الاستماع والقراءة

خطوة إلى عالم لا حدود له من القصص

  • اقرأ واستمع إلى ما تريده
  • أكثر من مليون عنوان
  • العناوين الحصرية + أصول القصة
  • 7 يوم تجربة مجانية، ثم 34.99 ريال يورو في الشهر
  • من السهل الإلغاء في أي وقت
جرب مجانا
image

Breached!: Why Data Security Law Fails and How to Improve It

1 التقييمات

2

المدة
7H 22دقيقة
اللغة
اللغة الإنجليزية
Format
الفئة

كتب واقعية

Digital connections permeate our lives—and so do data breaches. Given that we must be online for basic communication, finance, healthcare, and more, it is remarkable how difficult it is to secure our personal information. Despite the passage of many data security laws, data breaches are increasing at a record pace. In Breached!, Daniel Solove and Woodrow Hartzog, two of the world’s leading experts on privacy and data security issues, argue that the law fails because, ironically, it focuses too much on the breach itself.

Drawing insights from many fascinating stories about data breaches, Solove and Hartzog show how major breaches could have been prevented or mitigated through better rules and often inexpensive, non-cumbersome means. They also reveal why the current law is counterproductive. It pummels organizations that have suffered a breach but doesn’t recognize how others contribute to the breach. These outside actors include software companies that create vulnerable software, device companies that make insecure devices, government policymakers who write regulations that increase security risks, organizations that train people to engage in risky behaviors, and more.

Although humans are the weakest link for data security, the law remains oblivious to the fact that policies and technologies are often designed with a poor understanding of human behavior. Breached! corrects this course by focusing on the human side of security. This book sets out a holistic vision for data security law—one that holds all actors accountable, understands security broadly and in relationship to privacy, looks to prevention and mitigation rather than reaction, and is designed with people in mind. The book closes with a roadmap for how we can reboot law and policy surrounding data security.

© 2022 Recorded Books (دفتر الصوت ): 9781705056271

تاريخ الإصدار

دفتر الصوت : ١٥ مارس ٢٠٢٢

الوسوم

    واستمتع آخرون أيضًا...

    1. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
    2. Cybersecurity For Dummies Joseph Steinberg
    3. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
    4. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
    5. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
    6. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
    7. Project Zero Trust: A Story about a Strategy for Aligning Security and the Business George Finney
    8. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    9. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    10. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide: 2nd Edition Ben Malisow
    11. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
    12. Cybercrime Investigators Handbook Graeme Edwards
    13. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
    14. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Bruce Schneier
    15. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
    16. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
    17. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
    18. If It's Smart, It's Vulnerable Mikko Hypponen
    19. Ransomware Protection Playbook Roger A. Grimes
    20. Cyberdeterrence and Cyberwar Martin C. Libicki
    21. The Art of Deception: Controlling the Human Element of Security William L. Simon
    22. Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Ray A. Rothrock
    23. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
    24. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    25. The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Perry Carpenter
    26. Data For the People: How to Make Our Post-Privacy Economy Work for You Andreas S. Weigend
    27. What is the Dark Web?: The truth about the hidden part of the internet Evan J. Rodgers
    28. Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 John Knowles
    29. Obfuscation: A User's Guide for Privacy and Protest Finn Brunton
    30. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition Mike Chapple
    31. Why Privacy Matters Neil Richards
    32. Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden
    33. Cyber Privacy: Who Has Your Data and Why You Should Care April Falcon Doss
    34. The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World Alexis Wichowski
    35. The CISO Evolution: Business Knowledge for Cybersecurity Executives Kyriakos Lambros
    36. Public Parts: How Sharing in the Digital Age Improves the Way We Work and Live Jeff Jarvis
    37. Data Science John D. Kelleher
    38. Targeted: My Inside Story of Cambridge Analytica and How Trump, Brexit and Facebook Broke Democracy Brittany Kaiser
    39. Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity Ben Malisow
    40. Pegasus: The Story of the World's Most Dangerous Spyware Laurent Richard
    41. Dark Data: Why What You Don't Know Matters David J. Hand
    42. Life After Google: The Fall of Big Data and the Rise of the Blockchain Economy George Gilder
    43. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
    44. Targeted: The Cambridge Analytica Whistleblower's Inside Story of How Big Data, Trump, and Facebook Broke Democracy and How It Can Happen Again Brittany Kaiser

    دائمًا برفقة Storytel

    • أكثر من 200000 عنوان

    • وضع الأطفال (بيئة آمنة للأطفال)

    • تنزيل الكتب للوصول إليها دون الاتصال بالإنترنت

    • الإلغاء في أي وقت

    الكتب الأكثر استماعًا

    شهري

    قصص لكل المناسبات.

    34.99 ريال / شهر
    7 أيام مجانًا
    • حساب واحد

    • حساب بلا حدود

    • 1 حساب

    • استماع بلا حدود

    • إلغاء في أي وقت

    جرب الآن

    سنويا

    قصص لكل المناسبات.

    299 ريال /سنة
    7 أيام مجانًا
    وفر 29%
    • حساب واحد

    • حساب بلا حدود

    • 1 حساب

    • استماع بلا حدود

    • إلغاء في أي وقت

    جرب الآن

    6 أشهر

    قصص لكل المناسبات.

    192 ريال /6 أشهر
    7 أيام مجانًا
    وفر 9%
    • حساب واحد

    • حساب بلا حدود

    • 1 حساب

    • استماع بلا حدود

    • إلغاء في أي وقت

    جرب الآن