000 | 04864nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-3-031-64396-5 | ||
003 | DE-He213 | ||
005 | 20250516160140.0 | ||
007 | cr nn 008mamaa | ||
008 | 240918s2024 sz | s |||| 0|eng d | ||
020 |
_a9783031643965 _9978-3-031-64396-5 |
||
050 | 4 | _aTK5105.59 | |
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM043050 _2bisacsh |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aMartino, Luigi. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aCybersecurity in Italy _h[electronic resource] : _bGovernance, Policies and Ecosystem / _cby Luigi Martino. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2024. |
|
300 |
_aXIX, 93 p. 9 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSpringerBriefs in Cybersecurity, _x2193-9748 |
|
505 | 0 | _aChapter 1 Cyber Security: Intersecting Technology and Policy -- Chapter 2 The Italian Cyber Security Ecosystem -- Chapter 3 Foundations of Cyber Security Policy and Governance in Italy -- Chapter 4 Evolution of Italy's National Cyber Security Governance -- Chapter 5 The National Cyber Security Perimeter: Regulatory Scope and Limitations -- Chapter 6 Insights into the National Cybersecurity Agency -- Chapter 7 Conclusions. | |
520 | _aThis book presents a detailed and innovative analysis of the governance, policies and ecosystem that define the Italian cybersecurity posture. It explores the complex interplay between technology and policy in shaping national security strategies in the digital era. The author introduces the reader to the critical importance of a policy-driven approach to cyber security, highlighting the challenges and necessary evolution prompted by rapid technological advancements and the expanding relevance of cyberspace. It emphasizes the multifaceted nature of cyber security that extends beyond technological solutions to encompass a broad socio-political analytical framework. The author also illustrates the need for an integrated approach that includes policies development, stakeholder engagement and strategic national objectives. This book delves into the organizational structure and dynamics of Italian national cybersecurity ecosystem, while shedding light on the collaborative interactions among different actors within this complex field. It meticulously outlines the roles and responsibilities of public, private and civil sectors in enhancing Italy's cyber resilience. Key developments such as the establishment of the National Cybersecurity Agency and the formulation of strategic objectives to safeguard national cyber perimeter are critically examined. This examination not only reflects on the strategies employed but also on the challenges and achievements in fostering a robust cyber security environment able to respond to both current and emerging threats. Through a blend of theoretical insights and practical case studies, supplemented by more than 30 semi-structured interviewees. This book also offers a comprehensive overview of efforts implemented by Italy in 10 years of policy making experience with the aim to structure the appropriate cyber security national institutional architecture. It provides valuable perspectives on the effectiveness of these policies, the ongoing adjustments required to address the fluid nature of cyber threats, and the implications of these efforts on both national and international scales. Upper-under graduate level and graduate level students in computer science or students interested in cybersecurity will want to purchase this book as a study guide. Researchers working in cybersecurity as well as Policy Makers, Legislators, Decision Makers and CISO will also want to purchase this book as a reference book. | ||
541 |
_fUABC ; _cPerpetuidad |
||
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 | _aCooperating objects (Computer systems). | |
650 | 0 |
_aData protection _xLaw and legislation. |
|
650 | 1 | 4 | _aMobile and Network Security. |
650 | 2 | 4 | _aCyber-Physical Systems. |
650 | 2 | 4 | _aPrivacy. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031643958 |
776 | 0 | 8 |
_iPrinted edition: _z9783031643972 |
830 | 0 |
_aSpringerBriefs in Cybersecurity, _x2193-9748 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-64396-5 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cLIBRO_ELEC | ||
999 |
_c276452 _d276451 |