Stepping Through Cybersecurity
Risk Management
A Systems Thinking Approach
Jennifer L. Bayuk
v
Contents
Foreword ix
Preface xiii
Acknowledgements xxv
About the Companion Website xxvii
1 Framework Elements 1
References 16
2 Threats 17
2.1 Threat Actors 17
2.1.1 Hackivists 22
2.1.2 Insiders 23
2.1.3 Hacker 26
2.1.4 Competitors 29
2.1.5 Lone Wolf 33
2.2 Threat Networks 33
2.2.1 Example: Identity Theft 34
2.2.2 ...
附件列表