Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Cyber security. Simply. Make it happen. : leveraging digitization through IT security
Abolhassan F., Springer International Publishing, New York, NY, 2017. 127 pp. Type: Book (978-3-319465-28-9)
Date Reviewed: Nov 28 2017

The book is edited by Ferri Abolhassan, from Telekom Deutschland, who collected 11 chapters, each one from a different author. All chapters serve as the basis for a discussion on digitization and its impact on the future development of our society and economy. People, machines, and devices will be increasingly networked. In the foreword, Thomas Kremer raises the question of whether the increase in digitization will benefit or harm people. He acknowledges that the trend toward digitization cannot be stopped. Experts have predicted that by 2020, more than 50 billion devices will be connected.

His views focus on the pros and cons of digitization bringing greater opportunities. The benefits are that the Internet of Things (IoT) and Industry 4.0 would give Europeans an opportunity to catch up with digitization. People must be educated about the use of technology and the protection of personal data. Kremer believes that the European Union’s General Data Protection Regulation (GDPR) will guarantee a high level of data protection. Standards or regulations that could complement the GDPR are not considered.

All security experts agree that digitization increases the risk of attacks against companies and individuals. Cybercriminals can exploit vulnerabilities to sneak malicious code into affected systems. The infected systems are then used to hijack other machines in the corporate network. Frequent upgrades and patches are rolled out to the affected systems and machines. Monitoring and catching the attackers are the ultimate goals to make systems and networks safer. Kremer believes that by making security simple, data will be better protected.

In chapter 1, the author believes a secure cloud will lead to secure digitization. Chapter 2 focuses on the challenges of setting up a security policy. Chapter 3 points out that data protection for business is more flexible than that for personal data. Chapter 4 briefly discusses red teaming and wargaming and shows how they can be transferred to a company’s cybersecurity strategies. Chapter 5 deals with the law and its contribution to information technology (IT) security. Chapter 6 looks at the six elements of an integrated defense strategy. Chapter 7 talks about the German security market, particularly managed security services. Chapter 8 emphasizes the importance of integrated cybersecurity skills training. Chapter 9 considers human factors in IT security. Chapter 10 doesn’t overlook data security in danger zones and the use of plug-and-play security to make security simpler. Chapter 11 raises interesting questions on the motives of attackers and what will protect us. In chapter 12, the editor gives a conclusion on the pros and cons of the Internet and on the success of a long-term strategy that depends on the implementation of security solutions, the proper training of security experts, and an awareness program for employees.

The book is well organized and in proper sequence. The authors provide interesting facts on different aspects of digitization. For security experts, all chapters are easy to understand. The appendix gives 11 rules for a secure IoT. It should be moved to the front of the book for easy access. The glossary appears to be limited. The emphasis is limited to strategies for the German security market.

Despite its flaws, the book provides clear and valuable insights into cybersecurity issues and solutions. The target audience should be academics, security professionals, and organizations that plan to implement a long-term security strategy.

Reviewer:  J. Myerson Review #: CR145679 (1802-0068)
Bookmark and Share
  Reviewer Selected
 
 
Security and Protection (K.6.5 )
 
 
Security and Protection (C.2.0 ... )
 
 
Security, Integrity, And Protection (H.2.7 ... )
 
 
Database Administration (H.2.7 )
 
 
General (C.2.0 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy