Cyber Security(English, Paperback, Meetali Handa)
Quick Overview
Product Price Comparison
Improving risk management relies on using rigorous definitions of what infrastructure is 'critical', which enables more effective prioritization and protection of nodes and connection points. In this context, the ever-rising importance of data makes distinctions between 'physical' and 'information' infrastructure increasingly irrelevant.Meeting these security challenges requires better-shared understanding of what is critical between those who protect an organisation and those who set its strategic direction. Better understanding of the economic and political incentives that guide stakeholders also reveals the scope for potential cooperation. Surveying the landscape of cyberspace on a global level, one cannot help but be struck that we are at a watershed moment. Major social forces are converging that threaten to subvert cyberspace’s core characteristics as an open distributed network, including growing assertions of state power, interstate competition, espionage, crime and warfare. Governments with more territorialized visions of cyberspace controls are imposing those visions in international bodies and drawing growing networks of support for their vision. There is a large market for technologies, products, and services that facilitate censorship, surveillance and information warfare.