Foreword |
|
xi | |
Preface |
|
xv | |
Acknowledgments |
|
xxi | |
Author |
|
xxiii | |
Chapter 1 Vulnerabilities In Information Systems |
|
1 | (22) |
|
|
1 | (3) |
|
|
4 | (1) |
|
|
5 | (4) |
|
Avoiding Vulnerabilities through Secure Coding |
|
|
9 | (4) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
15 | (3) |
|
|
18 | (1) |
|
Introducing Countermeasures |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
20 | (3) |
Chapter 2 Vulnerabilities In The Organization |
|
23 | (36) |
|
|
23 | (1) |
|
Common Organizational Vulnerabilities |
|
|
24 | (1) |
|
Access Authorization and Authentication |
|
|
25 | (4) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
31 | (1) |
|
Vulnerabilities in Networks |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
34 | (2) |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
36 | (8) |
|
Wi-Fi Precautions at Home |
|
|
39 | (2) |
|
Wi-Fi Precautions at the Hotspot |
|
|
41 | (2) |
|
Wi-Fi Precautions at the Enterprise |
|
|
43 | (1) |
|
Worldwide Interoperability Microwave Access |
|
|
44 | (3) |
|
|
44 | (3) |
|
|
47 | (3) |
|
|
50 | (4) |
|
|
54 | (1) |
|
Vulnerability Assessment Tools |
|
|
55 | (1) |
|
|
56 | (3) |
Chapter 3 Risks In Information Systems Infrastructure |
|
59 | (22) |
|
|
59 | (1) |
|
|
60 | (4) |
|
|
64 | (3) |
|
|
67 | (2) |
|
|
69 | (2) |
|
|
71 | (1) |
|
Risks in Legacy Infrastructure |
|
|
71 | (1) |
|
Risks in Mobile Telephony |
|
|
72 | (3) |
|
Risk Insurance in Cyberspace |
|
|
75 | (3) |
|
|
78 | (3) |
Chapter 4 Secure Information Systems |
|
81 | (20) |
|
|
81 | (1) |
|
|
82 | (2) |
|
|
84 | (6) |
|
|
90 | (1) |
|
Resource Access Control Facility |
|
|
91 | (1) |
|
Securing the Email Communications |
|
|
92 | (2) |
|
|
93 | (1) |
|
|
93 | (1) |
|
Information Security Management |
|
|
94 | (3) |
|
Encryption Options in Emails |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
98 | (3) |
Chapter 5 Cybersecurity And The CIO |
|
101 | (16) |
|
|
101 | (1) |
|
|
102 | (2) |
|
|
102 | (1) |
|
Communication and Intelligence |
|
|
103 | (1) |
|
Leadership and Entrepreneurship |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (1) |
|
Continuing Education and Skills Acquisition |
|
|
105 | (2) |
|
|
107 | (1) |
|
|
108 | (2) |
|
Data Backup and Archiving |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
|
CIO: Information Security |
|
|
110 | (4) |
|
Internal Information Security Components |
|
|
111 | (1) |
|
Access Control-Electronic |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
111 | (2) |
|
Cyber Awareness and Training |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
Adding Business Value through Cybersecurity |
|
|
115 | (1) |
|
|
116 | (1) |
Chapter 6 Building A Secure Organization |
|
117 | (18) |
|
|
117 | (1) |
|
Business Continuity Planning |
|
|
118 | (5) |
|
Business Impact Analysis (BIA) |
|
|
120 | (1) |
|
Business Recovery Strategy (BRS) |
|
|
121 | (1) |
|
Drafting of the Business Continuity Plan |
|
|
121 | (1) |
|
Testing of the Business Continuity Plan |
|
|
122 | (1) |
|
Training in Business Continuity Plan Implementation |
|
|
122 | (1) |
|
Business Continuity Plan Performance Indicators |
|
|
122 | (1) |
|
|
123 | (2) |
|
System Development and Maintenance |
|
|
125 | (1) |
|
Physical and Environmental Security |
|
|
126 | (1) |
|
|
127 | (2) |
|
|
129 | (1) |
|
|
129 | (1) |
|
Computer and Network Management |
|
|
129 | (1) |
|
Asset Classification and Control |
|
|
130 | (1) |
|
|
130 | (1) |
|
Encryption Key Management |
|
|
131 | (1) |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
133 | (2) |
Chapter 7 Cyberspace Intrusions |
|
135 | (26) |
|
|
135 | (1) |
|
|
136 | (5) |
|
|
137 | (3) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
141 | (3) |
|
|
141 | (1) |
|
|
141 | (1) |
|
|
142 | (2) |
|
|
144 | (1) |
|
|
144 | (5) |
|
|
144 | (3) |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
149 | (7) |
|
|
149 | (2) |
|
|
151 | (1) |
|
Network Behavior Analysis System |
|
|
152 | (2) |
|
|
154 | (2) |
|
|
156 | (1) |
|
Predicting Cybersecurity Attacks |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
159 | (2) |
Chapter 8 Cyberspace Defense |
|
161 | (20) |
|
|
161 | (1) |
|
File Protection Applications |
|
|
161 | (7) |
|
|
161 | (2) |
|
|
163 | (2) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
167 | (1) |
|
PC Performance Applications |
|
|
168 | (3) |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
171 | (8) |
|
|
171 | (2) |
|
|
173 | (2) |
|
|
175 | (3) |
|
|
177 | (1) |
|
|
177 | (1) |
|
Application-Level Gateway |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
179 | (2) |
Chapter 9 Cyberspace And The Law |
|
181 | (32) |
|
|
181 | (1) |
|
|
182 | (5) |
|
|
182 | (1) |
|
|
183 | (1) |
|
North Atlantic Treaty Organization |
|
|
184 | (2) |
|
|
186 | (1) |
|
Impediments to Cyber Law Enforcement |
|
|
186 | (1) |
|
Cyber-Related Laws in the United States |
|
|
187 | (14) |
|
National Cybersecurity Protection Act of 2014 |
|
|
189 | (1) |
|
Cybersecurity Workforce Assessment Act of 2014 |
|
|
189 | (1) |
|
Cybersecurity Workforce Recruitment and Retention Act of 2014 |
|
|
190 | (1) |
|
Commercial Privacy Bill of Rights Act of 2011 |
|
|
190 | (2) |
|
Cybersecurity Act of 2010 |
|
|
192 | (2) |
|
Federal Information Security Management Act of 2002 |
|
|
194 | (2) |
|
|
196 | (1) |
|
Communications Assistance for Law Enforcement Act of 1994 |
|
|
197 | (2) |
|
Computer Security Act of 1987 |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
201 | (5) |
|
|
202 | (1) |
|
|
202 | (4) |
|
|
206 | (1) |
|
|
206 | (1) |
|
Cybersecurity in Maritime |
|
|
207 | (3) |
|
|
210 | (3) |
Chapter 10 Cyber Warfare And Homeland Security |
|
213 | (30) |
|
|
213 | (1) |
|
|
214 | (10) |
|
|
216 | (3) |
|
|
219 | (4) |
|
|
223 | (1) |
|
|
224 | (4) |
|
National Cyber Security Division |
|
|
227 | (1) |
|
Cybersecurity Preparedness |
|
|
228 | (2) |
|
Cyberspace Security Challenges |
|
|
228 | (2) |
|
|
230 | (7) |
|
Cybersecurity Countermeasures |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
233 | (1) |
|
Cyber Simulation and Exercises |
|
|
234 | (3) |
|
Warfare Information in an Information Warfare Terrain |
|
|
237 | (2) |
|
Developing a National Strategy for Cybersecurity |
|
|
239 | (1) |
|
|
240 | (3) |
Chapter 11 Digital Currencies |
|
243 | (6) |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
245 | (1) |
|
|
246 | (1) |
|
Cybercrime in the Cryptocurrencies Domain |
|
|
246 | (1) |
|
Purchasing Cryptocurrencies |
|
|
247 | (1) |
|
|
248 | (1) |
Chapter 12 Transformation Of Traditional Crime Into Cybercrime |
|
249 | (14) |
|
|
249 | (2) |
|
|
251 | (1) |
|
|
252 | (1) |
|
Investigating Electronic Crimes |
|
|
253 | (1) |
|
|
254 | (1) |
|
Investigating Cybercrimes |
|
|
255 | (1) |
|
|
255 | (3) |
|
|
255 | (2) |
|
|
257 | (1) |
|
|
257 | (1) |
|
|
257 | (1) |
|
|
258 | (1) |
|
|
258 | (1) |
|
|
259 | (2) |
|
|
259 | (1) |
|
Suicides and Disappearances |
|
|
260 | (1) |
|
|
261 | (1) |
|
|
261 | (2) |
References |
|
263 | (14) |
Index |
|
277 | |