- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
Based on related courses and research on the cyber environment in Europe, the United States, and Asia, Cyberspace and Cybersecurity supplies complete coverage of cyberspace and cybersecurity. It not only emphasizes technologies but also pays close attention to human factors and organizational perspectives.Detailing guidelines for quantifying and measuring vulnerabilities, the book also explains how to avoid these vulnerabilities through secure coding. It covers organizational-related vulnerabilities, including access authorization, user authentication, and human factors in information security. Providing readers with the understanding required to build a secure enterprise, block intrusions, and handle delicate legal and ethical issues, the text:Examines the risks inherent in information system components, namely hardware, software, and peopleExplains why asset identification should be the cornerstone of any information security strategy Identifies the traits a CIO must have to address cybersecurity challengesDescribes how to ensure business continuity in the event of adverse incidents, including acts of nature Considers intrusion detection and prevention systems (IDPS), focusing on configurations, capabilities, selection, management, and deploymentExplaining how to secure a computer against malware and cyber attacks, the text's wide-ranging coverage includes security analyzers, firewalls, antivirus software, file shredding, file encryption, and anti-loggers. It reviews international and U.S. federal laws and legal initiatives aimed at providing a legal infrastructure for what transpires over the Internet. The book concludes by examining the role of the U.S. Department of Homeland Security in our country's cyber preparedness.Exercises with solutions, updated references, electronic presentations, evaluation criteria for projects, guidelines to project preparations, and teaching suggestions are available upon qualified course adoption.
Contents
Vulnerabilities in Information SystemsIntroductionMeasuring VulnerabilityAvoiding Vulnerabilities through Secure CodingMistakes Can Be GoodThreats ClassificationThreat Modeling ProcessSecurity Starts at HomeSecurity in ApplicationsInternational AwarenessExercisesVulnerabilities in the OrganizationIntroductionCommon Organizational VulnerabilitiesAccess Authorization and AuthenticationHuman FactorsSecurity ServicesExternal TechnologiesWireless NetworksBluetoothPassive VulnerabilitiesActive VulnerabilitiesPrecautionsWireless FidelityWi-Fi Precautions at HomeWi-Fi Precautions at the HotspotWi-Fi Precautions at the EnterpriseWorldwide Interoperability Microwave AccessWiMAX FeaturesCloud ComputingExercisesRisks in Information Systems InfrastructureIntroductionRisks in HardwareRisks in SoftwareRisks in PeopleRisks in LaptopsRisks in CyberspaceRisk Insurance in CyberspaceExercisesSecure Information SystemsIntroductionAssets IdentificationAssets CommunicationAssets StorageResource Access Control FacilitySecuring the Email CommunicationsEmail Server SideEmail Client SideInformation Security ManagementExercisesCybersecurity and the CIOIntroductionCIO: PersonalityTrust and EthicsCommunication and IntelligenceLeadership and EntrepreneurshipCourage and LimitationsCIO: EducationUniversity DegreesCertificationsCIO: ExperienceExperienceCIO: ResponsibilitiesData Backup and ArchivingCulture of SecurityCyber TrainingContingency PlansLiabilityCIO: Information SecurityInternal Information Security ComponentsAccess Control-ElectronicAccess Control-PhysicalCyber PoliciesCyber Awareness and TrainingTrainingBusiness ContinuityCIO: The Changing RoleExercisesBuilding a Secure OrganizationIntroductionBusiness Continuity PlanningBusiness Impact Analysis (BIA)Business Recovery Strategy (BRS)Drafting of the BCPTesting of the BCPTraining in the BCP ImplementationBCP Performance IndicatorsSystem Access ControlSystem Development and MaintenancePhysical and Environmental SecurityCompliancePersonnel SecuritySecurity OrganizationComputer and Network ManagementAsset Classification and ControlSecurity PolicyExercisesCyberspace IntrusionsIntroductionIDPS ConfigurationSensorsProcessorConsolesNetworkIDPS CapabilitiesInformation AcquisitionInformation LoggingsDetection TechniquesPrevention ActionsIDPS ManagementImplementationStep One: FeaturesStep Two: ArchitectureStep Three: InstallationStep Four: TestingStep Five: ActivationOperationMaintenanceIDPS ClassificationHost-Based IDPSNetwork-Based IDPSNetwork Behavior Analysis SystemWireless IDPSIDPS ComparisonExercisesCyberspace DefenseIntroductionFile Protection ApplicationsFile BackupDisaster RecoveryHistory DeletionShredding and WipingFile UndeleteFile EncryptionLoggersAnti-LoggersPC Performance ApplicationsRegistry RepairAnti-RootkitsAntivirusJunk FilesFragmentationProtection ToolsSecurity AnalyzerPassword AnalyzerFirewallsPacket-Level FilteringCircuit-Level FilteringApplication-Level GatewayEmail ProtectionExercisesCyberspace and the LawIntroductionInternational LawsEuropeUnited NationsNorth Atlantic Treaty OrganizationINTERPOLImpediments to Cyber Law EnforcementCyber-Related Laws in the United StatesThe Commercial Privacy Bill of Rights Act of 2011The Cybersecurity Act of 2010The Federal Information Security Management Act of 2002The USA PATRIOT Act of 2001The Communications Assistance for Law Enforcement Act of 1994Computer Security Act of 1987The Privacy Act of 1974CybercrimeTrends in Cyber AbuseCombating CybercrimeExercisesCyber Warfare and Homeland SecurityIntroductionCyber WarfareCyber Weapons ConventionCyber TerrorismCyber EspionageHomeland SecurityNational Cyber Security DivisionCybersecurity PreparednessChallengesDistributed DefenseCountermeasuresThe Cyber Defense EcosystemCybersecurity TrainingCyber Simulation and ExercisesExercisesReferencesIndex



