Cybersecurity: Current Writings on Threats and Protection
Cybersecurity: Current Writings on Threats and Protection
Editors: Gonzales, III, Joaquin Jay and Kemp, Roger L.
Publication Year: 2019
Publisher: McFarland
Price: Core Collection Only

ISBN: 978-1-47-667440-7
Category: Technology & Engineering - Technology
Book Status: Available
Table of Contents
This handbook of cybersecurity best practices is for public officials and citizens, employers and employees, corporations and consumers. Essays also address the development of state-of-the-art software systems and hardware for public and private organizations.
This book is found in the following Credo Collections:
Table of Contents
- Acknowledgments
- Preface
- Part I. An Overview
- 1. Government Employees Unaware They Are Cyber Crime Victims - Chelsea Binns
- 2. Cybersecurity and America's Governments - Roger L. Kemp
- 3. NACo Members Zero In on Cybersecurity, Tech Safety - Ariel Cohen
- 4. Growing Impact of Cybercrime in Local Government - Gerald Cliff
- 5. Cybersecurity: What's Your Risk? - International City/County Management Association
- 6. Performance and Data Analytics: The Cincinnati Story - Harry Black
- 7. The Digital Solution - Shaun Mulholland
- 8. Digital Wallpapers Open Doors - Caitlin Cowart
- 9. Personal Privacy Is Eroding as Consent Policies of Google and Facebook Evoke “Fantasy World” - Fred H. Cate
- Part II. Threats and Risks
- 10. IoT Is Changing the Cybersecurity Industry - Larry Karisny
- 11. Equifax Breach Is a Reminder of Society's Larger Cybersecurity Problems - Richard Forno
- 12. Cybersecurity: Protecting Court Data - Brian McLaughlin
- 13. Health-Care Industry Increasingly Faces Cybersecurity Breaches - Margaret Steen
- 14. It's in the Mail: Aetna Agrees to $17M Payout in HIV Privacy Breach - Elana Gordon
- 15. Explainer: What Is Hacking? - James H. Hamlyn-Harris
- 16. How the Chinese Cyberthreat Has Evolved - Dorothy Denning
- 17. Now That Russia Has Apparently Hacked America's Grid, Shoring Up Security Is More Important Than Ever - Theodore J. Kury
- 18. Ransomware Victims Urged to Report Infections to Federal Law Enforcement - Federal Bureau of Investigation
- 19. Ransomware Attacks Illustrate the Vulnerabilities That Local Government Entities Face - Mary Scott Nabers
- 20. Ransomware Attacks on the Rise in 2017 - Mary Ann Barton
- 21. The Two Faces of Social Media - Martha Perego
- 22. “Zero-Day” Stockpiling Puts Us All at Risk - Benjamin Dean
- Part III. Prevention, Protection, Partnership: A. Practical Preventive Measures
- 23. A Plan for Cybersecurity - Cory Fleming
- 24. How We Can Each Fight Cybercrime with Smarter Habits - Arun Vishwanath
- 25. Simple Steps to Online Safety - Alan Shark
- 26. Staying Safe on Social Networking Sites - U.S. Computer Emergency Readiness Team
- 27. Seven Keys to Strengthen Your Cybersecurity Culture - Daniel J. Lohrmann
- 28. Three Tips for Forming a Computer Emergency Response Team - Kelsey Brewer
- 29. Cybersecurity Strategies Governments Need - Gus “Ira” Hunt and Lalit Ahluwalia
- 30. Security Pros Need a Mentor: Here's Why and How - Daniel J. Lohrmann
- 31. Mecklenburg County Refuses to Pay Ransom to Cyber Hackers - Mary Ann Barton
- 32. Fighting Fake News - Marcus Banks
- 33. How Airplane Crash Investigations Can Improve Cybersecurity - Scott Shackelford
- III. B. Technical Protections
- 34. National Cybersecurity Workforce Framework - U.S. Department of Homeland Security
- 35. Eliminating Network Blind Spots and Preventing Breaches - Reggie Best
- 36. The Cloud and Enterprise Cybersecurity: Leveling the Playing Field - Microsoft
- 37. Government Data in the Cloud: Provider and User Responsibilities - Subrata Chakrabarti
- 38. Using Blockchain to Secure the “Internet of Things” - Nir Kshetri
- 39. How to Protect Patrons’ Digital Privacy - Anne Ford
- 40. Monitoring Employees’ Use of Company Computers and the Internet - Texas Workforce Commission
- 41. Disaster Recovery for Technology: Best Practice - Government Finance Officers Association
- III. C. Using Partnerships and Networks
- 42. Cybersecurity Partnerships: Strength in Numbers - Susan Miller
- 43. Intersector Briefing: Cross Sector Collaboration in Cybersecurity - Intersector Project
- 44. Obama's Cybersecurity Initiative - Frank J. Cilluffo and Sharon L. Cardash
- 45. New Trump Executive Order on Cybersecurity - Daniel J. Lohrmann
- 46. Sharing of Cyber Threat Indicators and Defensive Measures by the Federal Government - Office of the Director of National Intelligence and Other Agencies
- 47. Law Enforcement Partnerships Enhance Cybersecurity Investigations - Chelsea Binns
- 48. States Rush to Cash in on Cybersecurity Boom - Elaine S. Povich
- 49. How the National Guard is Protecting Cybersecurity - Colin Wood
- 50. Cybersecurity and Local Governments in the United States - William Hatcher
- Part IV. Future
- 51. The Top 18 Security Predictions for 2018 - Daniel J. Lohrmann
- 52. Artificial Intelligence Cyber Attacks Are Coming—But What Does That Mean? - Jeremy Straub
- 53. FCC Group on 5G Deployment Short on Local Input - Mary Ann Barton
- 54. Thinking Strategically in the Cyber Domain - John O'Brien
- 55. Internet, E-Mail and Computer Use Policy - Texas Workforce Commission
- 56. Consumers Who Froze Their Credit Reports - Julie Appleby
- Appendix A. Glossary of Cybersecurity Terms - Joaquin Jay Gonzalez III
- Appendix B. Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure
- Appendix C. City and County of San Francisco Cybersecurity Policy
- Appendix D. LaPorte County, Indiana, IT Computer Security Policy
- About the Contributors
- List of Names and Terms