أمن المعلومات وحماية البنيات التحتية الأساسية والإتصالات
Listed in
This article is not in any list yet, why not save it to one of your lists.Abstract
This book aims to introduce the reader to the state of arts in the cybersecurity and critical information infrastructure protections. The first two chapters introduce the reader to the historical aspects of ICT development and a broad classification of cybersecurity problems. A chain course of actions to compete cybercrimes starting from introducing Chief Information security officer (CISO), planning, deploying technology tools, developing attribution methods, and developing legal framework are described in chapters three to six. Chapters seven, describes the cybersecurity problems inherited from using social networking systems and how to protect both family and child in the cyberspace. Parts of the celebrative efforts of the international community to secure the cyberspace are been described in chapter eight. Chapters nine through fifteen survey and describe individual countries experience and recent policies to toggle cybersecurity problem and maximally making use of the potential benefits brought by the cyberspace. Namely, these chapters survey Qatar, Australia, Malaysia, United States, Japan, United Kingdom, and the European Union. For each country, the national broadband plan, cybersecurity initiatives, Cybersecurity State, and non-governmental organizations established, child online protection efforts, and cybersecurity lows and legal frameworks enforced are been discussed.