Cyberspace and Cybersecurity.
Material type:
- text
- computer
- online resource
- 9781351651653
- 005.8
- TK5105.59.K6787 2018
Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Foreword -- Preface -- The Modern World -- Purpose and Audience -- The Book -- Acknowledgments -- Author -- Chapter 1: Vulnerabilities in Information Systems -- Introduction -- Causes of Vulnerability -- Measuring Vulnerability -- Avoiding Vulnerabilities through Secure Coding -- Mistakes Can Be Good -- Threats Classification -- Threat Modeling Process -- Security Starts at Home -- Security in Applications -- Introducing Countermeasures -- International Awareness -- Exercises -- Chapter 2: Vulnerabilities in the Organization -- Introduction -- Common Organizational Vulnerabilities -- Access Authorization and Authentication -- Human Factors -- Security Services -- External Technologies -- Vulnerabilities in Networks -- Wireless Networks -- Bluetooth -- Passive Vulnerabilities -- Active Vulnerabilities -- Precautions -- Wireless Fidelity -- Wi-Fi Precautions at Home -- Wi-Fi Precautions at the Hotspot -- Wi-Fi Precautions at the Enterprise -- Worldwide Interoperability Microwave Access -- WiMAX Features -- Cloud Computing -- Internet of Things -- Automotive Cybersecurity -- Vulnerability Assessment Tools -- Exercises -- Chapter 3: Risks in Information Systems Infrastructure -- Introduction -- Risks in Hardware -- Risks in Software -- Risks in People -- Risks in Laptops -- Risks in Cyberspace -- Risks in Legacy Infrastructure -- Risks in Mobile Telephony -- Risk Insurance in Cyberspace -- Exercises -- Chapter 4: Secure Information Systems -- Introduction -- Assets Identification -- Assets Communication -- Assets Storage -- Resource Access Control Facility -- Securing the Email Communications -- Email Server Side -- Email Client Side -- Information Security Management -- Encryption Options in Emails -- Steganography -- Exercises -- Chapter 5: Cybersecurity and the CIO.
Introduction -- CIO: Personality -- Trust and Ethics -- Communication and Intelligence -- Leadership and Entrepreneurship -- Courage and Limitations -- CIO: Education -- University Degrees -- Certifications -- Continuing Education and Skills Acquisition -- CIO: Experience -- CIO: Responsibilities -- Data Backup and Archiving -- Culture of Security -- Cyber Training -- Contingency Plans -- Liability -- CIO: Information Security -- Internal Information Security Components -- Access Control-Electronic Here, we have three questions: Who? What? How? Sometimes one more question is added: When? Today's database systems allow access control down to the cell of a spreadsheet. Programming security to that level might be tedious, but -- Access Control-Physical In an enterprise, it is often the case where access is granted for specific areas of the facilities. In such cases, combination locks or card swiping devices allow authorized access. In the former case, the drawback is possible los -- Cyber Policies -- Cyber Awareness and Training Cyber awareness is "protecting your personal information... and... keeping your computer safe and secure" [10]. The CIO promotes cybersecurity awareness through in-house communications, such as occasional email-newsletters and -- Training -- Business Continuity -- CIO: The Changing Role -- Adding Business Value through Cybersecurity -- Exercises -- Chapter 6: Building a Secure Organization -- Introduction -- Business Continuity Planning -- Business Impact Analysis (BIA) -- Business Recovery Strategy (BRS) -- Drafting of the Business Continuity Plan -- Testing of the Business Continuity Plan -- Training in Business Continuity Plan Implementation -- Business Continuity Plan Performance Indicators -- System Access Control -- System Development and Maintenance -- Physical and Environmental Security -- Compliance.
Personnel Security -- Security Organization -- Computer and Network Management -- Asset Classification and Control -- Security Policy -- Encryption Key Management -- EKM Features -- Key Selection -- Algorithms -- Exercises -- Chapter 7: Cyberspace Intrusions -- Introduction -- IDPS Configuration -- Sensors -- Processor -- Consoles -- Network -- IDPS Capabilities -- Information Acquisition -- Information Loggings -- Detection Techniques -- Prevention Actions -- IDPS Management -- Implementation -- Step One: Features -- Step Two: Architecture -- Step Three: Installation -- Step Four: Testing -- Step Five: Activation -- Operation -- Maintenance -- IDPS Classification -- Host-Based IDPS -- Network-Based IDPS -- Network Behavior Analysis System -- Wireless IDPS -- IDPS Comparison -- Predicting Cybersecurity Attacks -- Cybersecurity Trends -- Ransomware -- Exercises -- Chapter 8: Cyberspace Defense -- Introduction -- File Protection Applications -- File Backup -- Disaster Recovery -- History Deletion -- Shredding and Wiping -- File Undelete -- File Encryption -- Loggers -- Anti-Loggers -- PC Performance Applications -- Registry Repair -- Anti-Rootkits -- Antivirus -- Junk Files -- Fragmentation -- Protection Tools -- Security Analyzer -- Password Analyzer -- Firewalls -- Packet-Level Filtering -- Circuit-Level Filtering -- Application-Level Gateway -- Email Protection -- Exercises -- Chapter 9: Cyberspace and the Law -- Introduction -- International Laws -- Europe -- United Nations -- North Atlantic Treaty Organization -- INTERPOL -- Impediments to Cyber Law Enforcement -- Cyber-Related Laws in the United States -- National Cybersecurity Protection Act of 2014 -- Cybersecurity Workforce Assessment Act of 2014 -- Cybersecurity Workforce Recruitment and Retention Act of 2014 -- Commercial Privacy Bill of Rights Act of 2011 [15].
Cybersecurity Act of 2010 [16] -- Federal Information Security Management Act of 2002 [17] -- USA PATRIOT Act of 2001 [20] -- Communications Assistance for Law Enforcement Act of 1994 [22] -- Computer Security Act of 1987 [24] -- Privacy Act of 1974 [26] -- Cybercrime -- Trends in Cyber Abuse -- Combating Cybercrime -- Cybercrime in Banking -- Cybercrime in e-Commerce -- Cybersecurity in Maritime -- Appendix 9.A: Cybercrime Activities -- Appendix 9.B: Cyber Resources: Organizations Concerned with the Fight against Cybercrime, a Partial List -- Exercises -- Chapter 10: Cyber Warfare and Homeland Security -- Introduction -- Cyber Warfare -- Cyber Weapons Convention -- Cyber Terrorism -- Cyber Espionage -- Homeland Security -- National Cyber Security Division -- Cybersecurity Preparedness -- Cyberspace Security Challenges -- Distributed Defense -- Cybersecurity Countermeasures -- Cyber Defense Ecosystem -- Cybersecurity Training -- Cyber Simulation and Exercises -- Warfare Information in an Information Warfare Terrain -- Developing a National Strategy for Cybersecurity -- Exercises -- Chapter 11: Digital Currencies -- Introduction -- The Blockchain Concept -- Cryptocurrencies -- Bitcoin -- Cryptocurrency Wallet -- Cybercrime in the Cryptocurrencies Domain -- Purchasing Cryptocurrencies -- Exercises -- Chapter 12: Transformation of Traditional Crime into Cybercrime -- Introduction -- Electronic Crime -- Forms of Cybercrime -- Investigating Electronic Crimes -- Hackers and Crackers -- Investigating Cybercrimes -- Financial Cyber Scams -- The Nigerian Letter -- The Spanish Lotto -- Data Phishing -- Software Piracy -- Credit Cards -- Chat Rooms -- Trends in Cybercrime -- Cyber Bullying -- Suicides and Disappearances -- Conclusion -- Exercises -- References -- Chapter One -- Chapter Two -- Chapter Three -- Chapter Four -- Chapter Five -- Chapter Six.
Chapter Seven -- Chapter Eight -- Chapter Nine -- Chapter Ten -- Index.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
There are no comments on this title.