Share
Cyber Security Auditing, Assurance, and Awareness Through Csam and Catram (Advances in Digital Crime, Forensics, and Cyber Terrorism) (in English)
Regner Sabillon (Author)
·
Information Science Reference
· Hardcover
Cyber Security Auditing, Assurance, and Awareness Through Csam and Catram (Advances in Digital Crime, Forensics, and Cyber Terrorism) (in English) - Regner Sabillon
$ 233.43
$ 291.79
You save: $ 58.36
Choose the list to add your product or create one New List
✓ Product added successfully to the Wishlist.
Go to My WishlistsIt will be shipped from our warehouse between
Monday, July 29 and
Tuesday, July 30.
You will receive it anywhere in United States between 1 and 3 business days after shipment.
Synopsis "Cyber Security Auditing, Assurance, and Awareness Through Csam and Catram (Advances in Digital Crime, Forensics, and Cyber Terrorism) (in English)"
With the continued progression of technologies such as mobile computing and the internet of things (IoT), cybersecurity has swiftly risen to a prominent field of global interest. This has led to cyberattacks and cybercrime becoming much more sophisticated to a point where cybersecurity can no longer be the exclusive responsibility of an organization's information technology (IT) unit. Cyber warfare is becoming a national issue and causing various governments to reevaluate the current defense strategies they have in place. Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM provides emerging research exploring the practical aspects of reassessing current cybersecurity measures within organizations and international governments and improving upon them using audit and awareness training models, specifically the Cybersecurity Audit Model (CSAM) and the Cybersecurity Awareness Training Model (CATRAM). The book presents multi-case studies on the development and validation of these models and frameworks and analyzes their implementation and ability to sustain and audit national cybersecurity strategies. Featuring coverage on a broad range of topics such as forensic analysis, digital evidence, and incident management, this book is ideally designed for researchers, developers, policymakers, government officials, strategists, security professionals, educators, security analysts, auditors, and students seeking current research on developing training models within cybersecurity management and awareness.