𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Building an information security awareness program: defending against social engineering and technical threats

✍ Scribed by Gardner, Bill G.;Thomas, Valerie


Publisher
Elsevier Science;Elsevier;Syngress
Year
2014
Tongue
English
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Table of Contents


  1. What Is Security Awareness Training? 2. Why Does Your Organization Need a Security Awareness Program? 3. Getting Management Buy-In 4. Understanding Infosec Threats 5. Training Cycle 6. Training Types 7. Building Engaging Training 8. Metrics 9. Why Most Security Awareness Programs Fail 10. Current Debate on Security Awareness 11. The Security Awareness Training Framework (SATF)

✦ Subjects


Information storage and retrieval systems--Security measures;Occupational training;Online social networks--Security measures;Safety education;Situational awareness;Information storage and retrieval systems -- Security measures;Online social networks -- Security measures


πŸ“œ SIMILAR VOLUMES


Building an information security awarene
✍ Bill Gardner πŸ“‚ Library πŸ“… 2014 πŸ› Syngress Media Inc, Syngress, Elsevier Inc 🌐 English

<p>The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organizations staff of the risk and educate them on how to protect your organizations data. Social engineering is not a new tactic, but <i>Building an Security Awareness Progra

Building an Information Security Awarene
✍ Mark B. Desman πŸ“‚ Library πŸ“… 2001 🌐 English

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't kno

Managing an Information Security and Pri
✍ Rebecca Herold πŸ“‚ Library πŸ“… 2010 πŸ› CRC Press 🌐 English

<P>Starting with the inception of an education program and progressing through its development, implementation, delivery, and evaluation, <STRONG>Managing an Information Security and Privacy Awareness and Training Program, Second Edition</STRONG> provides authoritative coverage of nearly everything

Defending APIs against Cyber Attack: Lea
✍ Colin Domoney πŸ“‚ Library πŸ“… 2023 πŸ› Packt Publishing Ltd. 🌐 English

Along with the exponential growth of API adoption comes a rise in security concerns about their implementation and inherent vulnerabilities. For those seeking comprehensive insights into building, deploying, and managing APIs as the first line of cyber defense, this book offers invaluable guidance.

Social Engineering in Cybersecurity: Thr
✍ Gururaj H. L., Janhavi V., Ambika V. πŸ“‚ Library πŸ“… 2024 πŸ› CRC Press 🌐 English

Search Images Maps Play YouTube News Gmail Drive More Sign in Screen reader users: click this link for accessible mode. Accessible mode has the same essential features but works better with your reader. Books Get this book in printβ–Ό My library My History Social Engineering in Cybers