• 0 5391 6310 , 0 5391 6320
  • acquisition_library@mfu.ac.th
  • BOOK
  • E-BOOK
  • RECOMMEND OTHER BOOKS
  • SATISFACTION ASSESSMENT FORM
        
  • Log in
  • HOME
  • CATEGORY
    • Agro-Industry
    • Anti Aging and Regenerative Medicine
    • Applied Digital Technology
    • Cosmetic Science
    • Dentistry
    • General Books
    • Health Science
    • Integrative Medicine
    • Law
    • Liberal Arts
    • Management
    • Medicine
    • Nursing
    • Science
    • Sinology
    • Social Innovations
  • BOOKFAIR WEBSITE
  • MANUAL

Category

Agro-Industry

Anti Aging and Regenerative Medicine

Applied Digital Technology

Cosmetic Science

Dentistry

Health Science

Integrative Medicine

Law

Liberal Arts

Management

Medicine

Nursing

Science

Sinology

Social Innovations

General Books

Book

Principles of Cybersecurity Law

ISBN : 9781685615437

Author : Michael S. Mireles

Publisher : West Academic Publishing

Year : 2024

Language : English

Type : Book

Description : This book is for cybersecurity and privacy professionals, cybersecurity and privacy lawyers, law students, and anyone interested in learning the cybersecurity laws that apply to an entity based on the entity's business model(s) and data collection model(s). For example, what is the applicable Securities and Exchange Commission (SEC) cybersecurity law if an entity provides an alternate trading platform (ATP) with a daily trading volume of 50,000? The authors combine years of technical and legal experience in providing a map for cybersecurity counseling based on an understanding of the CISO's technical cybersecurity issues and how they fit into today's cybersecurity law challenges. The authors explain the difference and overlap between privacy law, cybersecurity law, and cybersecurity. Those interested in speaking the same cybersecurity language as a Chief Information Security Officer (CISO) will benefit. The first chapter provides a review of cybersecurity. For example, key to any discussion on cybersecurity is the Confidentiality, Integrity, and Availability (CIA) of data. Learn how to implement policy-based "reasonable security measures" frameworks for your organization that form a legal defense to cybersecurity-based actions brought by U.S. agencies such as the Federal Trade Commission (FTC) and state Attorney Generals. A high-level discussion of the National Institute of Science and Technology (NIST) cybersecurity frameworks is included as well as data breach laws, ransomware, anti-hacking related laws and some international issues.

Please register to recommend this book to the library.

RECOMMENDED BOOKS

Lebbeus Woods

Aleksandra Wagner

  • Detail

Beyond Li-ion Batteries for Grid-Scale Energy Storage

Wheeler

  • Detail

Image Processing and Acquisition using Python

Ravishankar Chityala

  • Detail

Genetics and Epigenetics of Genitourinary Diseases

Kazem Aghamir

  • Detail

Mobile Media Methods

Larissa Hjorth

  • Detail

Compassion in Disaster Management

Mark Crosweller

  • Detail

Advances on Mathematical Modeling and Optimization with Its Applications

Gunjan Mukherjee

  • Detail

Democratic Backsliding and Public Administration

Michael W. Bauer

  • Detail

Learning Reources and Education Media Centre - Mae Fah Luang University