Book description
This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues.
Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms.
Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements: • Checklists throughout each chapter to gauge understanding • Chapter Review Questions/Exercises and Case Studies • Ancillaries: Solutions Manual; slide package; figure files
This format will be attractive to universities and career schools as well as federal and state agencies, corporate security training programs, ASIS certification, etc.
- Chapters by leaders in the field on theory and practice of cyber security and IT infrastructure protection, allowing the reader to develop a new level of technical expertise
- Comprehensive and up-to-date coverage of cyber security issues allows the reader to remain current and fully informed from multiple viewpoints
- Presents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- Acknowledgements
- About the Editor
- Contributors
- Introduction
-
Chapter 1. Fault Tolerance and Resilience in Cloud Computing Environments
- 1 Introduction
- 2 Cloud Computing Fault Model
- 3 Basic Concepts on Fault Tolerance
- 4 Different Levels of Fault Tolerance in Cloud Computing
- 5 Fault Tolerance against Crash Failures in Cloud Computing
- 6 Fault Tolerance against Byzantine Failures in Cloud Computing
- 7 Fault Tolerance as a Service in Cloud Computing
- 8 Summary
- Chapter Review Questions/Exercises
- Exercise
- Acknowledgments
- References
-
Chapter 2. Data Encryption
- 1 Need for Cryptography
- 2 Mathematical Prelude to Cryptography
- 3 Classical Cryptography
- 4 Modern Symmetric Ciphers
- 5 Algebraic Structure
- 6 The Internal Functions of Rijndael in AES Implementation
- 7 Use of Modern Block Ciphers
- 8 Public-Key Cryptography
- 9 Cryptanalysis of RSA
- 10 Diffie-Hellman Algorithm
- 11 Elliptic Curve Cryptosystems
- 12 Message Integrity and Authentication
- 13 Triple Data Encryption Algorithm (TDEA) Block Cipher
- 14 Summary
- Chapter Review Questions/Exercises
- Exercise
- References
-
Chapter 3. Public Key Infrastructure
- 1 Cryptographic Background
- 2 Overview of PKI
- 3 The X.509 Model
- 4 X.509 Implementation Architectures
- 5 X.509 Certificate Validation
- 6 X.509 Certificate Revocation
- 7 Server-Based Certificate Validity Protocol
- 8 X.509 Bridge Certification Systems
- 9 X.509 Certificate Format
- 10 PKI Policy Description
- 11 PKI Standards Organizations
- 12 PGP Certificate Formats
- 13 PGP PKI Implementations
- 14 W3C
- 15 Is PKI Secure?
- 16 Alternative PKI Architectures
- 17 Modified X.509 Architectures
- 18 Alternative Key Management Models
- 19 Summary
- Chapter Review Questions/Exercises
- Exercise
- References
-
Chapter 4. Physical Security Essentials
- 1 Overview
- 2 Physical Security Threats
- 3 Physical Security Prevention and Mitigation Measures
- 4 Recovery from Physical Security Breaches
- 5 Threat Assessment, Planning, and Plan Implementation
- 6 Example: A Corporate Physical Security Policy
- 7 Integration of Physical and Logical Security
- 8 Physical Security Checklist
- 9 Summary
- Chapter Review Questions/Exercises
- Exercise
- Chapter 5. Disaster Recovery
- Chapter 6. Biometrics
- Chapter 7. Homeland Security
- Chapter 8. Cyber Warfare
- Chapter 9. System Security
- Chapter 10. Securing the Infrastructure
- Chapter 11. Access Controls
- Chapter 12. Assessments and Audits
- Chapter 13. Fundamentals of Cryptography
- Chapter 14. Satellite Cyber Attack Search and Destroy
- Chapter 15. Advanced Data Encryption
- Index
Product information
- Title: Cyber Security and IT Infrastructure Protection
- Author(s):
- Release date: August 2013
- Publisher(s): Syngress
- ISBN: 9780124200470
You might also like
book
Cyber Security and Network Security
CYBER SECUTIRY AND NETWORK SECURITY Written and edited by a team of experts in the field, …
book
Cyber Security
Cyber security is more essential today than ever, not just in the workplace but at home …
book
Cyber Security and Digital Forensics
CYBER SECURITY AND DIGITAL FORENSICS Cyber security is an incredibly important issue that is constantly changing, …
book
The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks
This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual …