Cybersecurity
Current Writings on Threats and Protection
$39.95
In stock
About the Book
Billions of people are connected through billions of devices across the globe. In the age of this massive internet, professional and personal information is being transmitted and received constantly, and while this access is convenient, it comes at a risk.
This handbook of cybersecurity best practices is for public officials and citizens, employers and employees, corporations and consumers. Essays also address the development of state-of-the-art software systems and hardware for public and private organizations.
About the Author(s)
Bibliographic Details
Edited by Joaquin Jay Gonzalez III and Roger L. Kemp
Format: softcover (6 x 9)
Pages: 288
Bibliographic Info: appendices, glossary, index
Copyright Date: 2019
pISBN: 978-1-4766-7440-7
eISBN: 978-1-4766-3541-5
Imprint: McFarland
Table of Contents
Acknowledgments vii
Preface 1
Part I. An Overview
1. Government Employees Unaware They Are Cyber Crime
Victims (Chelsea Binns) 5
2. Cybersecurity and America’s Governments (Roger L. Kemp) 8
3. NACo Members Zero In on Cybersecurity, Tech Safety (Ariel Cohen) 11
4. Growing Impact of Cybercrime in Local Government (Gerald Cliff) 14
5. Cybersecurity: What’s Your Risk? (International City/County Management Association) 21
6. Performance and Data Analytics: The Cincinnati Story (Harry Black) 24
7. The Digital Solution (Shaun Mulholland) 32
8. Digital Wallpapers Open Doors (Caitlin Cowart) 38
9. Personal Privacy Is Eroding as Consent Policies of Google and Facebook Evoke “Fantasy World” (Fred H. Cate) 40
Part II. Threats and Risks
10. IoT Is Changing the Cybersecurity Industry (Larry Karisny) 43
11. Equifax Breach Is a Reminder of Society’s Larger Cybersecurity Problems (Richard Forno) 46
12. Cybersecurity: Protecting Court Data (Brian McLaughlin) 51
13. Health-Care Industry Increasingly Faces Cybersecurity Breaches
(Margaret Steen) 55
14. It’s in the Mail: Aetna Agrees to $17M Payout in HIV Privacy Breach (Elana Gordon) 60
15. Explainer: What Is Hacking? (James H. Hamlyn-Harris) 63
16. How the Chinese Cyberthreat Has Evolved (Dorothy Denning) 67
17. Now That Russia Has Apparently Hacked America’s Grid, Shoring Up Security Is More Important Than Ever (Theodore J. Kury) 72
18. Ransomware Victims Urged to Report Infections to Federal Law Enforcement Federal Bureau of Investigation 75
19. Ransomware Attacks Illustrate the Vulnerabilities That Local Government Entities Face (Mary Scott Nabers) 80
20. Ransomware Attacks on the Rise in 2017 (Mary Ann Barton) 82
21. The Two Faces of Social Media (Martha Perego) 86
22. “Zero-Day” Stockpiling Puts Us All at Risk (Benjamin Dean) 89
Part III. Prevention, Protection, Partnership: A. Practical Preventive Measures
23. A Plan for Cybersecurity (Cory Fleming) 95
24. How We Can Each Fight Cybercrime with Smarter Habits (Arun Vishwanath) 101
25. Simple Steps to Online Safety (Alan Shark) 104
26. Staying Safe on Social Networking Sites (U.S. Computer Emergency Readiness Team) 109
27. Seven Keys to Strengthen Your Cybersecurity Culture (Daniel J. Lohrmann) 113
28. Three Tips for Forming a Computer Emergency (Response Team
Kelsey Brewer) 117
29. Cybersecurity Strategies Governments Need (Gus “Ira” Hunt and Lalit Ahluwalia) 120
30. Security Pros Need a Mentor: Here’s Why and How (Daniel J. Lohrmann) 123
31. Mecklenburg County Refuses to Pay Ransom to Cyber Hackers
(Mary Ann Barton) 127
32. Fighting Fake News (Marcus Banks) 130
33. How Airplane Crash Investigations Can Improve Cybersecurity (Scott Shackelford) 133
III. B. Technical Protections
34. National Cybersecurity Workforce Framework
U.S. Department of Homeland Security 136
35. Eliminating Network Blind Spots and Preventing Breaches
Reggie Best 142
36. The Cloud and Enterprise Cybersecurity: Leveling the Playing Field (Microsoft) 145
37. Government Data in the Cloud: Provider and User Responsibilities
(Subrata Chakrabarti) 151
38. Using Blockchain to Secure the “Internet of Things” (Nir Kshetri) 154
39. How to Protect Patrons’ Digital Privacy (Anne Ford) 157
40. Monitoring Employees’ Use of Company Computers and the Internet (Texas Workforce Commission) 160
41. Disaster Recovery for Technology: Best Practice
Government Finance Officers Association 168
III. C. Using Partnerships and Networks
42. Cybersecurity Partnerships: Strength in Numbers (Susan Miller) 171
43. Intersector Briefing: Cross Sector Collaboration in Cybersecurity
Intersector Project 174
44. Obama’s Cybersecurity Initiative (Frank J. Cilluffo and Sharon L. Cardash) 177
45. New Trump Executive Order on Cybersecurity (Daniel J. Lohrmann) 181
46. Sharing of Cyber Threat Indicators and Defensive Measures by the Federal Government (Office of the Director of National Intelligence
and Other Agencies) 185
47. Law Enforcement Partnerships Enhance Cybersecurity Investigations (Chelsea Binns) 192
48. States Rush to Cash in on Cybersecurity Boom (Elaine S. Povich) 194
49. How the National Guard Is Protecting Cybersecurity (Colin Wood) 198
50. Cybersecurity and Local Governments in the United States (William Hatcher) 203
Part IV. Future
51. The Top 18 Security Predictions for 2018 (Daniel J. Lohrmann) 207
52. Artificial Intelligence Cyber Attacks Are Coming—But What Does That Mean? (Jeremy Straub) 217
53. FCC Group on 5G Deployment Short on Local Input (Mary Ann Barton) 220
54. Thinking Strategically in the Cyber Domain (John O’Brien) 224
55. Internet, E-mail and Computer Use Policy (Texas Workforce Commission) 227
56. Consumers Who Froze Their Credit Reports
Julie Appleby 233
Appendix A: Glossary of Cybersecurity Terms
Joaquin Jay Gonzalez III 237
Appendix B: Presidential Executive Order on Strengthening
the Cybersecurity of Federal Networks and Critical
Infrastructure 248
Appendix C: City and County of San Francisco Cybersecurity
Policy 257
Appendix D: LaPorte County, Indiana, IT Computer Security
Policy 262
About the Contributors 267
Index 271
Book Reviews & Awards
- “The 56 separately authored articles contained in this volume effectively combine diverse resources under one cover, making it easier for those new to the cybersecurity discipline to find information relevant to their area of interest. …the articles are relevant and informative…recommended”—Choice
- “Essential reading…recommended”—Midwest Book Review