Show Summary Details

M

Cyber Security: Law and Guidance

Author:
Helen Wong
Publisher:
Bloomsbury Professional
Edition:
Second edition
Publication Date:
2025
M Machine learning manufacturing, and 10.214 — 10.215 Macros vulnerabilities, and 2.08 Making, supplying or obtaining articles for use in offences criminal law, and 19.22 — 19.26 Malicious communications cyber-stalking 19.42 — 19.47 general 19.32 — 19.41 harassment 19.42 — 19.47 introduction 19.31 revenge porn 19.54 — 19.58 sending explicit images 19.59 trolling 19.48 — 19.53 Malware aerospace, defence and security sector, and 10.422 — 10.424 social media policy, and 11.21 threats, and 1.03 vulnerabilities, and 2.08 Man-in-the-middle (MITM) attacks threats, and 1.03 Managing cyber-security in an international financial institution access to systems 14.54 approach to risk management 14.71 — 14.89 attitude testing 14.60 audit 14.40 — 14.45 awareness 14.25 awareness cost 14.84 — 14.85 awareness training 14.59 behaviour testing 14.60 conclusion 14.90 — 14.98 contingencies cost 14.83 cyber-risk appetite 14.79 — 14.85 definition 14.74 — 14.78 generally 14.46 — 14.70 introduction 14.04 — 14.11 lines of defence 14.12 — ...

If you would like to access this content, but you are not currently a subscriber, please sign up for a free trial here. If you already subscribe to this service please login here.