Cybersecurity: Current Writings on Threats and Protection

Editors: Gonzales, III, Joaquin Jay and Kemp, Roger L.
Publication Year: 2019
Publisher: McFarland

Price: Core Collection Only
ISBN: 978-1-47-667440-7
Category: Technology & Engineering - Technology
Book Status: Available
Table of Contents

This handbook of cybersecurity best practices is for public officials and citizens, employers and employees, corporations and consumers. Essays also address the development of state-of-the-art software systems and hardware for public and private organizations.

Share this

Table of Contents

  • Acknowledgments
  • Preface
  • Part I. An Overview
  • 1. Government Employees Unaware They Are Cyber Crime Victims - Chelsea Binns
  • 2. Cybersecurity and America's Governments - Roger L. Kemp
  • 3. NACo Members Zero In on Cybersecurity, Tech Safety - Ariel Cohen
  • 4. Growing Impact of Cybercrime in Local Government - Gerald Cliff
  • 5. Cybersecurity: What's Your Risk? - International City/County Management Association
  • 6. Performance and Data Analytics: The Cincinnati Story - Harry Black
  • 7. The Digital Solution - Shaun Mulholland
  • 8. Digital Wallpapers Open Doors - Caitlin Cowart
  • 9. Personal Privacy Is Eroding as Consent Policies of Google and Facebook Evoke “Fantasy World” - Fred H. Cate
  • Part II. Threats and Risks
  • 10. IoT Is Changing the Cybersecurity Industry - Larry Karisny
  • 11. Equifax Breach Is a Reminder of Society's Larger Cybersecurity Problems - Richard Forno
  • 12. Cybersecurity: Protecting Court Data - Brian McLaughlin
  • 13. Health-Care Industry Increasingly Faces Cybersecurity Breaches - Margaret Steen
  • 14. It's in the Mail: Aetna Agrees to $17M Payout in HIV Privacy Breach - Elana Gordon
  • 15. Explainer: What Is Hacking? - James H. Hamlyn-Harris
  • 16. How the Chinese Cyberthreat Has Evolved - Dorothy Denning
  • 17. Now That Russia Has Apparently Hacked America's Grid, Shoring Up Security Is More Important Than Ever - Theodore J. Kury
  • 18. Ransomware Victims Urged to Report Infections to Federal Law Enforcement - Federal Bureau of Investigation
  • 19. Ransomware Attacks Illustrate the Vulnerabilities That Local Government Entities Face - Mary Scott Nabers
  • 20. Ransomware Attacks on the Rise in 2017 - Mary Ann Barton
  • 21. The Two Faces of Social Media - Martha Perego
  • 22. “Zero-Day” Stockpiling Puts Us All at Risk - Benjamin Dean
  • Part III. Prevention, Protection, Partnership: A. Practical Preventive Measures
  • 23. A Plan for Cybersecurity - Cory Fleming
  • 24. How We Can Each Fight Cybercrime with Smarter Habits - Arun Vishwanath
  • 25. Simple Steps to Online Safety - Alan Shark
  • 26. Staying Safe on Social Networking Sites - U.S. Computer Emergency Readiness Team
  • 27. Seven Keys to Strengthen Your Cybersecurity Culture - Daniel J. Lohrmann
  • 28. Three Tips for Forming a Computer Emergency Response Team - Kelsey Brewer
  • 29. Cybersecurity Strategies Governments Need - Gus “Ira” Hunt and Lalit Ahluwalia
  • 30. Security Pros Need a Mentor: Here's Why and How - Daniel J. Lohrmann
  • 31. Mecklenburg County Refuses to Pay Ransom to Cyber Hackers - Mary Ann Barton
  • 32. Fighting Fake News - Marcus Banks
  • 33. How Airplane Crash Investigations Can Improve Cybersecurity - Scott Shackelford
  • III. B. Technical Protections
  • 34. National Cybersecurity Workforce Framework - U.S. Department of Homeland Security
  • 35. Eliminating Network Blind Spots and Preventing Breaches - Reggie Best
  • 36. The Cloud and Enterprise Cybersecurity: Leveling the Playing Field - Microsoft
  • 37. Government Data in the Cloud: Provider and User Responsibilities - Subrata Chakrabarti
  • 38. Using Blockchain to Secure the “Internet of Things” - Nir Kshetri
  • 39. How to Protect Patrons’ Digital Privacy - Anne Ford
  • 40. Monitoring Employees’ Use of Company Computers and the Internet - Texas Workforce Commission
  • 41. Disaster Recovery for Technology: Best Practice - Government Finance Officers Association
  • III. C. Using Partnerships and Networks
  • 42. Cybersecurity Partnerships: Strength in Numbers - Susan Miller
  • 43. Intersector Briefing: Cross Sector Collaboration in Cybersecurity - Intersector Project
  • 44. Obama's Cybersecurity Initiative - Frank J. Cilluffo and Sharon L. Cardash
  • 45. New Trump Executive Order on Cybersecurity - Daniel J. Lohrmann
  • 46. Sharing of Cyber Threat Indicators and Defensive Measures by the Federal Government - Office of the Director of National Intelligence and Other Agencies
  • 47. Law Enforcement Partnerships Enhance Cybersecurity Investigations - Chelsea Binns
  • 48. States Rush to Cash in on Cybersecurity Boom - Elaine S. Povich
  • 49. How the National Guard is Protecting Cybersecurity - Colin Wood
  • 50. Cybersecurity and Local Governments in the United States - William Hatcher
  • Part IV. Future
  • 51. The Top 18 Security Predictions for 2018 - Daniel J. Lohrmann
  • 52. Artificial Intelligence Cyber Attacks Are Coming—But What Does That Mean? - Jeremy Straub
  • 53. FCC Group on 5G Deployment Short on Local Input - Mary Ann Barton
  • 54. Thinking Strategically in the Cyber Domain - John O'Brien
  • 55. Internet, E-Mail and Computer Use Policy - Texas Workforce Commission
  • 56. Consumers Who Froze Their Credit Reports - Julie Appleby
  • Appendix A. Glossary of Cybersecurity Terms - Joaquin Jay Gonzalez III
  • Appendix B. Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure
  • Appendix C. City and County of San Francisco Cybersecurity Policy
  • Appendix D. LaPorte County, Indiana, IT Computer Security Policy
  • About the Contributors
  • List of Names and Terms