40,20 €*
Versandkostenfrei per Post / DHL
Lieferzeit 1-2 Wochen
In The Code of Honor: Embracing Ethics in Cybersecurity, Ed Skoudis, president of [...] and Paul Maurer, president of Montreat College, deliver a comprehensive discussion of the ethical challenges facing contemporary workers, managers, and executives. This book explains and establishes ethical best practices for the tech industry. The need is so compelling that security practitioners and leaders around the world are currently incorporating this code into the fabric of their corporate culture and hiring policies.
You'll take a deep dive into many of the high-stakes situations commonly encountered. Compelling case studies--called Critical Applications in the book--included at the end of each chapter demonstrate how to use the hands-on skills being explored within.
You'll discover a complete system of cybersecurity ethics relevant to everyone from C-suite leaders and executives to ground-level cybersecurity pros. This carefully crafted framework of ethical decision-making in cybersecurity is rooted in timeless principles of ethics.
An essential resource for security analysts, incident responders, threat hunters, forensics experts, penetration testers, red teamers, security researchers, security architects, CISOs, and any other cybersecurity professional, The Code of Honor is timely and practical for the ever-increasing challenges that are rampant in the modern world of cybersecurity.
In The Code of Honor: Embracing Ethics in Cybersecurity, Ed Skoudis, president of [...] and Paul Maurer, president of Montreat College, deliver a comprehensive discussion of the ethical challenges facing contemporary workers, managers, and executives. This book explains and establishes ethical best practices for the tech industry. The need is so compelling that security practitioners and leaders around the world are currently incorporating this code into the fabric of their corporate culture and hiring policies.
You'll take a deep dive into many of the high-stakes situations commonly encountered. Compelling case studies--called Critical Applications in the book--included at the end of each chapter demonstrate how to use the hands-on skills being explored within.
You'll discover a complete system of cybersecurity ethics relevant to everyone from C-suite leaders and executives to ground-level cybersecurity pros. This carefully crafted framework of ethical decision-making in cybersecurity is rooted in timeless principles of ethics.
An essential resource for security analysts, incident responders, threat hunters, forensics experts, penetration testers, red teamers, security researchers, security architects, CISOs, and any other cybersecurity professional, The Code of Honor is timely and practical for the ever-increasing challenges that are rampant in the modern world of cybersecurity.
PAUL J. MAURER, PhD, is the president of Montreat College, a national leader in cybersecurity education and workforce development. After being approached by the NSA to create a curriculum on cybersecurity ethics for our nation's students preparing for cybersecurity careers, Paul was convinced this book needed to be written. He speaks and writes frequently on a wide range of topics, but regularly does so on cybersecurity across the country.
ED SKOUDIS serves as president of the SANS Technology Institute College, the country's leading provider of cybersecurity professional development. Ed began teaching at the SANS Institute in 1999 and has trained over 30,000 cybersecurity professionals in incident response and ethical hacking, codifying many of the practices used throughout the industry today. He is the recipient of the Order of Thor medal from the Military Cyber Professionals Association and is the author of Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses.
Introduction: "Like Your Hair Is On Fire" ix
Chapter 1 One Code to Rule Them All? 1
In Case You Are Wondering Why You Should Care 3
Do We Need Ethics in Cybersecurity? 6
Long-Standing Models for the Code 9
Why the Need for the Code Is Urgent 11
Chapter 2 This Is a Human Business 15
Cybersecurity Is a Human Business 18
Humans Have Inherent Value 20
Humans Over Technology 21
The Solution to the Problem of Cybersecurity Is Principally a Human Solution 24
Character Costs and Character Pays 25
Case Study: When Security Is on the Chopping Block 27
Chapter 3 To Serve and Protect 33
We Need You on That Wall 35
Know Your Why- Purpose and People 37
Service Means Sharing: Sharing Starts with Good Communication 42
Sharing with the Broader Cyber Community: We Are All on the Same Wall 44
Checking In 46
A Final Example 47
Case Study: Responsible Disclosure of a Security Flaw 48
Chapter 4 "Zero-Day" Humanity and Accountability 51
Bad Decisions and Multiplication 52
Humans Are Flawed 55
Turning Vulnerability into Strength: It Begins with Humility 56
Being a Lifelong Learner 60
Handling the Mistakes of Others 62
Let's Try to Avoid "Breaking Bad" 63
How to Develop a Reflective Practice 67
Case Study: To Pay or Not to Pay- A Ransomware Quandary 69
Chapter 5 It Begins and Ends with Trust 75
The Secret of Success 77
Trust Is the Currency of Cybersecurity 80
How Trust Is Built 82
When Things Go Bad 83
Building Trust Requires Courage 84
The Role of Leadership in Building a Culture of Trust 87
A Checklist for Building Trust 90
Case Study: A Matter of Trust and Data Breaches 93
Chapter 6 There Is Strength in the Pack 99
No Room for Know-it-Alls 103
Making Informed Ethical Decisions with Input 105
Why Teamwork Really Does Make the Dream Work 106
When Collaboration Breaks Down- Seeking Allies in Your Organization 110
The Power of Mentors 111
Beware of Rattlesnakes 115
Case Study: Graded on a Curve? The Security Audit Checkmark 117
Chapter 7 Practicing Cyber Kung Fu 123
Essential to Success: Patience, Wisdom, and Self-Control 128
Remember the Titanic 129
A Few Principles for Emergency Planning 131
Stay Calm, Cool, and Collected 132
Our Job Is Not Revenge 136
Develop Your Cyber Kung Fu 138
Case Study: An Open Door: Vigilante Justice 139
Chapter 8 No Sticky Fingers Allowed 143
If It's Free, It's for Me? 146
Avoid a "Robin Hood" Narrative 148
A Tragedy of "Free Information" 150
Intellectual Property Is Property 151
To Catch a Thief, We Must Train Like One 154
Choices Have Consequences 154
All I Really Need to Know I Learned in Kindergarten 156
Case Study: Something Borrowed and Something New 157
Chapter 9 It's None of Your Business 163
Curiosity Can Kill the Cat 167
The Golden Rule Applied to Cybersecurity 169
Stay in Your Lane 170
Four Questions to Help Avoid Impropriety 172
Each Time You Cross the Line, It Becomes Easier 173
We Hurt Real Human Beings 175
An Outrageous Example of the Problem 177
Remember: We Are the Shield 179
Case Study: To Share or Not to Share? Investigating the CFO's System 181
Appendix A: The Cybersecurity Code of Honor 185
Appendix B: Where Do We Go from Here? 189
Notes 191
Acknowledgments 193
About the Authors 197
Index 199
Erscheinungsjahr: | 2024 |
---|---|
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Buch |
Inhalt: | Einband - fest (Hardcover) |
ISBN-13: | 9781394275861 |
ISBN-10: | 1394275862 |
Sprache: | Englisch |
Einband: | Gebunden |
Autor: |
Maurer, Paul J
Skoudis, Ed |
Hersteller: | Wiley |
Maße: | 225 x 144 x 20 mm |
Von/Mit: | Paul J Maurer (u. a.) |
Erscheinungsdatum: | 18.06.2024 |
Gewicht: | 0,353 kg |
PAUL J. MAURER, PhD, is the president of Montreat College, a national leader in cybersecurity education and workforce development. After being approached by the NSA to create a curriculum on cybersecurity ethics for our nation's students preparing for cybersecurity careers, Paul was convinced this book needed to be written. He speaks and writes frequently on a wide range of topics, but regularly does so on cybersecurity across the country.
ED SKOUDIS serves as president of the SANS Technology Institute College, the country's leading provider of cybersecurity professional development. Ed began teaching at the SANS Institute in 1999 and has trained over 30,000 cybersecurity professionals in incident response and ethical hacking, codifying many of the practices used throughout the industry today. He is the recipient of the Order of Thor medal from the Military Cyber Professionals Association and is the author of Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses.
Introduction: "Like Your Hair Is On Fire" ix
Chapter 1 One Code to Rule Them All? 1
In Case You Are Wondering Why You Should Care 3
Do We Need Ethics in Cybersecurity? 6
Long-Standing Models for the Code 9
Why the Need for the Code Is Urgent 11
Chapter 2 This Is a Human Business 15
Cybersecurity Is a Human Business 18
Humans Have Inherent Value 20
Humans Over Technology 21
The Solution to the Problem of Cybersecurity Is Principally a Human Solution 24
Character Costs and Character Pays 25
Case Study: When Security Is on the Chopping Block 27
Chapter 3 To Serve and Protect 33
We Need You on That Wall 35
Know Your Why- Purpose and People 37
Service Means Sharing: Sharing Starts with Good Communication 42
Sharing with the Broader Cyber Community: We Are All on the Same Wall 44
Checking In 46
A Final Example 47
Case Study: Responsible Disclosure of a Security Flaw 48
Chapter 4 "Zero-Day" Humanity and Accountability 51
Bad Decisions and Multiplication 52
Humans Are Flawed 55
Turning Vulnerability into Strength: It Begins with Humility 56
Being a Lifelong Learner 60
Handling the Mistakes of Others 62
Let's Try to Avoid "Breaking Bad" 63
How to Develop a Reflective Practice 67
Case Study: To Pay or Not to Pay- A Ransomware Quandary 69
Chapter 5 It Begins and Ends with Trust 75
The Secret of Success 77
Trust Is the Currency of Cybersecurity 80
How Trust Is Built 82
When Things Go Bad 83
Building Trust Requires Courage 84
The Role of Leadership in Building a Culture of Trust 87
A Checklist for Building Trust 90
Case Study: A Matter of Trust and Data Breaches 93
Chapter 6 There Is Strength in the Pack 99
No Room for Know-it-Alls 103
Making Informed Ethical Decisions with Input 105
Why Teamwork Really Does Make the Dream Work 106
When Collaboration Breaks Down- Seeking Allies in Your Organization 110
The Power of Mentors 111
Beware of Rattlesnakes 115
Case Study: Graded on a Curve? The Security Audit Checkmark 117
Chapter 7 Practicing Cyber Kung Fu 123
Essential to Success: Patience, Wisdom, and Self-Control 128
Remember the Titanic 129
A Few Principles for Emergency Planning 131
Stay Calm, Cool, and Collected 132
Our Job Is Not Revenge 136
Develop Your Cyber Kung Fu 138
Case Study: An Open Door: Vigilante Justice 139
Chapter 8 No Sticky Fingers Allowed 143
If It's Free, It's for Me? 146
Avoid a "Robin Hood" Narrative 148
A Tragedy of "Free Information" 150
Intellectual Property Is Property 151
To Catch a Thief, We Must Train Like One 154
Choices Have Consequences 154
All I Really Need to Know I Learned in Kindergarten 156
Case Study: Something Borrowed and Something New 157
Chapter 9 It's None of Your Business 163
Curiosity Can Kill the Cat 167
The Golden Rule Applied to Cybersecurity 169
Stay in Your Lane 170
Four Questions to Help Avoid Impropriety 172
Each Time You Cross the Line, It Becomes Easier 173
We Hurt Real Human Beings 175
An Outrageous Example of the Problem 177
Remember: We Are the Shield 179
Case Study: To Share or Not to Share? Investigating the CFO's System 181
Appendix A: The Cybersecurity Code of Honor 185
Appendix B: Where Do We Go from Here? 189
Notes 191
Acknowledgments 193
About the Authors 197
Index 199
Erscheinungsjahr: | 2024 |
---|---|
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Buch |
Inhalt: | Einband - fest (Hardcover) |
ISBN-13: | 9781394275861 |
ISBN-10: | 1394275862 |
Sprache: | Englisch |
Einband: | Gebunden |
Autor: |
Maurer, Paul J
Skoudis, Ed |
Hersteller: | Wiley |
Maße: | 225 x 144 x 20 mm |
Von/Mit: | Paul J Maurer (u. a.) |
Erscheinungsdatum: | 18.06.2024 |
Gewicht: | 0,353 kg |