Muutke küpsiste eelistusi

Security without Obscurity: Frequently Asked Questions (FAQ) [Kõva köide]

  • Formaat: Hardback, 236 pages, kõrgus x laius: 234x156 mm, kaal: 453 g, 44 Tables, black and white; 100 Illustrations, black and white
  • Ilmumisaeg: 20-Apr-2021
  • Kirjastus: CRC Press
  • ISBN-10: 0367486121
  • ISBN-13: 9780367486129
Teised raamatud teemal:
  • Formaat: Hardback, 236 pages, kõrgus x laius: 234x156 mm, kaal: 453 g, 44 Tables, black and white; 100 Illustrations, black and white
  • Ilmumisaeg: 20-Apr-2021
  • Kirjastus: CRC Press
  • ISBN-10: 0367486121
  • ISBN-13: 9780367486129
Teised raamatud teemal:

Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton’s three other Security Without Obscurity books, to provide clear information and answers to the most commonly asked questions about information security solutions that use or rely on cryptography and key management methods. There is good and bad cryptography, bad ways of using good cryptography, and both good and bad key management methods. Consequently, information security solutions often have common but somewhat unique issues. These common and unique issues are expressed as an FAQ organized by related topic areas.

The FAQ in this book can be used as a reference guide to help address such issues. Cybersecurity is based on information technology (IT) that is managed using information security (IS) controls, but there is information, misinformation and disinformation. Information reflects things that are accurate about security standards, models, protocols, algorithms, and products. Misinformation includes misnomers, misunderstandings, and lack of knowledge. Disinformation can occur when marketing claims either misuse or abuse terminology, alluding to things that are inaccurate or subjective. This FAQ provides information and distils misinformation and disinformation about cybersecurity.

This book will be useful to security professionals, technology professionals, assessors, auditors, managers, and hopefully even senior management who want a quick, straightforward answer to their questions. It will serve as a quick reference to always have ready on an office shelf. As any good security professional knows, no one can know everything.

Foreword vi
About the Author xi
1 Book Overview
1(11)
2 Security Basics
12(21)
3 Cryptography
33(41)
4 Key Management
74(30)
5 Public Key Infrastructure (PKI)
104(28)
6 Authentication
132(24)
7 Authorization
156(13)
8 Security Protocols
169(30)
9 Privacy
199(10)
10 Quick Reference Guides
209(17)
References and Standards 226(9)
Index 235
Jeff Stapleton has 30 plus years experience in the financial services industry with 25 years as a security professional involved in developing ANSI and ISO security standards including payments, cryptography, key management, public key infrastructures (PKI) and biometrics. He has also been the X9F4 Cybersecurity and Cryptographic Solutions workgroup chair for over 20 years.

Jeff earned his bachelors and masters degrees in Computer Science from the Universities of Missouri in St. Louis (UMSL) and Rolla (UMR) and has taught Information Security at Washington University in St. Louis (WUSTL) and the University of Texas in San Antonio (UTSA). He has conducted security assessments of payment networks, financial institutions, and assisted in developing secure payment systems. He has authored dozens of ISSA Journal articles, IEEE papers, and chapters in various books, including his own 3 book series Security without Obscurity, which is available from CRC Press.