Abstract
The Enterprise Cybersecurity Framework is pragmatic, realistic, and designed for battling today’s cyberthreats as well as tomorrow’s next-generation cyberthreats.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
FireEye, “Advanced Malware Exposed,” fireeye.com/wp_advmalware_exposed.html, 2011.
- 2.
Eric M. Hugchins, Michael J. Cloppert, and Rohan M. Amin, Ph.D., “Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains,” www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf, 2011
- 3.
Mandiant, “APT: Exposing One of China’s Cyber Espionage Units,” http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf, 2013
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam
About this chapter
Cite this chapter
Donaldson, S.E., Siegel, S.G., Williams, C.K., Aslam, A. (2018). Defining the Cybersecurity Challenge. In: Enterprise Cybersecurity Study Guide. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-3258-3_1
Download citation
DOI: https://doi.org/10.1007/978-1-4842-3258-3_1
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-3257-6
Online ISBN: 978-1-4842-3258-3
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)