Muutke küpsiste eelistusi

Cyberspace and Cybersecurity 2nd edition [Kõva köide]

(University of Maryland University College, Adelphi, USA)
  • Formaat: Hardback, 292 pages, kõrgus x laius: 234x156 mm, kaal: 620 g, 45 Tables, black and white; 38 Line drawings, black and white; 21 Halftones, black and white; 59 Illustrations, black and white
  • Ilmumisaeg: 01-Nov-2017
  • Kirjastus: CRC Press
  • ISBN-10: 1138057711
  • ISBN-13: 9781138057715
  • Kõva köide
  • Hind: 71,04 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 100,29 €
  • Säästad 29%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Hardback, 292 pages, kõrgus x laius: 234x156 mm, kaal: 620 g, 45 Tables, black and white; 38 Line drawings, black and white; 21 Halftones, black and white; 59 Illustrations, black and white
  • Ilmumisaeg: 01-Nov-2017
  • Kirjastus: CRC Press
  • ISBN-10: 1138057711
  • ISBN-13: 9781138057715
Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates include topics such as cyber risks in mobile telephony, steganography, cybersecurity as an added value, ransomware defense, review of recent cyber laws, new types of cybercrime, plus new chapters on digital currencies and encryption key management.
Foreword xi
Preface xv
Acknowledgments xxi
Author xxiii
Chapter 1 Vulnerabilities In Information Systems 1(22)
Introduction
1(3)
Causes of Vulnerability
4(1)
Measuring Vulnerability
5(4)
Avoiding Vulnerabilities through Secure Coding
9(4)
Mistakes Can Be Good
13(1)
Threats Classification
14(1)
Threat Modeling Process
15(1)
Security Starts at Home
15(3)
Security in Applications
18(1)
Introducing Countermeasures
19(1)
International Awareness
20(1)
Exercises
20(3)
Chapter 2 Vulnerabilities In The Organization 23(36)
Introduction
23(1)
Common Organizational Vulnerabilities
24(1)
Access Authorization and Authentication
25(4)
Human Factors
29(1)
Security Services
30(1)
External Technologies
31(1)
Vulnerabilities in Networks
32(1)
Wireless Networks
33(1)
Bluetooth
34(2)
Passive Vulnerabilities
35(1)
Active Vulnerabilities
35(1)
Precautions
36(1)
Wireless Fidelity
36(8)
Wi-Fi Precautions at Home
39(2)
Wi-Fi Precautions at the Hotspot
41(2)
Wi-Fi Precautions at the Enterprise
43(1)
Worldwide Interoperability Microwave Access
44(3)
WiMAX Features
44(3)
Cloud Computing
47(3)
Internet of Things
50(4)
Automotive Cybersecurity
54(1)
Vulnerability Assessment Tools
55(1)
Exercises
56(3)
Chapter 3 Risks In Information Systems Infrastructure 59(22)
Introduction
59(1)
Risks in Hardware
60(4)
Risks in Software
64(3)
Risks in People
67(2)
Risks in Laptops
69(2)
Risks in Cyberspace
71(1)
Risks in Legacy Infrastructure
71(1)
Risks in Mobile Telephony
72(3)
Risk Insurance in Cyberspace
75(3)
Exercises
78(3)
Chapter 4 Secure Information Systems 81(20)
Introduction
81(1)
Assets Identification
82(2)
Assets Communication
84(6)
Assets Storage
90(1)
Resource Access Control Facility
91(1)
Securing the Email Communications
92(2)
Email Server Side
93(1)
Email Client Side
93(1)
Information Security Management
94(3)
Encryption Options in Emails
97(1)
Steganography
98(1)
Exercises
98(3)
Chapter 5 Cybersecurity And The CIO 101(16)
Introduction
101(1)
CIO: Personality
102(2)
Trust and Ethics
102(1)
Communication and Intelligence
103(1)
Leadership and Entrepreneurship
103(1)
Courage and Limitations
104(1)
CIO: Education
104(1)
University Degrees
104(1)
Certifications
105(1)
Continuing Education and Skills Acquisition
105(2)
CIO: Experience
107(1)
CIO: Responsibilities
108(2)
Data Backup and Archiving
109(1)
Culture of Security
109(1)
Cyber Training
109(1)
Contingency Plans
109(1)
Liability
110(1)
CIO: Information Security
110(4)
Internal Information Security Components
111(1)
Access Control-Electronic
111(1)
Access Control-Physical
111(1)
Cyber Policies
111(2)
Cyber Awareness and Training
112(1)
Training
113(1)
Business Continuity
113(1)
CIO: The Changing Role
114(1)
Adding Business Value through Cybersecurity
115(1)
Exercises
116(1)
Chapter 6 Building A Secure Organization 117(18)
Introduction
117(1)
Business Continuity Planning
118(5)
Business Impact Analysis (BIA)
120(1)
Business Recovery Strategy (BRS)
121(1)
Drafting of the Business Continuity Plan
121(1)
Testing of the Business Continuity Plan
122(1)
Training in Business Continuity Plan Implementation
122(1)
Business Continuity Plan Performance Indicators
122(1)
System Access Control
123(2)
System Development and Maintenance
125(1)
Physical and Environmental Security
126(1)
Compliance
127(2)
Personnel Security
129(1)
Security Organization
129(1)
Computer and Network Management
129(1)
Asset Classification and Control
130(1)
Security Policy
130(1)
Encryption Key Management
131(1)
EKM Features
131(1)
Key Selection
132(1)
Algorithms
132(1)
Exercises
133(2)
Chapter 7 Cyberspace Intrusions 135(26)
Introduction
135(1)
IDPS Configuration
136(5)
Sensors
137(3)
Processor
140(1)
Consoles
140(1)
Network
140(1)
IDPS Capabilities
141(3)
Information Acquisition
141(1)
Information Loggings
141(1)
Detection Techniques
142(2)
Prevention Actions
144(1)
IDPS Management
144(5)
Implementation
144(3)
Step One: Features
145(1)
Step Two: Architecture
145(1)
Step Three: Installation
146(1)
Step Four: Testing
146(1)
Step Five: Activation
146(1)
Operation
147(1)
Maintenance
148(1)
IDPS Classification
149(7)
Host-Based IDPS
149(2)
Network-Based IDPS
151(1)
Network Behavior Analysis System
152(2)
Wireless IDPS
154(2)
IDPS Comparison
156(1)
Predicting Cybersecurity Attacks
157(1)
Cybersecurity Trends
158(1)
Ransomware
159(1)
Exercises
159(2)
Chapter 8 Cyberspace Defense 161(20)
Introduction
161(1)
File Protection Applications
161(7)
File Backup
161(2)
Disaster Recovery
163(2)
History Deletion
165(1)
Shredding and Wiping
165(1)
File Undelete
165(1)
File Encryption
166(1)
Loggers
166(1)
Anti-Loggers
167(1)
PC Performance Applications
168(3)
Registry Repair
168(1)
Anti-Rootkits
169(1)
Antivirus
169(1)
Junk Files
170(1)
Fragmentation
170(1)
Protection Tools
171(8)
Security Analyzer
171(2)
Password Analyzer
173(2)
Firewalls
175(3)
Packet-Level Filtering
177(1)
Circuit-Level Filtering
177(1)
Application-Level Gateway
177(1)
Email Protection
178(1)
Exercises
179(2)
Chapter 9 Cyberspace And The Law 181(32)
Introduction
181(1)
International Laws
182(5)
Europe
182(1)
United Nations
183(1)
North Atlantic Treaty Organization
184(2)
INTERPOL
186(1)
Impediments to Cyber Law Enforcement
186(1)
Cyber-Related Laws in the United States
187(14)
National Cybersecurity Protection Act of 2014
189(1)
Cybersecurity Workforce Assessment Act of 2014
189(1)
Cybersecurity Workforce Recruitment and Retention Act of 2014
190(1)
Commercial Privacy Bill of Rights Act of 2011
190(2)
Cybersecurity Act of 2010
192(2)
Federal Information Security Management Act of 2002
194(2)
USA PATRIOT Act of 2001
196(1)
Communications Assistance for Law Enforcement Act of 1994
197(2)
Computer Security Act of 1987
199(1)
Privacy Act of 1974
200(1)
Cybercrime
201(5)
Trends in Cyber Abuse
202(1)
Combating Cybercrime
202(4)
Cybercrime in Banking
206(1)
Cybercrime in e-Commerce
206(1)
Cybersecurity in Maritime
207(3)
Exercises
210(3)
Chapter 10 Cyber Warfare And Homeland Security 213(30)
Introduction
213(1)
Cyber Warfare
214(10)
Cyber Weapons Convention
216(3)
Cyber Terrorism
219(4)
Cyber Espionage
223(1)
Homeland Security
224(4)
National Cyber Security Division
227(1)
Cybersecurity Preparedness
228(2)
Cyberspace Security Challenges
228(2)
Distributed Defense
230(7)
Cybersecurity Countermeasures
231(1)
Cyber Defense Ecosystem
232(1)
Cybersecurity Training
233(1)
Cyber Simulation and Exercises
234(3)
Warfare Information in an Information Warfare Terrain
237(2)
Developing a National Strategy for Cybersecurity
239(1)
Exercises
240(3)
Chapter 11 Digital Currencies 243(6)
Introduction
243(1)
The Blockchain Concept
243(1)
Cryptocurrencies
244(1)
Bitcoin
245(1)
Cryptocurrency Wallet
246(1)
Cybercrime in the Cryptocurrencies Domain
246(1)
Purchasing Cryptocurrencies
247(1)
Exercises
248(1)
Chapter 12 Transformation Of Traditional Crime Into Cybercrime 249(14)
Introduction
249(2)
Electronic Crime
251(1)
Forms of Cybercrime
252(1)
Investigating Electronic Crimes
253(1)
Hackers and Crackers
254(1)
Investigating Cybercrimes
255(1)
Financial Cyber Scams
255(3)
The Nigerian Letter
255(2)
The Spanish Lotto
257(1)
Data Phishing
257(1)
Software Piracy
257(1)
Credit Cards
258(1)
Chat Rooms
258(1)
Trends in Cybercrime
259(2)
Cyber Bullying
259(1)
Suicides and Disappearances
260(1)
Conclusion
261(1)
Exercises
261(2)
References 263(14)
Index 277
Dr. George K. Kostopoulos is a faculty member at the University of Maryland University College, where he serves and teaches as a faculty mentor in the masters degree programs in cybersecurity and information assurance. Dr. Kostopoulos has an extensive international academic career, having taught in seventeen universities around the world, including Boston University, Texas A&M International University, Florida Atlantic University, the University of Heidelberg (Germany), and the American University of Sharjah (UAE). He is the author of numerous scholarly papers and two other books, "Digital Engineering" and "Greece and the European Economic Community." Dr. Kostopoulos received his masters and PhD degrees in electrical and computer engineering from the Arizona State University, and a masters in economics from California State Polytechnic University. He is the founder and editor-in-chief of the Journal of Cybersecurity and Information Assurance and a reviewer of numerous scientific conferences.