Details

Solving Cyber Risk


Solving Cyber Risk

Protecting Your Company and Society
1. Aufl.

von: Andrew Coburn, Eireann Leverett, Gordon Woo

32,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 14.12.2018
ISBN/EAN: 9781119490920
Sprache: englisch
Anzahl Seiten: 384

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>The non-technical handbook for cyber security risk management</b></p> <p><i>Solving Cyber Risk</i> distills a decade of research into a practical framework for cyber security. Blending statistical data and cost information with research into the culture, psychology, and business models of the hacker community, this book provides business executives, policy-makers, and individuals with a deeper understanding of existing future threats, and an action plan for safeguarding their organizations. Key Risk Indicators reveal vulnerabilities based on organization type, IT infrastructure and existing security measures, while expert discussion from leading cyber risk specialists details practical, real-world methods of risk reduction and mitigation.<br /><br />By the nature of the business, your organization’s customer database is packed with highly sensitive information that is essentially hacker-bait, and even a minor flaw in security protocol could spell disaster. This book takes you deep into the cyber threat landscape to show you how to keep your data secure.</p> <ul> <li>Understand who is carrying out cyber-attacks, and why</li> <li>Identify your organization’s risk of attack and vulnerability to damage</li> <li>Learn the most cost-effective risk reduction measures</li> <li>Adopt a new cyber risk assessment and quantification framework based on techniques used by the insurance industry</li> </ul> <p>By applying risk management principles to cyber security, non-technical leadership gains a greater understanding of the types of threat, level of threat, and level of investment needed to fortify the organization against attack. Just because you have not been hit does not mean your data is safe, and hackers rely on their targets’ complacence to help maximize their haul. <i>Solving Cyber Risk</i> gives you a concrete action plan for implementing top-notch preventative measures before you’re forced to implement damage control.</p>
<p>About the Authors ix</p> <p>Acknowledgments xi</p> <p><b>CHAPTER 1 Counting the Costs of Cyber Attacks 1</b></p> <p>1.1 Anatomy of a Data Exfiltration Attack 1</p> <p>1.2 A Modern Scourge 7</p> <p>1.3 Cyber Catastrophes 12</p> <p>1.4 Societal Cyber Threats 19</p> <p>1.5 Cyber Risk 21</p> <p>1.6 How Much Does Cyber Risk Cost Our Society? 24</p> <p>Endnotes 30</p> <p><b>CHAPTER 2 Preparing for Cyber Attacks 33</b></p> <p>2.1 Cyber Loss Processes 33</p> <p>2.2 Data Exfiltration 34</p> <p>2.3 Contagious Malware Infection 41</p> <p>2.4 Denial of Service Attacks 56</p> <p>2.5 Financial Theft 63</p> <p>2.6 Failures of Counterparties or Suppliers 68</p> <p>Endnotes 78</p> <p><b>CHAPTER 3 Cyber Enters the Physical World 81</b></p> <p>3.1 A Brief History of Cyber-physical Interactions 81</p> <p>3.2 Hacking Attacks on Cyber-physical Systems 83</p> <p>3.3 Components of Cyber-physical Systems 86</p> <p>3.4 How to Subvert Cyber-physical Systems 88</p> <p>3.5 How to Cause Damage Remotely 91</p> <p>3.6 Using Compromises to Take Control 92</p> <p>3.7 Operating Compromised Systems 93</p> <p>3.8 Expect the Unexpected 95</p> <p>3.9 Smart Devices and the Internet of Things 99</p> <p>Endnotes 101</p> <p><b>CHAPTER 4 Ghosts in the Code 103</b></p> <p>4.1 All Software Has Errors 103</p> <p>4.2 Vulnerabilities, Exploits, and Zero Days 104</p> <p>4.3 Counting Vulnerabilities 108</p> <p>4.4 Vulnerability Management 113</p> <p>4.5 International Cyber Response and Defense 118</p> <p>Endnotes 122</p> <p><b>CHAPTER 5 Know Your Enemy 125</b></p> <p>5.1 Hackers 125</p> <p>5.2 Taxonomy of Threat Actors 127</p> <p>5.3 The Insider Threat 143</p> <p>5.4 Threat Actors and Cyber Risk 145</p> <p>5.5 Hackonomics 147</p> <p>Endnotes 151</p> <p><b>CHAPTER 6 Measuring the Cyber Threat 153</b></p> <p>6.1 Measurement and Management 153</p> <p>6.2 Cyber Threat Metrics 158</p> <p>6.3 Measuring the Threat for an Organization 162</p> <p>6.4 The Likelihood of Major Cyber Attacks 170</p> <p>Endnotes 182</p> <p><b>CHAPTER 7 Rules, Regulations, and Law Enforcement 183</b></p> <p>7.1 Cyber Laws 183</p> <p>7.2 US Cyber Laws 186</p> <p>7.3 EU General Data Protection Regulation (GDPR) 190</p> <p>7.4 Regulation of Cyber Insurance 192</p> <p>7.5 A Changing Legal Landscape 194</p> <p>7.6 Compliance and Law Enforcement 196</p> <p>7.7 Law Enforcement and Cyber Crime 199</p> <p>Endnotes 205</p> <p><b>CHAPTER 8 The Cyber-Resilient Organization 207</b></p> <p>8.1 Changing Approaches to Risk Management 207</p> <p>8.2 Incident Response and Crisis Management 208</p> <p>8.3 Resilience Engineering 212</p> <p>8.4 Attributes of a Cyber-resilient Organization 214</p> <p>8.5 Incident Response Planning 218</p> <p>8.6 Resilient Security Solutions 219</p> <p>8.7 Financial Resilience 225</p> <p>Endnotes 234</p> <p><b>CHAPTER 9 Cyber Insurance 235</b></p> <p>9.1 Buying Cyber Insurance 235</p> <p>9.2 The Cyber Insurance Market 244</p> <p>9.3 Cyber Catastrophe Risk 248</p> <p>9.4 Managing Portfolios of Cyber Insurance 251</p> <p>9.5 Cyber Insurance Underwriting 258</p> <p>9.6 Cyber Insurance and Risk Management 263</p> <p>Endnotes 264</p> <p><b>CHAPTER 10 Security Economics and Strategies 267</b></p> <p>10.1 Cost-Effectiveness of Security Enhancements 267</p> <p>10.2 Cyber Security Budgets 271</p> <p>10.3 Security Strategies for Society 276</p> <p>10.4 Strategies of Cyber Attack 283</p> <p>10.5 Strategies of National Cyber Defense 289</p> <p>Endnotes 294</p> <p><b>CHAPTER 11 Ten Cyber Problems 295</b></p> <p>11.1 Setting Problems 295</p> <p>1 The Canal Safety Decision Problem 298</p> <p>2 The Software Dependency Problem 300</p> <p>3 The Vulnerability Inheritance Problem 301</p> <p>4 The Vulnerability Count Problem 302</p> <p>5 The Malware Overlap Problem 303</p> <p>6 The Vulnerability Lifespan Problem 304</p> <p>7 The Binary Similarity Problem 304</p> <p>8 The Virus Modification Problem 306</p> <p>9 The Cyber Criminal’s Dilemma Problem 306</p> <p>10 The Security Verification Problem 307</p> <p>Endnotes 308</p> <p><b>CHAPTER 12 Cyber Future 309</b></p> <p>12.1 Cybergeddon 309</p> <p>12.2 Cybertopia 315</p> <p>12.3 Future Technology Trends 321</p> <p>12.4 Getting the Cyber Risk Future We Want 328</p> <p>Endnotes 331</p> <p>References 333</p> <p>Index 355</p>
<p><b>ANDREW COBURN</b> is senior vice president at Risk Management Solutions (RMS) and a director of the Cambridge Centre for Risk Studies, University of Cambridge. The architect of the leading cyber risk model in the insurance industry, he is coauthor of <i>Earthquake Protection, Second Edition.</i> <p><b>ÉIREANN LEVERETT</b> is the founder of Concinnity Risks and a senior researcher on cyber risk at Cambridge Centre for Risk Studies. An ethical hacker, he was on the multidisciplinary team that built the first cyber risk models for insurance. <p><b>GORDON WOO</b> is a catastrophist with RMS who helped create the conceptual framework for the RMS Cyber Accumulation Management System. An authority on cyber and insurance risk, he is the author of <i>The Mathematics of Natural Catastrophes</i> and<i> Calculating Catastrophe.</i>
<p><b>THE ONE BOOK HACKERS DON'T WANT YOU TO READ</b> <p><i>Solving Cyber Risk</i> enables you to accurately assess cyber risk at your organization <i>and</i> develop a cost-appropriate plan for top- tier cybersecurity. From the leading-edge minds behind the most popular cyber risk model in the insurance industry, this authoritative work shares the wisdom mined from a decade's worth of research into the culture, psychology, and profit models of hackers. <p>Through a powerful, scalable framework, any size organization can effectively manage the likelihood and consequences of cyber attacks within any size budget. Step-by-step guidance to data-backed approaches and techniques empower you to: <ul> <li>Measure and assess the five most expensive and damaging causes of cyber loss</li> <li>Understand the motivations, capabilities, and techniques behind the seven most common types of hackers</li> <li>Apply the same due diligence and expertise to defending against cyber attacks as the best in the business</li> </ul> <p>Whether you need to update your cyber risk protocols or create a cutting-edge security plan from scratch, <i>Solving Cyber Risk</i> is your complete blueprint to protecting your digital assets from criminals.
“<i>Solving Cyber Risk</i> brings a technical subject to life using entertaining and poignant parallels to historical warfare. It also makes a compelling argument for the use of counterfactual analysis of past cyber events, to help us protect the digital economy from the cyber aggressors of the future.  The authors make the case for cyber resilience and give business leaders practical advice to embed cyber-aware culture in their organisation.”<br /><b>-Domenico del Re</b>, Director, PricewaterhouseCoopers<br /><br />“Before we can begin to address the serious risks that accompany the modern world's increasing dependence on networked computer systems we have to understand them, and this is the key achievement of <i>Solving Cyber Risk</i>. Anyone reading the book will come away better able to assess, quantify, and reduce the risks faced by their business.”<br /><b>-Bill Thompson</b>, Technology writer and BBC presenter<br /><br />“Is your organisation cyber-resilient? Are your services? Are you? Starting from practical assessments of how a security breach could damage the organisation, this comprehensive review of the current risk landscape will tell you why it matters, how to assess your own performance, and how to improve it.”<br /><b>-Andrew Cormack</b>, Former Computer Security Incident Response Team (CSIRT) manager<br /><br />"The essential handbook for anyone that wants to understand the cyber risks facing their business.  The authors draw on decades of experience in cyber, insurance and modelling to provide the essential context for the range of potential threats and losses, today and in the future, providing real life case studies and practical advice for assessing and managing the risks.”<b><br />-Matthew Grant</b>, Founder and Executive Director, Abernite Ltd.<br /><br />"Whoever feels overwhelmed by the sheer amount of unsorted information - around cyber risk, the uncertainties of managing this risk and its questioned insurability (which I do not share) - should read this book. It helps to ringfence the key issues by classifying, weighting and prioritizing cyber related decisions. It is good for IT security professionals to get familiar with risk management framework and it is equally helpful for risk management professionals to break down the complexity of 'cyber' and focus on the essentials."<br /><b>-Simon Dejung</b>, Senior Underwriter, SCOR

Diese Produkte könnten Sie auch interessieren:

Mindfulness
Mindfulness
von: Gill Hasson
PDF ebook
12,99 €
Counterparty Credit Risk, Collateral and Funding
Counterparty Credit Risk, Collateral and Funding
von: Damiano Brigo, Massimo Morini, Andrea Pallavicini
EPUB ebook
69,99 €