Før Memmo var notatene mine spredt overalt i PDF-er. Nå samler et arbeidsområde alt på ett sted – jeg ser akkurat hva som gjenstår å studere.
The art of war is of vital importance to the state. It is a matter of life or death. Hence, it is a subject which can on no account be neglected.—Sun Tzu
Why are we calling this war? It’s because the conflict in cyberspace is a matter of national concern, and we are, most assuredly, losing the current struggle. So, what do we do? The person who best understands war is a 2,300-year-old Chinese general who saw conflict as more about process and strategy than fighting. Which, in essence, is the holistic concept.
Hence, this book is founded on two principles. First, cybersecurity is a state, not a technical solution. Accordingly, people and organizations must take active steps to both design and sustain a consistently secure operational process. Second, it’s given that you have not attained the desired state if you have failed to deploy all of the controls necessary to achieve it.
The catch-all term for such an approach is “holistic.” A holistic control architecture is the only way to achieve adequate protection. Therefore, holistic cyber defenses embody a single, unified system of electronic, behavioral, and physical controls that enforce continuous security across all common attack surfaces.
Why does the solution need to be holistic? It is because the cybersecurity function is responsible for securing three distinct and disparate types of attacks – electronic, human, and physical. And just as in war, the adversary doesn’t care which attack surface they breach. They only want your stuff, and they will do whatever it takes to get it. In that respect, then, the only practical approach to cybersecurity is to create an integrated, appropriately tailored defense against any viable threat… electronic, human, or physical.
This book describes the lifecycle process for conceptualizing, implementing, and maintaining a holistic control solution. It centers on a well-defined process for planning, building, and ensuring comprehensive, in-depth cyber defense. In that respect, then, we will demonstrate why holistic security is the only way for an organization to identify and address all valid threats to its digital resources.
Før Memmo var notatene mine spredt overalt i PDF-er. Nå samler et arbeidsområde alt på ett sted – jeg ser akkurat hva som gjenstår å studere.
Memmos sammendrag er gull før eksamen. Jeg slipper å lese 800 sider to uker før – bare det viktigste.
AI-chatten har reddet meg kvelden før eksamen mer enn én gang. Jeg bare spør til jeg forstår – slipper å vente på svar i en studiegruppe.
Quizene treffer akkurat det jeg trenger å vite. Memmo holder styr på hva jeg sliter med – så jeg øver bare på det som er verdt det.
Flashcards med repetisjon over tid er magi. Memmo vet når jeg er i ferd med å glemme noe og viser det igjen.
AI-podkastene er min favoritt. Jeg lytter på vei til skolen og får en repetisjon uten å sitte foran en datamaskin.
Handbok i kvalitativa metoder
281 kr
Hållbar utveckling: en introduktion för ingenjörer och andra problemlösare
334 kr
Brymans Samhällsvetenskapliga metoder
390 kr
Projektledning
491 kr
Den orättvisa hälsan: om socioekonomiska skillnader i hälsa och livslängd
326 kr
Organizational Leadership
429 kr
Vetenskapsteori för nybörjare
196 kr
På väg mot läraryrket
172 kr
Det sociala livet i skolan: Socialpsykologiska perspektiv
253 kr
Betygsättningens didaktik
151 kr
Personality
402 kr
Studying Leadership
404 kr
Managing Innovation
477 kr
Introduktion till samhällsvetenskaplig metod
347 kr
The Psychology of Sex and Gender
698 kr
Introduction to Leadership
605 kr
Evidens och kunskap för socialt arbete
207 kr