Get Free Shipping on orders over $79
Cyber Essentials : A guide to the Cyber Essentials and Cyber Essentials Plus certifications - Alan Calder

Cyber Essentials

A guide to the Cyber Essentials and Cyber Essentials Plus certifications

By: Alan Calder

eText | 10 October 2023

At a Glance

eText


$42.85

or 4 interest-free payments of $10.71 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Cyber Essentials - A guide to Cyber Essentials and Cyber Essentials Plus certifications

Cyber attacks are a fact of life in the information age. For any organisation that connects to the Internet, the issue is not if an attack will come, but when. Most cyber attacks are performed by relatively unskilled criminals using tools available online. These attacks are often opportunistic: looking for easy targets rather than rich pickings.

The Cyber Essentials scheme is a UK government-backed effort to encourage UK-based organisations to improve their cyber security by adopting measures (called controls) that defend against common, less-sophisticated cyber attacks. The scheme recommends practical defences that should be within the capability of any organisation.

The Cyber Essentials scheme has two levels:

  1. The basic Cyber Essentials; and
  2. Cyber Essentials Plus.

This first part of this book will examine the various threats that are most significant in the modern digital environment, their targets and their impacts. It will help you to understand whether your organisation is ready for Cyber Essentials or Cyber Essentials Plus certification.

The second part of the book presents a selection of additional resources that are available to help you implement the controls or become certified.

on
Desktop
Tablet
Mobile

More in Data Encryption