Zum Hauptinhalt springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
The Code of Honor
Embracing Ethics in Cybersecurity
Buch von Paul J Maurer (u. a.)
Sprache: Englisch

40,20 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Lieferzeit 1-2 Wochen

Kategorien:
Beschreibung
Many professions--including medicine, law, and engineering--have long required their practitioners to embrace and abide by an overarching code of ethics and conduct. Cybersecurity, possibly due to its more fragmented and distributed nature, has never had such a code. The gap left by the absence of an ethical standard is a significant threat to the safety of consumers and businesses around the world.

In The Code of Honor: Embracing Ethics in Cybersecurity, Ed Skoudis, president of [...] and Paul Maurer, president of Montreat College, deliver a comprehensive discussion of the ethical challenges facing contemporary workers, managers, and executives. This book explains and establishes ethical best practices for the tech industry. The need is so compelling that security practitioners and leaders around the world are currently incorporating this code into the fabric of their corporate culture and hiring policies.

You'll take a deep dive into many of the high-stakes situations commonly encountered. Compelling case studies--called Critical Applications in the book--included at the end of each chapter demonstrate how to use the hands-on skills being explored within.

You'll discover a complete system of cybersecurity ethics relevant to everyone from C-suite leaders and executives to ground-level cybersecurity pros. This carefully crafted framework of ethical decision-making in cybersecurity is rooted in timeless principles of ethics.

An essential resource for security analysts, incident responders, threat hunters, forensics experts, penetration testers, red teamers, security researchers, security architects, CISOs, and any other cybersecurity professional, The Code of Honor is timely and practical for the ever-increasing challenges that are rampant in the modern world of cybersecurity.
Many professions--including medicine, law, and engineering--have long required their practitioners to embrace and abide by an overarching code of ethics and conduct. Cybersecurity, possibly due to its more fragmented and distributed nature, has never had such a code. The gap left by the absence of an ethical standard is a significant threat to the safety of consumers and businesses around the world.

In The Code of Honor: Embracing Ethics in Cybersecurity, Ed Skoudis, president of [...] and Paul Maurer, president of Montreat College, deliver a comprehensive discussion of the ethical challenges facing contemporary workers, managers, and executives. This book explains and establishes ethical best practices for the tech industry. The need is so compelling that security practitioners and leaders around the world are currently incorporating this code into the fabric of their corporate culture and hiring policies.

You'll take a deep dive into many of the high-stakes situations commonly encountered. Compelling case studies--called Critical Applications in the book--included at the end of each chapter demonstrate how to use the hands-on skills being explored within.

You'll discover a complete system of cybersecurity ethics relevant to everyone from C-suite leaders and executives to ground-level cybersecurity pros. This carefully crafted framework of ethical decision-making in cybersecurity is rooted in timeless principles of ethics.

An essential resource for security analysts, incident responders, threat hunters, forensics experts, penetration testers, red teamers, security researchers, security architects, CISOs, and any other cybersecurity professional, The Code of Honor is timely and practical for the ever-increasing challenges that are rampant in the modern world of cybersecurity.
Über den Autor

PAUL J. MAURER, PhD, is the president of Montreat College, a national leader in cybersecurity education and workforce development. After being approached by the NSA to create a curriculum on cybersecurity ethics for our nation's students preparing for cybersecurity careers, Paul was convinced this book needed to be written. He speaks and writes frequently on a wide range of topics, but regularly does so on cybersecurity across the country.

ED SKOUDIS serves as president of the SANS Technology Institute College, the country's leading provider of cybersecurity professional development. Ed began teaching at the SANS Institute in 1999 and has trained over 30,000 cybersecurity professionals in incident response and ethical hacking, codifying many of the practices used throughout the industry today. He is the recipient of the Order of Thor medal from the Military Cyber Professionals Association and is the author of Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses.

Inhaltsverzeichnis

Introduction: "Like Your Hair Is On Fire" ix

Chapter 1 One Code to Rule Them All? 1

In Case You Are Wondering Why You Should Care 3

Do We Need Ethics in Cybersecurity? 6

Long-Standing Models for the Code 9

Why the Need for the Code Is Urgent 11

Chapter 2 This Is a Human Business 15

Cybersecurity Is a Human Business 18

Humans Have Inherent Value 20

Humans Over Technology 21

The Solution to the Problem of Cybersecurity Is Principally a Human Solution 24

Character Costs and Character Pays 25

Case Study: When Security Is on the Chopping Block 27

Chapter 3 To Serve and Protect 33

We Need You on That Wall 35

Know Your Why- Purpose and People 37

Service Means Sharing: Sharing Starts with Good Communication 42

Sharing with the Broader Cyber Community: We Are All on the Same Wall 44

Checking In 46

A Final Example 47

Case Study: Responsible Disclosure of a Security Flaw 48

Chapter 4 "Zero-Day" Humanity and Accountability 51

Bad Decisions and Multiplication 52

Humans Are Flawed 55

Turning Vulnerability into Strength: It Begins with Humility 56

Being a Lifelong Learner 60

Handling the Mistakes of Others 62

Let's Try to Avoid "Breaking Bad" 63

How to Develop a Reflective Practice 67

Case Study: To Pay or Not to Pay- A Ransomware Quandary 69

Chapter 5 It Begins and Ends with Trust 75

The Secret of Success 77

Trust Is the Currency of Cybersecurity 80

How Trust Is Built 82

When Things Go Bad 83

Building Trust Requires Courage 84

The Role of Leadership in Building a Culture of Trust 87

A Checklist for Building Trust 90

Case Study: A Matter of Trust and Data Breaches 93

Chapter 6 There Is Strength in the Pack 99

No Room for Know-it-Alls 103

Making Informed Ethical Decisions with Input 105

Why Teamwork Really Does Make the Dream Work 106

When Collaboration Breaks Down- Seeking Allies in Your Organization 110

The Power of Mentors 111

Beware of Rattlesnakes 115

Case Study: Graded on a Curve? The Security Audit Checkmark 117

Chapter 7 Practicing Cyber Kung Fu 123

Essential to Success: Patience, Wisdom, and Self-Control 128

Remember the Titanic 129

A Few Principles for Emergency Planning 131

Stay Calm, Cool, and Collected 132

Our Job Is Not Revenge 136

Develop Your Cyber Kung Fu 138

Case Study: An Open Door: Vigilante Justice 139

Chapter 8 No Sticky Fingers Allowed 143

If It's Free, It's for Me? 146

Avoid a "Robin Hood" Narrative 148

A Tragedy of "Free Information" 150

Intellectual Property Is Property 151

To Catch a Thief, We Must Train Like One 154

Choices Have Consequences 154

All I Really Need to Know I Learned in Kindergarten 156

Case Study: Something Borrowed and Something New 157

Chapter 9 It's None of Your Business 163

Curiosity Can Kill the Cat 167

The Golden Rule Applied to Cybersecurity 169

Stay in Your Lane 170

Four Questions to Help Avoid Impropriety 172

Each Time You Cross the Line, It Becomes Easier 173

We Hurt Real Human Beings 175

An Outrageous Example of the Problem 177

Remember: We Are the Shield 179

Case Study: To Share or Not to Share? Investigating the CFO's System 181

Appendix A: The Cybersecurity Code of Honor 185

Appendix B: Where Do We Go from Here? 189

Notes 191

Acknowledgments 193

About the Authors 197

Index 199

Details
Erscheinungsjahr: 2024
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Buch
Inhalt: Einband - fest (Hardcover)
ISBN-13: 9781394275861
ISBN-10: 1394275862
Sprache: Englisch
Einband: Gebunden
Autor: Maurer, Paul J
Skoudis, Ed
Hersteller: Wiley
Maße: 225 x 144 x 20 mm
Von/Mit: Paul J Maurer (u. a.)
Erscheinungsdatum: 18.06.2024
Gewicht: 0,353 kg
Artikel-ID: 128483324
Über den Autor

PAUL J. MAURER, PhD, is the president of Montreat College, a national leader in cybersecurity education and workforce development. After being approached by the NSA to create a curriculum on cybersecurity ethics for our nation's students preparing for cybersecurity careers, Paul was convinced this book needed to be written. He speaks and writes frequently on a wide range of topics, but regularly does so on cybersecurity across the country.

ED SKOUDIS serves as president of the SANS Technology Institute College, the country's leading provider of cybersecurity professional development. Ed began teaching at the SANS Institute in 1999 and has trained over 30,000 cybersecurity professionals in incident response and ethical hacking, codifying many of the practices used throughout the industry today. He is the recipient of the Order of Thor medal from the Military Cyber Professionals Association and is the author of Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses.

Inhaltsverzeichnis

Introduction: "Like Your Hair Is On Fire" ix

Chapter 1 One Code to Rule Them All? 1

In Case You Are Wondering Why You Should Care 3

Do We Need Ethics in Cybersecurity? 6

Long-Standing Models for the Code 9

Why the Need for the Code Is Urgent 11

Chapter 2 This Is a Human Business 15

Cybersecurity Is a Human Business 18

Humans Have Inherent Value 20

Humans Over Technology 21

The Solution to the Problem of Cybersecurity Is Principally a Human Solution 24

Character Costs and Character Pays 25

Case Study: When Security Is on the Chopping Block 27

Chapter 3 To Serve and Protect 33

We Need You on That Wall 35

Know Your Why- Purpose and People 37

Service Means Sharing: Sharing Starts with Good Communication 42

Sharing with the Broader Cyber Community: We Are All on the Same Wall 44

Checking In 46

A Final Example 47

Case Study: Responsible Disclosure of a Security Flaw 48

Chapter 4 "Zero-Day" Humanity and Accountability 51

Bad Decisions and Multiplication 52

Humans Are Flawed 55

Turning Vulnerability into Strength: It Begins with Humility 56

Being a Lifelong Learner 60

Handling the Mistakes of Others 62

Let's Try to Avoid "Breaking Bad" 63

How to Develop a Reflective Practice 67

Case Study: To Pay or Not to Pay- A Ransomware Quandary 69

Chapter 5 It Begins and Ends with Trust 75

The Secret of Success 77

Trust Is the Currency of Cybersecurity 80

How Trust Is Built 82

When Things Go Bad 83

Building Trust Requires Courage 84

The Role of Leadership in Building a Culture of Trust 87

A Checklist for Building Trust 90

Case Study: A Matter of Trust and Data Breaches 93

Chapter 6 There Is Strength in the Pack 99

No Room for Know-it-Alls 103

Making Informed Ethical Decisions with Input 105

Why Teamwork Really Does Make the Dream Work 106

When Collaboration Breaks Down- Seeking Allies in Your Organization 110

The Power of Mentors 111

Beware of Rattlesnakes 115

Case Study: Graded on a Curve? The Security Audit Checkmark 117

Chapter 7 Practicing Cyber Kung Fu 123

Essential to Success: Patience, Wisdom, and Self-Control 128

Remember the Titanic 129

A Few Principles for Emergency Planning 131

Stay Calm, Cool, and Collected 132

Our Job Is Not Revenge 136

Develop Your Cyber Kung Fu 138

Case Study: An Open Door: Vigilante Justice 139

Chapter 8 No Sticky Fingers Allowed 143

If It's Free, It's for Me? 146

Avoid a "Robin Hood" Narrative 148

A Tragedy of "Free Information" 150

Intellectual Property Is Property 151

To Catch a Thief, We Must Train Like One 154

Choices Have Consequences 154

All I Really Need to Know I Learned in Kindergarten 156

Case Study: Something Borrowed and Something New 157

Chapter 9 It's None of Your Business 163

Curiosity Can Kill the Cat 167

The Golden Rule Applied to Cybersecurity 169

Stay in Your Lane 170

Four Questions to Help Avoid Impropriety 172

Each Time You Cross the Line, It Becomes Easier 173

We Hurt Real Human Beings 175

An Outrageous Example of the Problem 177

Remember: We Are the Shield 179

Case Study: To Share or Not to Share? Investigating the CFO's System 181

Appendix A: The Cybersecurity Code of Honor 185

Appendix B: Where Do We Go from Here? 189

Notes 191

Acknowledgments 193

About the Authors 197

Index 199

Details
Erscheinungsjahr: 2024
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Buch
Inhalt: Einband - fest (Hardcover)
ISBN-13: 9781394275861
ISBN-10: 1394275862
Sprache: Englisch
Einband: Gebunden
Autor: Maurer, Paul J
Skoudis, Ed
Hersteller: Wiley
Maße: 225 x 144 x 20 mm
Von/Mit: Paul J Maurer (u. a.)
Erscheinungsdatum: 18.06.2024
Gewicht: 0,353 kg
Artikel-ID: 128483324
Warnhinweis

Ähnliche Produkte

Ähnliche Produkte