The activities of the cyber criminal are both deliberate and hostile, and they can be compared to military operations. This book offers guidance on information security, underpinned by a profound understanding of human conflict. It covers the developments in the threat landscape and advice available in the version of ISO27001:2013.