Cargando…

Cyber Security /

Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector,...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Voeller, John G.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, NJ : Wiley, [2014]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn868965198
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|||||||||
008 140124s2014 nju ob 001 0 eng d
040 |a IDEBK  |b eng  |e rda  |e pn  |c IDEBK  |d EBLCP  |d E7B  |d OCLCO  |d N$T  |d TEFOD  |d DEBSZ  |d OCLCQ  |d YDXCP  |d RECBK  |d TEFOD  |d OCLCQ  |d COCUF  |d S4S  |d CNNOR  |d MOR  |d PIFBY  |d ZCU  |d MERUC  |d OCLCQ  |d SAV  |d U3W  |d STF  |d OCLCF  |d ICG  |d INT  |d VT2  |d AU@  |d OCLCQ  |d WYU  |d G3B  |d TKN  |d OCLCQ  |d DKC  |d OCLCQ  |d U@J  |d OCLCQ  |d YDXIT  |d OCL  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCL  |d OCLCQ  |d OCLCO 
019 |a 874147568  |a 879028879  |a 961555159  |a 962563161 
020 |a 1306373603  |q (electronic book) 
020 |a 9781306373609  |q (electronic book) 
020 |a 9781118651735  |q (electronic book) 
020 |a 1118651731  |q (electronic book) 
020 |a 9781118651681  |q (electronic book) 
020 |a 1118651685  |q (electronic book) 
020 |z 9781118651643 
029 1 |a AU@  |b 000055948032 
029 1 |a DEBBG  |b BV043607169 
029 1 |a DEBSZ  |b 405573456 
035 |a (OCoLC)868965198  |z (OCoLC)874147568  |z (OCoLC)879028879  |z (OCoLC)961555159  |z (OCoLC)962563161 
037 |a 568611  |b MIL 
037 |a FB2BE980-FD20-4479-A1F6-AFE0AB10A766  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25  |b V64 2014 
050 4 |a QA76.9 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Voeller, John G. 
245 1 0 |a Cyber Security /  |c edited by John G. Voeller. 
264 1 |a Hoboken, NJ :  |b Wiley,  |c [2014] 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a Cover -- Title Page -- Contents -- Preface -- Chapter 1 Cyber Security Metrics and Measure -- 1.1 Introduction -- 1.2 Contrasting Metrics and Measures -- 1.3 Selecting Measures to Support Metrics -- 1.4 Problems with the Accuracy of Measures -- 1.5 Problems with the Selection of Measures -- 1.6 Problems with the Use of Measures -- 1.7 Common Vulnerability Scoring System (CVSS) -- 1.8 Research Directions -- References -- Further Reading -- Chapter 2 Multilevel Security -- 2.1 Introduction -- 2.2 Background -- 2.3 Multilevel Security Policies -- 2.3.1 Confinement -- 2.3.2 Supporting Policies -- 2.3.3 Trusted Subjects -- 2.4 Enforcement of Multilevel Security Policies -- 2.4.1 Design Approaches -- 2.4.2 Threats to MLS Systems -- 2.4.3 Assurance -- 2.4.4 Secure MLS System Development -- 2.4.5 Covert Channels -- 2.4.6 Object Reuse Considerations -- 2.4.7 Target Environment -- 2.4.8 Cascade Problem -- 2.5 Platforms and Architectures for Multilevel Security -- 2.5.1 Use of Applications in MLS Systems -- 2.6 Conclusion -- References -- Chapter 3 Trusted Platforms: The Root of Security -- 3.1 Introduction -- 3.2 The State of Trusted Computing -- 3.2.1 Why Hardware Security? -- 3.2.2 Essentials of Trusted Computing -- 3.2.3 Extension to Storage -- 3.2.4 Biometric Devices as Physical Interface -- 3.2.5 Usage Model -- 3.3 International Scope -- 3.3.1 Integration -- 3.3.2 Trusted Software -- 3.3.3 Networking Trusted Platforms -- 3.4 Expanding the Ring of Trust -- 3.5 Remaining Challenges -- References -- Further Reading -- Chapter 4 Cyber Security Technology Usability and Management -- 4.1 Introduction -- 4.2 Usability and Security: Current Research -- 4.2.1 Improving Existing Security Technologies -- 4.3 Systems Management -- 4.4 Web Security and Phishing. 
505 8 |a 4.4.1 Designing New Technologies with Usability in Mind -- 4.4.2 Design Guidelines for Building Better Systems -- 4.5 Open Challenges and Take-Aways -- 4.6 Conclusions -- References -- Further Reading -- Chapter 5 Security of Distributed, Ubiquitous, and Embedded Computing Platforms -- 5.1 Introduction -- 5.2 Scientific Overview -- 5.2.1 Security Properties -- 5.2.2 Constraints on the Design Space -- 5.2.3 Solution Approaches -- 5.2.4 Physical Layer -- 5.2.5 Networking Layers -- 5.2.6 Middleware and Applications -- 5.3 Global Research and Funding -- 5.4 Critical Needs Analysis -- 5.5 Research Directions -- References -- Further Reading -- Chapter 6 Advanced Attacker Detection and Understanding with Emerging Honeynet Technologies -- 6.1 Honeypot Essentials -- 6.2 Honeypot Risk -- Legal and Ethical Issues -- 6.3 Honeynet Technologies -- 6.3.1 Generation III Honeynet -- 6.3.2 Global Distributed Honeynet (GDH) -- 6.3.3 Honeyclients -- 6.3.4 Low-Interaction Malware Collectors -- References -- Chapter 7 Security of Web Application and Services and Service-Oriented Architectures -- 7.1 Introduction -- 7.2 SOA Security Challenges -- 7.3 Secure Web Services for SOA -- 7.3.1 Transport-Based Security -- 7.3.2 Message-Based Security -- 7.4 Web Service Security Directions -- 7.4.1 Federation -- 7.4.2 Identity -- 7.5 Summary -- References -- Chapter 8 Industrial Process Control System Security -- 8.1 Introduction -- 8.2 Background -- 8.2.1 The Problem -- 8.2.2 New Threats -- 8.2.3 The Solution -- 8.3 Scientific Study -- 8.3.1 Correlation Benefits -- 8.3.2 Detection -- 8.3.3 Technical Challenges -- 8.3.4 Implementing Defense and Detection in-Depth -- 8.3.5 Test Bed Operating Model -- 8.4 Summary -- 8.5 Next Steps -- 8.6 Conclusion -- Acknowledgments -- References -- Further Reading. 
505 8 |a Chapter 9 Cyber Security for the Banking and Finance Sector -- 9.1 History of Cooperation -- 9.2 Organizational Roles -- 9.2.1 FSSCC -- 9.2.2 FSSCC Member Organizations -- 9.3 Sample Significant Events -- 9.3.1 Russian Hacker Case -- 9.3.2 Slammer Worm -- 9.3.3 2003 Power Outage -- 9.3.4 Pandemic Planning -- 9.3.5 Operation Firewall -- 9.4 Future Challenges -- Further Reading -- Index. 
520 |a Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed. 
588 0 |a Online resource; title from digital title page (viewed on July 22, 2020). 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Cyberspace  |x Security measures. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Cyberspace  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
776 0 8 |i Print version:  |z 9781306373609 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1598809  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL1598809 
938 |a ebrary  |b EBRY  |n ebr10829812 
938 |a EBSCOhost  |b EBSC  |n 688363 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis27386032 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00198425 
938 |a YBP Library Services  |b YANK  |n 11597388 
938 |a YBP Library Services  |b YANK  |n 11598350 
994 |a 92  |b IZTAP