Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM

Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM
Author :
Publisher : IGI Global
Total Pages : 260
Release :
ISBN-10 : 9781799841630
ISBN-13 : 1799841634
Rating : 4/5 (30 Downloads)

Book Synopsis Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM by : Sabillon, Regner

Download or read book Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM written by Sabillon, Regner and published by IGI Global. This book was released on 2020-08-07 with total page 260 pages. Available in PDF, EPUB and Kindle. Book excerpt: With the continued progression of technologies such as mobile computing and the internet of things (IoT), cybersecurity has swiftly risen to a prominent field of global interest. This has led to cyberattacks and cybercrime becoming much more sophisticated to a point where cybersecurity can no longer be the exclusive responsibility of an organization’s information technology (IT) unit. Cyber warfare is becoming a national issue and causing various governments to reevaluate the current defense strategies they have in place. Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM provides emerging research exploring the practical aspects of reassessing current cybersecurity measures within organizations and international governments and improving upon them using audit and awareness training models, specifically the Cybersecurity Audit Model (CSAM) and the Cybersecurity Awareness Training Model (CATRAM). The book presents multi-case studies on the development and validation of these models and frameworks and analyzes their implementation and ability to sustain and audit national cybersecurity strategies. Featuring coverage on a broad range of topics such as forensic analysis, digital evidence, and incident management, this book is ideally designed for researchers, developers, policymakers, government officials, strategists, security professionals, educators, security analysts, auditors, and students seeking current research on developing training models within cybersecurity management and awareness.


Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM Related Books

Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM
Language: en
Pages: 260
Authors: Sabillon, Regner
Categories: Computers
Type: BOOK - Published: 2020-08-07 - Publisher: IGI Global

DOWNLOAD EBOOK

With the continued progression of technologies such as mobile computing and the internet of things (IoT), cybersecurity has swiftly risen to a prominent field o
Research Anthology on Business Aspects of Cybersecurity
Language: en
Pages: 698
Authors: Management Association, Information Resources
Categories: Computers
Type: BOOK - Published: 2021-10-29 - Publisher: IGI Global

DOWNLOAD EBOOK

Cybersecurity is vital for all businesses, regardless of sector. With constant threats and potential online dangers, businesses must remain aware of the current
Research Anthology on Advancements in Cybersecurity Education
Language: en
Pages: 578
Authors: Management Association, Information Resources
Categories: Computers
Type: BOOK - Published: 2021-08-27 - Publisher: IGI Global

DOWNLOAD EBOOK

Modern society has become dependent on technology, allowing personal information to be input and used across a variety of personal and professional systems. Fro
Confluence of AI, Machine, and Deep Learning in Cyber Forensics
Language: en
Pages: 248
Authors: Misra, Sanjay
Categories: Law
Type: BOOK - Published: 2020-12-18 - Publisher: IGI Global

DOWNLOAD EBOOK

Developing a knowledge model helps to formalize the difficult task of analyzing crime incidents in addition to preserving and presenting the digital evidence fo
Using Computational Intelligence for the Dark Web and Illicit Behavior Detection
Language: en
Pages: 336
Authors: Rawat, Romil
Categories: Computers
Type: BOOK - Published: 2022-05-06 - Publisher: IGI Global

DOWNLOAD EBOOK

The Dark Web is a known hub that hosts myriad illegal activities behind the veil of anonymity for its users. For years now, law enforcement has been struggling