• 0 5391 6310 , 0 5391 6320
  • acquisition_library@mfu.ac.th
  • BOOK
  • E-BOOK
  • RECOMMEND OTHER BOOKS
  • SATISFACTION ASSESSMENT FORM
        
  • Log in
  • HOME
  • CATEGORY
    • Agro-Industry
    • Anti Aging and Regenerative Medicine
    • Applied Digital Technology
    • Cosmetic Science
    • Dentistry
    • General Books
    • Health Science
    • Integrative Medicine
    • Law
    • Liberal Arts
    • Management
    • Medicine
    • Nursing
    • Science
    • Sinology
    • Social Innovations
  • BOOKFAIR WEBSITE
  • MANUAL

Category

Agro-Industry

Anti Aging and Regenerative Medicine

Applied Digital Technology

Cosmetic Science

Dentistry

Health Science

Integrative Medicine

Law

Liberal Arts

Management

Medicine

Nursing

Science

Sinology

Social Innovations

General Books

Book

Principles of Cybersecurity Law

ISBN : 9781685615437

Author : Michael S. Mireles

Publisher : West Academic Publishing

Year : 2024

Language : English

Type : Book

Description : This book is for cybersecurity and privacy professionals, cybersecurity and privacy lawyers, law students, and anyone interested in learning the cybersecurity laws that apply to an entity based on the entity's business model(s) and data collection model(s). For example, what is the applicable Securities and Exchange Commission (SEC) cybersecurity law if an entity provides an alternate trading platform (ATP) with a daily trading volume of 50,000? The authors combine years of technical and legal experience in providing a map for cybersecurity counseling based on an understanding of the CISO's technical cybersecurity issues and how they fit into today's cybersecurity law challenges. The authors explain the difference and overlap between privacy law, cybersecurity law, and cybersecurity. Those interested in speaking the same cybersecurity language as a Chief Information Security Officer (CISO) will benefit. The first chapter provides a review of cybersecurity. For example, key to any discussion on cybersecurity is the Confidentiality, Integrity, and Availability (CIA) of data. Learn how to implement policy-based "reasonable security measures" frameworks for your organization that form a legal defense to cybersecurity-based actions brought by U.S. agencies such as the Federal Trade Commission (FTC) and state Attorney Generals. A high-level discussion of the National Institute of Science and Technology (NIST) cybersecurity frameworks is included as well as data breach laws, ransomware, anti-hacking related laws and some international issues.

Please register to recommend this book to the library.

RECOMMENDED BOOKS

Introduction to Cinematography

Tania Hoser

  • Detail

The Annotated Constitution of Japan

Jones

  • Detail

Designing Interventions to Address Complex Societal Issues

Sarah Morton

  • Detail

Complex Function Theory

Takeo Fujiwara

  • Detail

Environmental Challenges in Attaining Food Security

Ashita Sharma

  • Detail

Nanofiltration for Sustainability Reuse, Recycle and Resource Recovery

Abdul Mohammad

  • Detail

Strategic Innovative Marketing and Tourism

Androniki Kavoura

  • Detail

Bioethics Foundations, Applications and Future Challenges

Irene Cambra-Badii

  • Detail

Learning Reources and Education Media Centre - Mae Fah Luang University