können das Buch auch einzeln kaufen

  • Kostenloses 30-Tage Probeabo. Dann 39,99 kr p. M.
  • Kostenloses 30-Tage Probeabo. Dann €5,99 p. M.
  • Kostenloses 30-Tage Probeabo. Dann £4,99 p. M.
  • Kostenloses 30-Tage Probeabo. Dann ₹299 p. M.
  • Kostenloses 30-Tage Probeabo. Dann $3,99 p. M.
  • Kostenloses 30-Tage Probeabo. Dann 39,99 kr p. M.
  • Kostenloses 30-Tage Probeabo. Dann 39,99 kr p. M.
eLib
Entdecken Sie das Lernpotenzial Ihrer Organisation
Hier klicken!

Unternehmens-eLibrary

Unsere Business Lösung für Weiterbildung

Über das Buch

  1. Bewertungen
  2. Beschreibung
  3. Inhalt

Bewertungen

Dan ★★★★★

A fast but comprehensive introduction into cyber security, giving insight into system classification, asset identification, cyber crime and profiling targets.

Beschreibung

This series will provide the reader with the technical and theoretical knowledge needed for undertaking different information operations with the focus being on penetration testing. In this book, I am setting the scene for the series, discussing information and its value, defining the information environment and its different domains, discussing crime and cyber criminals and finally, looking at a possible MO of a targeted attack. The by-product of the book is the argument that hacking is completely legal and that without hackers our society would have been at the mercy of criminals

About the author

Raised on the island of Mykonos, Greece. Moved to the UK in 1995. Undertook undergraduate and postgraduate studies in Wales, UK (BSc Computer Science, MSc Information Security and Computer Crime). Awarded a PhD in threat assessment in 2004. Experienced in all aspects of Information Operations with excellent understanding of the information security lifecycle. Created a number of spin-off companies. Orchestrated and formalised training on penetration testing and digital forensics for the British Armed Forces Intelligence Personnel. Mentored thousands of cyber operators and cyber security specialists since 2001. I advise and inform policy makers and write policy where and when required. Offering consultancy on Penetration Testing, Threat Assessment and Digital Forensics/Incident Response. Publishing technical work on Penetration testing, addressing professionals and practitioners in the wider field of cyber security.

Inhalt

  1. About the author
  2. What is this Book?
  3. What is Information?
    1. The evolution of computing
    2. Information
    3. Information Assets
    4. Value of an Information Asset
    5. The role of Information
    6. Chapter Conclusion
    7. Reflection Questions
  4. Information Environment
    1. Information and Information Environment
    2. Stakeholder Identification
    3. System Boundaries Identification
    4. Chapter Conclusion
    5. Reflection Questions
  5. Crime in the Physical and in the Cyber Domain
    1. Defining crime in information environments
    2. Levels & types of crime in information environments
    3. Cyber-Criminals?
    4. Hacking: is it legal?
    5. Chapter Conclusion
    6. Reflection Questions
  6. Profiling a target
    1. An Attack Methodology
    2. Intelligence Gathering
    3. Chapter Conclusion
    4. Reflection Questions
  7. Appendix A – TAME structure
  8. Appendix B – TAME Inputs
  9. Appendix C – TAME Outputs
  10. Appendix D – Asset Classification
  11. Appendix E – Process 5 (Asset identification & selection) I/O Diagram
  12. References

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with EU regulation.