Cyberspace and Cybersecurity, Second Edition.
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
London :
CRC Press,
2017.
|
Edición: | 2nd ed. |
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover
- Half Title
- Title Page
- Copyright Page
- Table of Contents
- Foreword
- Preface
- The Modern World
- Purpose and Audience
- The Book
- Acknowledgments
- Author
- Chapter 1: Vulnerabilities in Information Systems
- Introduction
- Causes of Vulnerability
- Measuring Vulnerability
- Avoiding Vulnerabilities through Secure Coding
- Mistakes Can Be Good
- Threats Classification
- Threat Modeling Process
- Security Starts at Home
- Security in Applications
- Introducing Countermeasures
- International Awareness Exercises
- Chapter 2: Vulnerabilities in the Organization
- Introduction
- Common Organizational Vulnerabilities
- Access Authorization and Authentication
- Human Factors
- Security Services
- External Technologies
- Vulnerabilities in Networks
- Wireless Networks
- Bluetooth
- Passive Vulnerabilities
- Active Vulnerabilities
- Precautions
- Wireless Fidelity
- Wi-Fi Precautions at Home
- Wi-Fi Precautions at the Hotspot
- Wi-Fi Precautions at the Enterprise
- Worldwide Interoperability Microwave Access WiMAX Features
- Cloud Computing
- Internet of Things
- Automotive Cybersecurity
- Vulnerability Assessment Tools
- Exercises
- Chapter 3: Risks in Information Systems Infrastructure
- Introduction
- Risks in Hardware
- Risks in Software
- Risks in People
- Risks in Laptops
- Risks in Cyberspace
- Risks in Legacy Infrastructure
- Risks in Mobile Telephony
- Risk Insurance in Cyberspace
- Exercises
- Chapter 4: Secure Information Systems
- Introduction
- Assets Identification Assets Communication
- Assets Storage
- Resource Access Control Facility
- Securing the Email Communications
- Email Server Side
- Email Client Side
- Information Security Management
- Encryption Options in Emails
- Steganography
- Exercises
- Chapter 5: Cybersecurity and the CIO
- Introduction
- CIO: Personality
- Trust and Ethics
- Communication and Intelligence
- Leadership and Entrepreneurship
- Courage and Limitations
- CIO: Education
- University Degrees
- Certifications
- Continuing Education and Skills Acquisition CIO: Experience
- CIO: Responsibilities
- Data Backup and Archiving
- Culture of Security
- Cyber Training
- Contingency Plans
- Liability
- CIO: Information Security
- Internal Information Security Components
- Access Controlâ#x80;#x94;Electronic Here, we have three questions: Who? What? How? Sometimes one more question is added: When? Todayâ#x80;#x99;s database systems allow access control down to the cell of a spreadsheet. Programming security to that level might be tedious, but
- ""Access Controlâ#x80;#x94;Physical In an enterprise, it is often the case where access is granted for specific areas of the facilities. In such cases, combination locks or card swiping devices allow authorized access. In the former case, the drawback is possible los""