Cyber-Warfare: State and Local Governments Caught in the Crosshairs

Author(s):

Edition: 1

Copyright: 2018

Pages: 238

Choose Your Format

Ebook

$46.31

ISBN 9781524952112

Details Electronic Delivery EBOOK 180 days

Cybersecurity is a high priority in today’s world.

Cyber-Warfare: State and Local Governments Caught in the Crosshairs addresses highly important and current topics in a plain English, nontechnical manner. This text bridges the gap between what the state and local government executive needs to know in order to have an intelligent conversation with the IT manager. It also gives executives a well-grounded understanding of the IT manager’s needs, challenges, and concerns.

Cyber Warfare:

  • Aims to educate the average government executive to better understand and appreciate the challenges their IT department faces.
  • Aids public administration students and political science majors to comprehend the intricacies and challenges faced in the professions they wish to occupy.

Chapter 1 Introduction
Chapter 2 Hacking, Maas and Shodan
Chapter 3 Costs of Data Breaches
Chapter 4 Civil Liability for Data Breaches in Government
Chapter 5 Methods of Dealing with Data Breach Threat
Chapter 6 Legislation and Data Breach Reporting
Chapter 7 Pulling it all Together

Cybersecurity is a high priority in today’s world.

Cyber-Warfare: State and Local Governments Caught in the Crosshairs addresses highly important and current topics in a plain English, nontechnical manner. This text bridges the gap between what the state and local government executive needs to know in order to have an intelligent conversation with the IT manager. It also gives executives a well-grounded understanding of the IT manager’s needs, challenges, and concerns.

Cyber Warfare:

  • Aims to educate the average government executive to better understand and appreciate the challenges their IT department faces.
  • Aids public administration students and political science majors to comprehend the intricacies and challenges faced in the professions they wish to occupy.

Chapter 1 Introduction
Chapter 2 Hacking, Maas and Shodan
Chapter 3 Costs of Data Breaches
Chapter 4 Civil Liability for Data Breaches in Government
Chapter 5 Methods of Dealing with Data Breach Threat
Chapter 6 Legislation and Data Breach Reporting
Chapter 7 Pulling it all Together