You are previewing Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions.
O'Reilly logo
Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions

Book Description

Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions provides a valuable resource by addressing the most pressing issues facing cyber security. This reference source takes a holistic approach to cyber security and information assurance by treating both the technical as well as managerial sides of the field.

Table of Contents

  1. Copyright
  2. Editorial Advisory Board
  3. List of Reviewers
  4. Foreword
  5. Preface
  6. REFERENCES
  7. Acknowledgment
  8. Risk and Threat Assessment
    1. Dynamic Modeling of the Cyber Security Threat Problem: The Black Market for Vulnerabilities
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. BLACK MARKET FOR VULNERABILITIES: DEFINITION, ISSUES AND PROBLEMS
      5. TRACING THE HISTORY OF VULNERABILITY DISCOVERY
      6. THE DYNAMIC MODEL OF THE BMs
      7. LEARNING FROM MODEL AND FUTURE TRENDS
      8. CONCLUSION
    2. REFERENCES
    3. An Attack Graph Based Approach for Threat Identification of an Enterprise Network
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. PROPOSED APPROACH: THREAT IDENTIFICATION AND ATTACK PATH PREDICTION
      5. CASE STUDY
      6. FUTURE RESEARCH & CONCLUSION
    4. REFERENCES
      1. ENDNOTES
    5. Insider Threat Prevention, Detection and Mitigation
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. DEFINING THE INSIDER THREAT
      5. COUNTERING THE THREAT: RISK MANAGEMENT
      6. BEST PRACTICES FOR MITIGATING THE INSIDER THREAT
      7. DETECTION MEASURES
      8. CONCLUSION
    6. REFERENCES
    7. An Autocorrelation Methodology for the Assessment of Security Assurance
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. METRICS DEVELOPMENT AND IMPLEMENTATION APPROACH
      5. AUTOCORRELATION ANALYSIS
      6. FUTURE TRENDS
      7. CONCLUSION
    8. REFERENCES
    9. Security Implications for Management from the Onset of Information Terrorism
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. INFORMATION TERRORISM AND THE NEW SECURITY ENVIRONMENT
      5. MANAGEMENT IMPLICATIONS FROM INFORMATION TERRORISM
      6. FUTURE TRENDS
      7. CONCLUSION
    10. REFERENCES
  9. Organizational and Human Security
    1. The Adoption of Information Security Management Standards: A Literature Review
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. THE ADOPTION OF INFORMATION SECURITY STANDARDS
      5. FUTURE TRENDS
      6. CONCLUSION
    2. REFERENCES
    3. Data Smog, Techno Creep and the Hobbling of the Cognitive Dimension
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. DATA SMOG AND TECHNO CREEP ARE CHOKING THE COGNITIVE DIMENSION
      5. CAUSES OF DATA SMOG
      6. TECHNO CREEP CONTRIBUTES TO DATA SMOG AND INFORMATION OVERLOAD
      7. IMPLICATIONS OF DATA SMOG
      8. CONCLUSION
    4. REFERENCES
    5. Balancing the Public Policy Drivers in the Tension between Privacy and Security
      1. ABSTRACT
      2. INTRODUCTION
      3. PUBLIC POLICY BACKGROUND OF PRIVACY AND SECURITY
      4. PRIVACY VS. SECURITY: AN IRRECONCILABLE TRADEOFF?
      5. PRIVACY AND SECURITY HARMONIZE
      6. RECOMMENDATIONS
      7. CONCLUSION
    6. REFERENCES
    7. Human Factors in Security: The Role of Information Security Professionals within Organizations
      1. ABSTRACT
      2. INTRODUCTION
      3. ROLES AND RESPONSIBILITIES OF IT SECURITY PROFESSIONALS
      4. A CULTURAL APPROACH TO THE IT SECURITY PROFESSION
      5. DISCUSSION
      6. CONCLUSION AND HRM IMPLICATIONS
    8. REFERENCES
      1. APPENDIX A: DESCRIPTION OF SECURITY CERTIFICATIONS
    9. Diagnosing Misfits, Inducing Requirements, and Delineating Transformations within Computer Network Operations Organizations
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. ORGCON CND MODEL
      5. RESULTS
      6. DISCUSSION & CONCLUSION
    10. REFERENCES
      1. APPENDIX A: ORGCON ANALYSIS AND RECOMMENDATIONS FOR SIMPLE ENVIRONMENTS
      2. APPENDIX B: ORGCON ANALYSIS AND RECOMMENDATIONS FOR COMPLEX ENVIRONMENTS
      3. APPENDIX C
    11. An Approach to Managing Identity Fraud
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MANAGING IDENTITY CRIME: GOVERNMENT LEVEL STRATEGIES
      5. MANAGING IDENTITY CRIME: ORGANIZATIONAL LEVEL STRATEGIES
      6. FUTURE TRENDS AND RESEARCH
      7. CONCLUSION
    12. REFERENCES
  10. Emergency Response Planning
    1. A Repeatable Collaboration Process for Incident Response Planning
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. A COLLABORATION PROCESS FOR INCIDENT RESPONSE PLANNING
      5. APPLICATION EXPERIENCES
      6. FUTURE TRENDS AND RESEARCH ISSUES
      7. CONCLUSION
    2. REFERENCES
      1. KEY TERMS
      2. APPENDIX A: CASE 3 INITIAL BRAINSTORMING IDEAS AND RESULTING COURSE OF ACTION SECTION OF THE FINAL IRP
    3. Pandemic Influenza, Worker Absenteeism and Impacts on Critical Infrastructures: Freight Transportation as an Illustration
      1. ABSTRACT
      2. INTRODUCTION
      3. ANALYSIS OF RAILROAD OPERATIONS
      4. ANALYSIS OF CONTAINER PORT OPERATIONS
      5. EXTENDING THE CONCEPTS TO OTHER INFRASTRUCTURES
      6. CONCLUSION
    4. REFERENCES
    5. Information Sharing: A Study of Information Attributes and their Relative Significance During Catastrophic Events
      1. ABSTRACT
      2. INTRODUCTION
      3. INFORMATION QUALITY
      4. DISASTER TYPES
      5. CONTENT ANALYSIS
      6. CONCLUSION
      7. ACKNOWLEDGMENT
    6. REFERENCES
      1. APPENDIX A: DOCUMENT CORPUS
      2. APPENDIX B: ORGANIZATIONAL AND TECHNOLOGICAL RESOURCES
    7. An Overview of the Community Cyber Security Maturity Model
      1. ABSTRACT
      2. INTRODUCTION: THE NEED FOR COMMUNITY CYBER SECURITY PROGRAMS
      3. CONCLUSION
    8. REFERENCES
  11. Security Technologies
    1. Server Hardening Model Development: A Methodology-Based Approach to Increased System Security
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SECURE SERVER MODELING CONCEPTS
      5. FUTURE TRENDS
      6. CONCLUSION
    2. REFERENCES
      1. APPENDIX A: SERVER SERVICES AND DAEMONS LISTING
      2. APPENDIX B: USER PHYSICAL ACCESS ASSESSMENT FORM
      3. APPENDIX C: NMAP SCANNING FORM
      4. APPENDIX D: SERVER HARDENING MODEL CHECKLIST
    3. Trusted Computing: Evolution and Direction
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. TRUSTED COMPUTING: THEN AND NOW
      5. FUTURE TRENDS
      6. CONCLUSION
    4. REFERENCES
    5. Introduction, Classification and Implementation of Honeypots
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. CLASSIFICATION OF HONEYPOTS
      5. ADVANTAGES AND LIMITATIONS OF HONEYPOTS
      6. PRACTICAL USES IN THE FIELD
      7. FUTURE TRENDS
      8. CONCLUSION
    6. REFERENCES
  12. Compilation of References
  13. About the Contributors
  14. Index