Loading...
Please wait, while we are loading the content...
Similar Documents
Introduction to Information Security and Cybersecurity
| Content Provider | Scilit |
|---|---|
| Author | Bandler, John Merzon, Antonia |
| Copyright Year | 2020 |
| Description | This chapter summarizes how computers, networks, and technology work, with an eye towards understanding how cybercrimes are committed and investigated, and the technical aspects of obtaining digital evidence. It focuses on information security basics, the controls and defenses that private and government organizations put in place to prevent cybercrime, and how cybercriminals might circumvent the controls. The field of information security centers on protecting an organization's information assets from a broad range of threats, including cybercrime, natural disaster, brick-and-mortar burglary, and social engineering. Authentication is a technical control that enforces administrative rules about access to data. It is one of the most widely used information security methods and a familiar one to most users. The Center for Internet Security, a non-profit organization dedicated to developing and promoting best practice solutions for cyber defense, maintains the Critical Security Controls, 20 actions that enable organizations to holistically address information security. Book Name: Cybercrime Investigations |
| Related Links | https://content.taylorfrancis.com/books/download?dac=C2018-0-95855-6&isbn=9781003033523&doi=10.1201/9781003033523-4&format=pdf |
| Ending Page | 62 |
| Page Count | 13 |
| Starting Page | 50 |
| DOI | 10.1201/9781003033523-4 |
| Language | English |
| Publisher | Informa UK Limited |
| Publisher Date | 2020-06-22 |
| Access Restriction | Open |
| Subject Keyword | Book Name: Cybercrime Investigations Information Systems Information Security Organization Defense Center Controls Cybercrime Critical Security Holistically Address |
| Content Type | Text |
| Resource Type | Chapter |