Foreword |
|
ix | |
Authors |
|
xiii | |
Glossary |
|
xv | |
K-12 Resources |
|
xxi | |
Introduction |
|
xxiii | |
|
Chapter 1 Why You Should Read This Book |
|
|
1 | (18) |
|
How We Plan to Present This? |
|
|
2 | (1) |
|
But First: An Overview of the Contents of the CSEC |
|
|
3 | (1) |
|
The Beginning of the Story: Tom Is Handed a Challenge |
|
|
4 | (15) |
|
Chapter 2 Getting Down to Business: Data Security |
|
|
19 | (30) |
|
Topic One: Why Is Data Security Important? |
|
|
20 | (3) |
|
The Basic Elements of Data Security: Processing, Transmitting, and Storing |
|
|
23 | (6) |
|
Ensuring Secure Data Transmission: Secure Transmission Protocols |
|
|
29 | (4) |
|
Ensuring Secure Data Storage: Information Storage Security |
|
|
33 | (4) |
|
Making Data Indecipherable: Cryptology |
|
|
37 | (4) |
|
Cracking the Code: Cryptanalysis |
|
|
41 | (2) |
|
Forensics: The Investigative Aspect |
|
|
43 | (3) |
|
Privacy: Ensuring Personal Data |
|
|
46 | (3) |
|
Chapter 3 Software Security: Software Underlies Everything |
|
|
49 | (22) |
|
Topic One: Fundamental Principles of Software Security |
|
|
54 | (1) |
|
Thinking about Security in Design |
|
|
55 | (2) |
|
Building the Software Securely |
|
|
57 | (1) |
|
Assuring the Security of the Software |
|
|
58 | (3) |
|
Secure Deployment and Maintenance |
|
|
61 | (3) |
|
Ensuring Proper Documentation |
|
|
64 | (2) |
|
Software Security and Ethics |
|
|
66 | (5) |
|
Chapter 4 Component Security: It All Starts with Components |
|
|
71 | (14) |
|
Designing Secure Components |
|
|
73 | (3) |
|
Assuring the Architecture: Component Testing |
|
|
76 | (4) |
|
Buying Components Instead of Making Them |
|
|
80 | (2) |
|
The Mystery of Reverse Engineering |
|
|
82 | (3) |
|
Chapter 5 Connection Security |
|
|
85 | (34) |
|
The CSEC Connection Security Knowledge Areas |
|
|
89 | (1) |
|
Topic One The Physical Components of the Network |
|
|
89 | (2) |
|
Topic Two Physical Interfaces and Connectors |
|
|
91 | (3) |
|
Topic Three Physical Architecture: The Tangible Part of the Network |
|
|
94 | (4) |
|
Topic Four Building a Distributed System |
|
|
98 | (6) |
|
Topic Five Building a Network |
|
|
104 | (3) |
|
Topic Six The Bits and Pieces of Network Operation |
|
|
107 | (4) |
|
Top Seven The Practical Considerations of Building a Network |
|
|
111 | (4) |
|
Top Eight Network Defense |
|
|
115 | (4) |
|
Chapter 6 System Security: Assembling the Parts into a Useful Whole |
|
|
119 | (26) |
|
Topic One Thinking Systematically |
|
|
122 | (3) |
|
Topic Two Managing What You Create |
|
|
125 | (4) |
|
Topic Three Controlling Access |
|
|
129 | (4) |
|
Topic Four Defending Your System |
|
|
133 | (5) |
|
Topic Five Retiring an Old System Securely |
|
|
138 | (1) |
|
|
138 | (3) |
|
Topic Seven Common System Architectures |
|
|
141 | (4) |
|
Chapter 7 Human Security: Human-Centered Threats |
|
|
145 | (22) |
|
Topic One Identity Management |
|
|
148 | (2) |
|
Topic Two Social Engineering |
|
|
150 | (4) |
|
Topic Three Personal Compliance |
|
|
154 | (3) |
|
Topic Four Awareness and Understanding |
|
|
157 | (1) |
|
Topic Five Social and Behavioral Privacy |
|
|
158 | (3) |
|
Topic Six Personal Data Privacy and Security |
|
|
161 | (2) |
|
Topic Seven Usable Security and Privacy |
|
|
163 | (4) |
|
Chapter 8 Organizational Security: Introduction Securing the Enterprise |
|
|
167 | (20) |
|
Topic One Risk Management |
|
|
169 | (3) |
|
Topic Two Security Management |
|
|
172 | (3) |
|
Topic Three Cybersecurity Planning |
|
|
175 | (2) |
|
Topic Four Business Continuity, Disaster Recovery, and Incident Management |
|
|
177 | (2) |
|
Topic Five Personnel Security |
|
|
179 | (1) |
|
Topic Six Systems Management |
|
|
180 | (4) |
|
Topic Seven Security Program Management, 182 Topic Eight: Security Operations Management |
|
|
184 | (1) |
|
Topic Nine Analytical Tools |
|
|
185 | (2) |
|
Chapter 9 Societal Security: Security and Society |
|
|
187 | |
|
|
189 | (2) |
|
|
191 | (3) |
|
|
194 | (2) |
|
|
196 | (2) |
|
|
198 | |