Do No Harm. Matthew WebsterЧитать онлайн книгу.
target="_blank" rel="nofollow" href="#ulink_f3e0e878-1271-5bc3-87dd-bf72d45e6fbf">Internet-Related Services Challenges The Evolving Enterprise In Summary Notes Chapter 12: IT Hygiene and Cybersecurity The IoMT Blues The Drudgery of Patching Antivirus Is Enough, Right? Misconfigurations Galore In Summary Notes Chapter 13: Identity and Access Management Minimal Identity Practices Authentication Privileged Access Management Other I&AM Technologies In Summary Notes Chapter 14: Threat and Vulnerability Vulnerability Management Vulnerability Management Strategies Penetration Testing New Tools of an Old Trade In Summary Note Chapter 15: Data Protection Data Governance Data Loss Prevention Enterprise Encryption Data Tokenization In Summary Chapter 16: Incident Response and Forensics Defining the Context Incident Response In Summary Note Chapter 17: A Matter of Life, Death, and Data Organizational Structure Risk Management Mindset Challenges Decision-Making In Summary
6 Part III: Looking Forward Chapter 18: Seeds of Change The Shifting Legal Landscape International Agreements Technology Innovation Leadership Shakeups In Summary Notes Chapter 19: Doing Less Harm What IoMT Manufacturers Can Do What Covered Entities Can Do Cybersecurity Innovators What You Can Do In Summary Notes Chapter 20: Changes We Need International Cooperation Covered Entities More IoMT Security Assurances In Summary Note
7 Glossary
8 Index
10 Dedication
13 Preface
List of Tables
1 Chapter 6Table 6-1: Relationship between IoT Violations and Privacy
2 Chapter 14Table 14-1: CVSS v3.0 Ratings
List of Illustrations
1 Chapter 1Figure 1-1: Example types of attacks against internet-connected medical devi...Figure 1-2: Number of healthcare data breaches of 500 or more records
2 Chapter 2Figure 2-1: The interconnection of IoMT technologies