Do No Harm. Matthew Webster

Чтение книги онлайн.

Читать онлайн книгу Do No Harm - Matthew Webster страница 2

Do No Harm - Matthew Webster

Скачать книгу

11: Internet Services Challenges Internet Services Internet-Related Services Challenges The Evolving Enterprise In Summary Notes Chapter 12: IT Hygiene and Cybersecurity The IoMT Blues The Drudgery of Patching Antivirus Is Enough, Right? Misconfigurations Galore In Summary Notes Chapter 13: Identity and Access Management Minimal Identity Practices Authentication Privileged Access Management Other I&AM Technologies In Summary Notes Chapter 14: Threat and Vulnerability Vulnerability Management Vulnerability Management Strategies Penetration Testing New Tools of an Old Trade In Summary Note Chapter 15: Data Protection Data Governance Data Loss Prevention Enterprise Encryption Data Tokenization In Summary Chapter 16: Incident Response and Forensics Defining the Context Incident Response In Summary Note Chapter 17: A Matter of Life, Death, and Data Organizational Structure Risk Management Mindset Challenges Decision-Making In Summary

      6  Part III: Looking Forward Chapter 18: Seeds of Change The Shifting Legal Landscape International Agreements Technology Innovation Leadership Shakeups In Summary Notes Chapter 19: Doing Less Harm What IoMT Manufacturers Can Do What Covered Entities Can Do Cybersecurity Innovators What You Can Do In Summary Notes Chapter 20: Changes We Need International Cooperation Covered Entities More IoMT Security Assurances In Summary Note

      7  Glossary

      8  Index

      9  Copyright

      10  Dedication

      11  About the Author

      12  Acknowledgments

      13  Preface

      14  End User License Agreement

      List of Tables

      1 Chapter 6Table 6-1: Relationship between IoT Violations and Privacy

      2 Chapter 14Table 14-1: CVSS v3.0 Ratings

      List of Illustrations

      1 Chapter 1Figure

Скачать книгу