ABSTRACT

Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been demonstrated that common hackers can use tools and techniques downloaded from the Internet to attack government and commercial information systems. Although threats may come from mischief makers and pranksters, they are more

chapter 1|28 pages

Cybersecurity Risk Management

chapter 3|48 pages

Identify Function

chapter 4|60 pages

Protect Function

chapter 5|34 pages

Detect Function

chapter 6|24 pages

Respond Function

chapter 8|28 pages

The COBIT Framework

chapter 9|8 pages

Decomposition of Framework

chapter 10|14 pages

Framework Structure’s Generic Domains

chapter 11|8 pages

Decomposition of COBIT 5 Principles

chapter 12|8 pages

COBIT Management Guidelines

chapter 13|6 pages

COBIT Management Dashboard

chapter 14|4 pages

What COBIT Sets Out to Accomplish

chapter 15|6 pages

Internal Audits

chapter 16|4 pages

Tying It All Together