Effective Cybersecurity Operations for Enterprise-Wide Systems

Effective Cybersecurity Operations for Enterprise-Wide Systems

Indexed In: SCOPUS
Release Date: June, 2023|Copyright: © 2023 |Pages: 328
DOI: 10.4018/978-1-6684-9018-1
ISBN13: 9781668490181|ISBN10: 1668490188|ISBN13 Softcover: 9781668490198|EISBN13: 9781668490204
Hardcover:
Available
$250.00
TOTAL SAVINGS: $250.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$250.00
TOTAL SAVINGS: $250.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$250.00
TOTAL SAVINGS: $250.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$250.00
TOTAL SAVINGS: $250.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$300.00
TOTAL SAVINGS: $300.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$300.00
TOTAL SAVINGS: $300.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Softcover:
Available
$190.00
TOTAL SAVINGS: $190.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Softcover:
Available
$190.00
TOTAL SAVINGS: $190.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Article Processing Charge:
Available
$2,550.00
TOTAL SAVINGS: $2,550.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

Cybersecurity, or information technology security (I/T security), is the protection of computer systems and networks from information disclosure; theft of or damage to their hardware, software, or electronic data; as well as from the disruption or misdirection of the services they provide. The field is becoming increasingly critical due to the continuously expanding reliance on computer systems, the internet, wireless network standards such as Bluetooth and Wi-Fi, and the growth of "smart" devices, which constitute the internet of things (IoT). Cybersecurity is also one of the significant challenges in the contemporary world, due to its complexity, both in terms of political usage and technology. Its primary goal is to ensure the dependability, integrity, and data privacy of enterprise-wide systems in an era of increasing cyberattacks from around the world.

Effective Cybersecurity Operations for Enterprise-Wide Systems examines current risks involved in the cybersecurity of various systems today from an enterprise-wide perspective. While there are multiple sources available on cybersecurity, many publications do not include an enterprise-wide perspective of the research. The book provides such a perspective from multiple sources that include investigation into critical business systems such as supply chain management, logistics, ERP, CRM, knowledge management, and others. Covering topics including cybersecurity in international business, risk management, artificial intelligence, social engineering, spyware, decision support systems, encryption, cyber-attacks and breaches, ethical hacking, transaction support systems, phishing, and data privacy, it is designed for educators, IT developers, education professionals, education administrators, researchers, security analysts, systems engineers, software security engineers, security professionals, policymakers, and students.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Artificial Intelligence
  • Careers in Cybersecurity
  • Cyber Attacks and Breaches
  • Cybersecurity in International Business
  • Data Privacy
  • Decision Support Systems
  • Emerging Computer Technologies
  • Encryption
  • Enterprise Resource Planning (ERP) Systems
  • Ethical Hacking
  • General Business Systems
  • Global Security
  • Phishing
  • Ransomware
  • Risk Management
  • Social Engineering
  • Spyware
  • Transaction Support Systems
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Festus Adedoyin is a Fellow of the Higher Education Academy and a Senior Lecturer at the Department of Computing and Informatics, Bournemouth University, U.K. Festus has led the Economics of Information Security unit since 2020, with current research interest is in the application of Machine and Deep Learning, and Econometrics tools to research stories in Energy and Tourism Economics as well as Finance and Digital Health.
Bryan Christiansen is an Adjunct Professor at Southern New Hampshire University where he teaches undergraduate business courses entirely online. Christiansen is also the Chief Executive Officer of the Utah-based management consultancy, IMPRUVE, LLC. He is fluent in Chinese, Japanese, and Spanish with extensive exposure to Russian and Turkish. Christiansen has given presentations on his field of expertise at numerous universities in Europe, the Middle East, and North America.
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.