Foreword 1 |
|
xvii | |
Foreword 2 |
|
xxi | |
Author Biographies |
|
xxv | |
Introduction |
|
xxvii | |
|
Chapter 1 Securing Cyberspace Is Everybody's Business |
|
|
1 | (38) |
|
Introduction: The Current Situation Is Out of Control |
|
|
1 | (2) |
|
The Challenge: How Do You Protect Something that Doesn't Actually Exist? |
|
|
3 | (2) |
|
We Must Re-evaluate Our Assumptions |
|
|
5 | (2) |
|
The Adversary Changes Things |
|
|
7 | (2) |
|
|
9 | (2) |
|
Learning to Play Better with Others |
|
|
11 | (1) |
|
Creating a Holistic Solution |
|
|
11 | (1) |
|
The Importance of Knowing What to Do |
|
|
12 | (1) |
|
Enabling Common Understanding |
|
|
12 | (1) |
|
|
13 | (1) |
|
The Body of Knowledge and Educational Strategy |
|
|
14 | (2) |
|
Cybersecurity as an Academic Study |
|
|
16 | (2) |
|
The Association for Computing Machinery (ACM) |
|
|
16 | (1) |
|
The International Society of Electrical and Electronic Engineers (IEEE) |
|
|
17 | (1) |
|
The Association for Information Systems (AIS) |
|
|
17 | (1) |
|
The International Federation for Information Processing (IFIP) |
|
|
18 | (1) |
|
The Importance of Unified Recommendations about Areas of Vital Interest |
|
|
18 | (1) |
|
Circumscribing the Field: Background and Intention of CC2005 |
|
|
19 | (3) |
|
Defining the Elements of the Discipline of Cybersecurity: CSEC2017 |
|
|
22 | (1) |
|
Knowledge Area One: Data Security |
|
|
23 | (1) |
|
Knowledge Area Two: Software Security |
|
|
24 | (1) |
|
Knowledge Area Three: Component Security |
|
|
24 | (1) |
|
Knowledge Area Four: Connection Security |
|
|
25 | (1) |
|
Knowledge Area Five: System Security |
|
|
25 | (1) |
|
Knowledge Area Six: Human Security |
|
|
26 | (1) |
|
Knowledge Area Seven: Organizational Security |
|
|
26 | (1) |
|
Knowledge Area Eight: Societal Security |
|
|
27 | (1) |
|
Real-World Utilization of the CSEC2017 Body of Knowledge |
|
|
28 | (1) |
|
CSEC2017 Framework Areas of Application |
|
|
29 | (3) |
|
Thirty Review Questions: Introduction to the CSEC Standard |
|
|
32 | (1) |
|
You Might Also Like to Read |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
36 | (3) |
|
Chapter 2 The Cybersecurity Body of Knowledge |
|
|
39 | (48) |
|
Bodies of Knowledge Are Essential Tools in Educational Settings |
|
|
39 | (1) |
|
|
40 | (2) |
|
Making Cybersecurity Teaching Real |
|
|
42 | (1) |
|
Validating Curricular Concepts |
|
|
43 | (2) |
|
|
45 | (3) |
|
|
48 | (4) |
|
The CSEC2017 Organization |
|
|
52 | (2) |
|
The CSEC2017 Implementation Process |
|
|
54 | (2) |
|
Knowledge Area One: Data Security |
|
|
56 | (2) |
|
Knowledge Area Two: Software Security |
|
|
58 | (4) |
|
Knowledge Area Three: Component Security |
|
|
62 | (2) |
|
Knowledge Area Four: Connection Security |
|
|
64 | (4) |
|
Knowledge Area Five: System Security |
|
|
68 | (2) |
|
Knowledge Area Six: Human Security |
|
|
70 | (4) |
|
Knowledge Area Seven: Organizational Security |
|
|
74 | (4) |
|
Knowledge Area Eight: Societal Security |
|
|
78 | (3) |
|
Twenty Review Questions: The Cybersecurity Body of Knowledge |
|
|
81 | (1) |
|
You Might Also Like to Read |
|
|
82 | (1) |
|
|
82 | (2) |
|
|
84 | (1) |
|
|
85 | (2) |
|
|
87 | (68) |
|
Surviving in a Digital Era |
|
|
87 | (2) |
|
The CSEC2017 Data Security Knowledge Units |
|
|
89 | (2) |
|
Knowledge Unit One: Cryptography |
|
|
91 | (10) |
|
|
92 | (2) |
|
|
94 | (1) |
|
|
94 | (1) |
|
|
95 | (2) |
|
Symmetric (Private Key) Ciphers |
|
|
97 | (1) |
|
Asymmetric (Public Key) Ciphers |
|
|
98 | (3) |
|
Knowledge Unit Two: Digital Forensics |
|
|
101 | (16) |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
104 | (2) |
|
|
106 | (2) |
|
Acquisition and Preservation of Digital Evidence |
|
|
108 | (3) |
|
|
111 | (1) |
|
|
112 | (1) |
|
Authentication of Evidence |
|
|
113 | (1) |
|
Reporting, Incident Response, and Handling |
|
|
114 | (2) |
|
|
116 | (1) |
|
Knowledge Unit Three: Data Integrity and Authentication |
|
|
117 | (6) |
|
|
117 | (2) |
|
|
119 | (1) |
|
Password Storage Techniques |
|
|
120 | (1) |
|
|
121 | (2) |
|
Knowledge Unit Four: Access Control |
|
|
123 | (5) |
|
|
124 | (1) |
|
Logical Data Access Control |
|
|
125 | (1) |
|
Secure Architecture Design |
|
|
126 | (1) |
|
|
127 | (1) |
|
Knowledge Unit Five: Secure Communication Protocols |
|
|
128 | (4) |
|
Application and Transport Layer Protocols |
|
|
129 | (1) |
|
Attacks on Transport Layer Security |
|
|
130 | (1) |
|
|
131 | (1) |
|
Privacy Preserving Protocols |
|
|
131 | (1) |
|
|
132 | (1) |
|
Knowledge Unit Six: Cryptanalysis |
|
|
132 | (6) |
|
|
134 | (1) |
|
|
135 | (1) |
|
Attacks against Private Key Ciphers |
|
|
135 | (1) |
|
Attacks against Public Key Ciphers |
|
|
136 | (1) |
|
Algorithms for Solving the Discrete Log Problem |
|
|
137 | (1) |
|
|
137 | (1) |
|
Knowledge Unit Seven: Data Privacy |
|
|
138 | (3) |
|
Knowledge Unit Eight: Information Storage Security |
|
|
141 | (6) |
|
|
142 | (1) |
|
|
143 | (2) |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
147 | (2) |
|
You Might Also Like to Read |
|
|
149 | (1) |
|
|
150 | (1) |
|
Learning Objectives for the Data Security Knowledge Area |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
153 | (2) |
|
Chapter 4 Software Security |
|
|
155 | (58) |
|
Building Pathways toward Software Security |
|
|
155 | (1) |
|
The CSEC2017 Software Security Knowledge Units |
|
|
156 | (2) |
|
Knowledge Unit One: Fundamental Principles |
|
|
158 | (11) |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
160 | (1) |
|
|
161 | (1) |
|
|
161 | (1) |
|
|
162 | (1) |
|
Minimize Common Mechanism |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
164 | (2) |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
169 | (1) |
|
Knowledge Unit Two: Design |
|
|
169 | (7) |
|
Derivation of Security Requirements |
|
|
170 | (2) |
|
Specification of Security Requirements |
|
|
172 | (1) |
|
Software Development Life Cycle/Security Development Life Cycle |
|
|
173 | (2) |
|
Programming Languages and Type-Safe Languages |
|
|
175 | (1) |
|
Knowledge Unit Three: Implementation |
|
|
176 | (8) |
|
Validating Input and Checking Its Representation |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
179 | (1) |
|
Checking Time and State Relationships |
|
|
180 | (1) |
|
Handling Exceptions and Errors Properly |
|
|
180 | (1) |
|
|
181 | (2) |
|
Encapsulating Structures and Modules |
|
|
183 | (1) |
|
Taking Environment into Account |
|
|
183 | (1) |
|
Knowledge Unit Four: Analysis and Testing |
|
|
184 | (3) |
|
Static and Dynamic Analysis |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
187 | (1) |
|
Knowledge Unit Five: Deployment and Maintenance |
|
|
187 | (7) |
|
|
190 | (1) |
|
Patching and the Vulnerability Life Cycle |
|
|
191 | (1) |
|
|
192 | (1) |
|
|
192 | (1) |
|
Decommissioning and Retiring |
|
|
193 | (1) |
|
Knowledge Unit Six: Documentation |
|
|
194 | (7) |
|
|
196 | (1) |
|
|
197 | (2) |
|
|
199 | (1) |
|
|
199 | (2) |
|
Knowledge Unit Seven: Ethics |
|
|
201 | (6) |
|
Ethical Issues in Software Development |
|
|
202 | (2) |
|
Social Aspects of Software Development |
|
|
204 | (1) |
|
Legal Aspects of Software Development |
|
|
204 | (1) |
|
|
205 | (1) |
|
What, When, and Why to Test |
|
|
206 | (1) |
|
Twenty Review Questions for This Chapter |
|
|
207 | (1) |
|
You Might Also Like to Read |
|
|
208 | (1) |
|
|
209 | (1) |
|
Learning Objectives for the Component Security Knowledge Area |
|
|
210 | (1) |
|
|
211 | (1) |
|
|
212 | (1) |
|
Chapter 5 Component Security |
|
|
213 | (48) |
|
It All Starts with the Components |
|
|
213 | (4) |
|
The CSEC2017 Component Security Knowledge Units |
|
|
217 | (2) |
|
Knowledge Unit One: Component Design |
|
|
219 | (14) |
|
Component Design Security |
|
|
221 | (3) |
|
Principles of Secure Component Design |
|
|
224 | (5) |
|
|
229 | (1) |
|
Anti-reverse Engineering Techniques |
|
|
230 | (1) |
|
Side Channel Attack Mitigation |
|
|
231 | (1) |
|
|
232 | (1) |
|
Knowledge Unit Two: Component Procurement |
|
|
233 | (6) |
|
|
235 | (1) |
|
|
236 | (2) |
|
|
238 | (1) |
|
Knowledge Unit Three: Component Testing |
|
|
239 | (5) |
|
Principles of Unit Testing |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
244 | (1) |
|
Knowledge Unit Four: Component Reverse Engineering |
|
|
244 | (6) |
|
Design Reverse Engineering |
|
|
246 | (1) |
|
Hardware Reverse Engineering |
|
|
247 | (2) |
|
Software Reverse Engineering |
|
|
249 | (1) |
|
Forty Review Questions: Component Security |
|
|
250 | (1) |
|
You Might Also Like to Read |
|
|
251 | (1) |
|
|
252 | (6) |
|
Learning Objectives for the Component Security Knowledge Area |
|
|
258 | (1) |
|
|
259 | (1) |
|
|
259 | (2) |
|
Chapter 6 Connection Security |
|
|
261 | (76) |
|
Introduction: Hie Challenge of Connecting the Enterprise |
|
|
261 | (3) |
|
The CSEC Connection Security Knowledge Areas |
|
|
264 | (1) |
|
Knowledge Unit One: Physical Media |
|
|
265 | (9) |
|
|
267 | (1) |
|
Shared and Point-to-Point Media |
|
|
268 | (1) |
|
|
269 | (2) |
|
|
271 | (3) |
|
Knowledge Unit Two: Physical Interfaces and Connectors |
|
|
274 | (1) |
|
Hardware Characteristics and Materials |
|
|
274 | (5) |
|
|
276 | (1) |
|
|
277 | (2) |
|
Knowledge Unit Three: Hardware Architecture |
|
|
279 | (5) |
|
|
280 | (1) |
|
Hardware Interface Standards |
|
|
281 | (1) |
|
|
282 | (2) |
|
Knowledge Unit Four: Distributed Systems Architecture |
|
|
284 | (10) |
|
Network Architectures, General Concepts |
|
|
286 | (1) |
|
|
287 | (1) |
|
|
288 | (2) |
|
|
290 | (1) |
|
High Performance Computing (Supercomputers) |
|
|
291 | (1) |
|
Hypervisors and Cloud Computing Implementations |
|
|
292 | (1) |
|
|
293 | (1) |
|
Knowledge Unit Five: Network Architecture |
|
|
294 | (8) |
|
|
296 | (1) |
|
|
297 | (1) |
|
|
298 | (1) |
|
|
299 | (1) |
|
|
300 | (1) |
|
|
301 | (1) |
|
Virtualization and Virtual Hypervisor Architecture |
|
|
302 | (1) |
|
Knowledge Unit Six: Network Implementations |
|
|
302 | (5) |
|
|
303 | (1) |
|
|
304 | (1) |
|
Practical Integration and Ulue Protocols |
|
|
305 | (1) |
|
Vulnerabilities and Example Exploits |
|
|
306 | (1) |
|
Knowledge Unit Seven: Network Services |
|
|
307 | (6) |
|
|
308 | (1) |
|
Service Models (Client-Server, Peer to Peer) |
|
|
309 | (1) |
|
Service Protocols and Concepts (IPC APIs, IDLs) |
|
|
309 | (1) |
|
Common Service Communication Architectures |
|
|
310 | (1) |
|
|
311 | (1) |
|
Vulnerabilities and Example Exploits |
|
|
312 | (1) |
|
Knowledge Unit Eight: Network Defense |
|
|
313 | (16) |
|
|
314 | (2) |
|
Implementing Firewalls and Virtual Private Networks VPNs) |
|
|
316 | (1) |
|
|
317 | (1) |
|
|
318 | (1) |
|
|
319 | (1) |
|
|
319 | (1) |
|
Minimizing Exposure (Attack Surface and Vectors) |
|
|
320 | (1) |
|
Network Access Control (Internal and External) |
|
|
321 | (1) |
|
Perimeter Networks/Proxy Servers |
|
|
322 | (1) |
|
Network Policy Development and Enforcement |
|
|
323 | (1) |
|
Network Operational Procedures |
|
|
323 | (1) |
|
|
324 | (3) |
|
Threat Hunting and Machine Learning |
|
|
327 | (2) |
|
Twenty Review Questions: Connection Security |
|
|
329 | (1) |
|
You Might Also Like to Read |
|
|
330 | (1) |
|
|
331 | (2) |
|
Learning Objectives for the Connection Security Knowledge Area |
|
|
333 | (1) |
|
|
334 | (1) |
|
|
335 | (2) |
|
Chapter 7 System Security |
|
|
337 | (56) |
|
Assembling the Parts into a Useful Whole |
|
|
337 | (1) |
|
The Key Role of Design in Systems |
|
|
338 | (2) |
|
The CSEC2017 System Security Knowledge Units |
|
|
340 | (2) |
|
Knowledge Unit One: System Thinking |
|
|
342 | (9) |
|
|
344 | (2) |
|
What Is Systems Engineering? |
|
|
346 | (1) |
|
Security of General-Purpose Systems |
|
|
346 | (1) |
|
Security of Special-Purposes Systems |
|
|
347 | (1) |
|
|
348 | (1) |
|
|
348 | (1) |
|
|
349 | (2) |
|
|
351 | (1) |
|
Knowledge Unit Two: System Management |
|
|
351 | (7) |
|
|
353 | (1) |
|
|
353 | (1) |
|
|
354 | (1) |
|
Patching and the Vulnerability Life Cycle |
|
|
354 | (1) |
|
|
355 | (2) |
|
Commissioning and Decommissioning |
|
|
357 | (1) |
|
|
357 | (1) |
|
|
357 | (1) |
|
|
358 | (1) |
|
Knowledge Unit Three: System Access |
|
|
358 | (3) |
|
|
360 | (1) |
|
|
360 | (1) |
|
Knowledge Unit Four: System Control |
|
|
361 | (9) |
|
|
362 | (1) |
|
|
363 | (2) |
|
|
365 | (1) |
|
|
366 | (1) |
|
|
367 | (1) |
|
|
367 | (1) |
|
|
368 | (1) |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
369 | (1) |
|
|
370 | (1) |
|
Knowledge Unit Five: System Retirement |
|
|
370 | (2) |
|
|
371 | (1) |
|
Knowledge Unit Six: System Testing |
|
|
372 | (4) |
|
|
373 | (1) |
|
Validating Composition of Components |
|
|
374 | (1) |
|
Unit versus System Testing |
|
|
374 | (1) |
|
Formal Verification of Systems |
|
|
375 | (1) |
|
Knowledge Unit Seven: Common System Architectures |
|
|
376 | (4) |
|
|
378 | (1) |
|
|
378 | (1) |
|
|
378 | (1) |
|
|
379 | (1) |
|
|
380 | (1) |
|
Seventy Review Questions: System Security |
|
|
380 | (3) |
|
You Might Also Like to Read |
|
|
383 | (1) |
|
|
384 | (5) |
|
Learning Objectives for the Component Security Knowledge Area |
|
|
389 | (2) |
|
|
391 | (1) |
|
|
391 | (2) |
|
|
393 | (42) |
|
|
393 | (1) |
|
Ensuring Disciplined Practice |
|
|
394 | (1) |
|
The Challenging Case of Human Behavior |
|
|
395 | (2) |
|
The CSEC2017 Human Security Knowledge Units |
|
|
397 | (1) |
|
Knowledge Unit One: Identity Management |
|
|
398 | (4) |
|
Identification and Authentication of People and Devices |
|
|
400 | (1) |
|
|
400 | (1) |
|
Identity as a Service (IDaaS) |
|
|
401 | (1) |
|
Third-Party Identity Services |
|
|
401 | (1) |
|
Access Control Attacks and Mitigation Measures |
|
|
402 | (1) |
|
Knowledge Unit Two: Social Engineering |
|
|
402 | (4) |
|
Types of Social Engineering Attacks |
|
|
403 | (1) |
|
Psychology of Social Engineering Attacks |
|
|
404 | (1) |
|
|
405 | (1) |
|
Detection and Mitigation of Social Engineering Attacks |
|
|
405 | (1) |
|
Knowledge Unit Three: Personal Compliance |
|
|
406 | (6) |
|
System Misuse and User Misbehavior |
|
|
409 | (1) |
|
Enforcement and Rules of Behavior |
|
|
410 | (1) |
|
Proper Behavior under Uncertainty |
|
|
411 | (1) |
|
Knowledge Unit Four: Awareness and Understanding |
|
|
412 | (3) |
|
|
413 | (1) |
|
Cybersecurity User Education |
|
|
414 | (1) |
|
Cyber Vulnerabilities and Threats Awareness |
|
|
415 | (1) |
|
Knowledge Unit Five: Social and Behavioral Privacy |
|
|
415 | (3) |
|
Social Theories of Privacy |
|
|
417 | (1) |
|
Social Media Privacy and Security |
|
|
417 | (1) |
|
Knowledge Unit Six: Personal Data Privacy and Security |
|
|
418 | (4) |
|
|
420 | (1) |
|
Personal Tracking and Digital Footprint |
|
|
421 | (1) |
|
Knowledge Unit Seven: Usable Security and Privacy |
|
|
422 | (3) |
|
Usability and User Experience |
|
|
422 | (1) |
|
|
423 | (1) |
|
Policy Awareness and Understanding |
|
|
423 | (1) |
|
|
424 | (1) |
|
Design Guidance and Implications |
|
|
424 | (1) |
|
Seventy Review Questions: Human Security |
|
|
425 | (3) |
|
You Might Also Like to Read |
|
|
428 | (2) |
|
|
430 | (1) |
|
Learning Objectives for the Human Security Knowledge Area |
|
|
431 | (2) |
|
|
433 | (1) |
|
|
434 | (1) |
|
Chapter 9 Organizational Security |
|
|
435 | (62) |
|
Introduction Securing the Entire Enterprise |
|
|
435 | (1) |
|
Integrating the Elements of Cybersecurity into an Applied Solution |
|
|
436 | (3) |
|
The CSEC2017 Organizational Security Knowledge Units |
|
|
439 | (1) |
|
Knowledge Area One: Risk Management |
|
|
440 | (6) |
|
|
443 | (1) |
|
Risk Assessment and Analysis |
|
|
443 | (1) |
|
|
444 | (1) |
|
Risk Measurement and Evaluation Models and Methodologies |
|
|
444 | (2) |
|
|
446 | (1) |
|
Knowledge Area Two: Security Governance and Policy |
|
|
446 | (6) |
|
|
447 | (1) |
|
|
448 | (1) |
|
Laws, Ethics, and Compliance |
|
|
449 | (1) |
|
|
450 | (1) |
|
Executive- and Board-Level Communication |
|
|
451 | (1) |
|
|
452 | (1) |
|
Knowledge Area Three: Analytical Tools |
|
|
452 | (3) |
|
Performance Measurements (Metrics) |
|
|
454 | (1) |
|
|
454 | (1) |
|
|
455 | (1) |
|
Knowledge Unit Four: Systems Administration |
|
|
455 | (8) |
|
Operating System Administration |
|
|
457 | (1) |
|
Database System Administration |
|
|
458 | (1) |
|
|
459 | (1) |
|
|
460 | (1) |
|
Cyber-Physical System Administration |
|
|
460 | (2) |
|
|
462 | (1) |
|
|
462 | (1) |
|
Knowledge Area Five: Cybersecurity Planning |
|
|
463 | (3) |
|
|
464 | (1) |
|
Operational and Tactical Management |
|
|
465 | (1) |
|
Knowledge Unit Six: Business Continuity, Disaster Recovery, and Incident Management |
|
|
466 | (5) |
|
|
468 | (1) |
|
|
468 | (2) |
|
|
470 | (1) |
|
Knowledge Unit Seven: Security Program Management |
|
|
471 | (5) |
|
|
472 | (1) |
|
|
473 | (1) |
|
|
474 | (1) |
|
Quality Assurance and Quality Control |
|
|
475 | (1) |
|
Knowledge Unit Eight: Personnel Security |
|
|
476 | (5) |
|
Security Awareness, Training, and Education |
|
|
477 | (1) |
|
Security Hiring Practices |
|
|
478 | (1) |
|
Security Termination Practices |
|
|
479 | (1) |
|
|
480 | (1) |
|
Security in Review Processes |
|
|
480 | (1) |
|
Special Issue in Privacy of Employee Personal Information |
|
|
481 | (1) |
|
Knowledge Unit Nine: Security Operations |
|
|
481 | (4) |
|
|
483 | (1) |
|
Global Security Operations Centers (GSOCs) |
|
|
484 | (1) |
|
Forty Review Questions: Organizational Security |
|
|
485 | (2) |
|
You Might Also Like to Read |
|
|
487 | (1) |
|
|
487 | (1) |
|
|
488 | (5) |
|
Learning Objectives for the Organizational Security Knowledge Area |
|
|
493 | (2) |
|
|
495 | (1) |
|
|
495 | (2) |
|
Chapter 10 Societal Security |
|
|
497 | (58) |
|
Security and Worldwide Connectivity |
|
|
497 | (4) |
|
Virtual Behavior and Diversity |
|
|
498 | (1) |
|
Three Large-Scale Security Concerns: Why We Need Societal Security |
|
|
499 | (2) |
|
The CSEC2017 and the Profession |
|
|
501 | (2) |
|
The CSEC2017 Societal Security Knowledge Units |
|
|
503 | (1) |
|
Knowledge Unit One: Cybercrime |
|
|
504 | (7) |
|
|
505 | (3) |
|
|
508 | (1) |
|
Cybercriminal Investigation |
|
|
509 | (1) |
|
|
510 | (1) |
|
Knowledge Unit Two: Cyber Law |
|
|
511 | (14) |
|
Constitutional Foundations of Cyber Law |
|
|
512 | (3) |
|
Intellectual Property Related to Cybersecurity |
|
|
515 | (2) |
|
|
517 | (1) |
|
|
518 | (1) |
|
|
519 | (1) |
|
|
520 | (1) |
|
|
521 | (2) |
|
Multinational Conventions (Accords) |
|
|
523 | (1) |
|
Cross-Border Privacy and Data Security Laws |
|
|
524 | (1) |
|
Knowledge Unit Three: Cyber Ethics |
|
|
525 | (7) |
|
|
527 | (1) |
|
Professional Ethics and Codes of Conduct |
|
|
528 | (2) |
|
Ethics and Equity/Diversity |
|
|
530 | (1) |
|
|
530 | (1) |
|
Special Areas of Ethics: Robotics, War, and "Ethical" Hacking |
|
|
531 | (1) |
|
Knowledge Unit Four: Cyber Policy |
|
|
532 | (7) |
|
International Cyber Policy |
|
|
534 | (1) |
|
U.S. Federal Cyber Policy |
|
|
535 | (1) |
|
|
536 | (1) |
|
Cybersecurity Policy and National Security |
|
|
537 | (1) |
|
National Economic Implications of Cybersecurity |
|
|
538 | (1) |
|
New Adjacencies to Diplomacy |
|
|
538 | (1) |
|
Knowledge Unit Five: Privacy |
|
|
539 | (7) |
|
|
541 | (1) |
|
|
541 | (1) |
|
|
542 | (1) |
|
Privacy Norms and Attitudes |
|
|
543 | (1) |
|
|
544 | (1) |
|
|
545 | (1) |
|
Fifty Review Questions: Societal Security |
|
|
546 | (3) |
|
You Might Also Like to Read |
|
|
548 | (1) |
|
|
549 | (3) |
|
Learning Objectives for the Human Security Knowledge Area |
|
|
552 | (1) |
|
|
553 | (1) |
|
|
554 | (1) |
Index |
|
555 | |