Record Detail Back

XML

Transforming Cybersecurity: Using COBIT® 5


Cybersecurity, cybercrime and cyber warfare as key words have taken a prominent place in the world of security in general. This is partially due to technological evolution, and in large part to the growth in security breaches, criminal acts and the presence of information-based weapons of war. In this publication, any cybersecurity incidents, crimes or acts of war are treated simply as human acts or omissions. The myths and superstitions of the past—as exemplified by some literature from the 1990s—have been determined to be unfounded, and transforming cybersecurity is a management job just like any other security task.
The term “cyber” in the context of information security requires an explanation because it is often misunderstood and used too broadly. For the purposes of this publication, cybersecurity encompasses all that protects enterprises and individuals from intentional attacks, breaches and incidents as well as the consequences. In practice, cybersecurity addresses primarily those types of attack, breach or incident that are targeted, sophisticated and difficult to detect or manage. The much larger field of opportunistic attacks and crime usually can be dealt with using simple but effective strategies and tools. As a result, the focus of cybersecurity is on what has become known as advanced persistent threats (APTs), cyber warfare and their impact on enterprises and individuals.
Regardless of the common use of the term, cybersecurity should be aligned with
all other aspects of information security within the enterprise. This includes governance, management and assurance. In this sense, the overall notion of security is systemic rather than linear, acknowledging the idea of being secure as a transient state that requires maintenance and continuous improvement to meet the needs and requirements by stakeholders.

ISACA - Personal Name
1st Edtion
978-1-60420-342-4
NONE
Transforming Cybersecurity: Using COBIT® 5
Information Technology
English
ISACA
2013
USA
1-190
LOADING LIST...
LOADING LIST...