Cargando…

The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity /

Cybersecurity experts from across industries and sectors share insights on how to think like scientists to master cybersecurity challenges Humankind's efforts to explain the origin of the cosmos birthed disciplines such as physics and chemistry. Scientists conceived of the cosmic 'Big Bang...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Quade, Phil
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, IN : Wiley, 2019.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover; Title Page; Copyright; About the Author; Contributors; Acknowledgments; Content; Introduction; The Cosmic Big Bang: The Birth of the Physical Universe and the Human Society That Emerged; The Digital Big Bang: The Birth of the Digital Universe; The Scientific Revolution; The Bang Begins; What We Got Right; What We Got Wrong; An Unwarranted Assumption of Trust; An Honest Assessment of the Current State; What Cybercrimes Exploit; What We Can Get Right Now; The Digital Nucleus; Section 1 Binding Strategies: The Core of Cybersecurity; Chapter 1 Speed; Speed: The Nucleus of the Cyberfrontier
  • Is Speed an Advantage? It Depends on the ContextChapter 2 Connectivity; Managing the Intensifying Connectivity of the IoT Era; Cyberspace: Making Some Sense of It All; Section 2 Elementary Shortfalls :The Things we didn't get Right at the Beginning; Chapter 3 Authentication; Authentication, Data Integrity, Nonrepudiation, Availability, and Confidentiality: The Five Pillars of Security; Authentication and Models of Trust; Chapter 4 Patching; Patching: A Growing Challenge and a Needed Discipline; Conquer or Be Conquered; Chapter 5 Training
  • Fill the Skills Gap with an Environment of Continual TrainingEmployee Training Is Key for Cybersecurity; Training Is a Mindset; Section 3 Fundamental Strategies: Proven Strategies that Don't Let us Down; Chapter 6 Cryptography; Cryptography: The Backbone of Cybersecurity; Cryptography: The Good, the Bad, and the Future; Chapter 7 Access Control; Managing Access in Challenging Environments; A Systematic Approach to Access Control; Chapter 8 Segmentation; Successful Segmentation Isn't Separation: It's Collaboration; Why We Need to Segment Networks
  • Section 4 Advanced Strategies: Sophisticated Cybersecurity OperationsChapter 9 Visibility; Visibility: Identifying Pathogens, Risk Factors, and Symptoms of Cyberattacks; 20/20 Insight: Redefining Visibility to Stop Modern Cybercrime Syndicates; The Challenge of Visibility; Chapter 10 Inspection; In and Out of the Shadows: The Visibility That Inspection Enables Is Not Confined to Technology Alone; The Fundamental Importance of Inspection; Chapter 11 Failure Recovery; Preparation, Response, and Recovery; Cyber Event Recovery
  • Section 5 Higher-Order Dimensions: Where Human Factors Can Eclipse Computing WizardryChapter 12 Complexity Management; Shift Your Mindset to Manage Complexity; Seven Steps to Reducing Complexity; Chapter 13 Privacy; Don't Panic! Security Pros Must Learn to Embrace the New Era of Privacy; Stricter Privacy Regulations Are Driving the Conversations-and Innovations-We Need; Chapter 14 Human Frailty; Overcoming Human Frailty: People and the Power of Obligation; Overcoming Human Frailty by Design; The Future; Unifying Forces; Relationships; Informed Optimism; Pursuit of Facts and Wisdom