Raman Research Institute Library OPAC

Raman Research Institute Library OPAC

Amazon cover image
Image from Amazon.com

Cyberspace and cybersecurity / George K. Kostopoulos.

By: Material type: TextTextPublication details: Boca Raton, Fl. : CRC Press, c2013.Description: xvii, 218 p. : ill. ; 24 cmISBN:
  • 9781466501331 (alk. paper)
Subject(s): LOC classification:
  • TK5105.59 .C94 2013
Contents:
Machine generated contents note: 1.Vulnerabilities in Information Systems -- Introduction -- Measuring Vulnerability -- Avoiding Vulnerabilities through Secure Coding -- Mistakes Can Be Good -- Threats Classification -- Threat Modeling Process -- Security Starts at Home -- Security in Applications -- International Awareness -- Exercises -- 2.Vulnerabilities in the Organization -- Introduction -- Common Organizational Vulnerabilities -- Access Authorization and Authentication -- Human Factors -- Security Services -- External Technologies -- Wireless Networks -- Bluetooth -- Passive Vulnerabilities -- Active Vulnerabilities -- Precautions -- Wireless Fidelity -- Wi-Fi Precautions at Home -- Wi-Fi Precautions at the Hotspot -- Wi-Fi Precautions at the Enterprise -- Worldwide Interoperability Microwave Access -- WiMAX Features -- Cloud Computing -- Exercises -- 3.Risks in Information Systems Infrastructure -- Introduction -- Risks in Hardware -- Risks in Software --
Contents note continued: Risks in People -- Risks in Laptops -- Risks in Cyberspace -- Risk Insurance in Cyberspace -- Exercises -- 4.Secure Information Systems -- Introduction -- Assets Identification -- Assets Communication -- Assets Storage -- Resource Access Control Facility -- Securing the Email Communications -- Email Server Side -- Email Client Side -- Information Security Management -- Exercises -- 5.Cybersecurity and the CIO -- Introduction -- CIO: Personality -- Trust and Ethics -- Communication and Intelligence -- Leadership and Entrepreneurship -- Courage and Limitations -- CIO: Education -- University Degrees -- Certifications -- CIO: Experience -- CIO: Responsibilities -- Data Backup and Archiving -- Culture of Security -- Cyber Training -- Contingency Plans -- Liability -- CIO: Information Security -- Internal Information Security Components -- Access Control---Electronic -- Access Control---Physical -- Cyber Policies -- Cyber Awareness and Training -- Training --
Contents note continued: Business Continuity -- CIO: The Changing Role -- Exercises -- 6.Building a Secure Organization -- Introduction -- Business Continuity Planning -- Business Impact Analysis (BIA) -- Business Recovery Strategy (BRS) -- Drafting of the BCP -- Testing of the BCP -- Training in BCP Implementation -- BCP Performance Indicators -- System Access Control -- System Development and Maintenance -- Physical and Environmental Security -- Compliance -- Personnel Security -- Security Organization -- Computer and Network Management -- Asset Classification and Control -- Security Policy -- Exercises -- 7.Cyberspace Intrusions -- Introduction -- IDPS Configuration -- Sensors -- Processor -- Consoles -- Network -- IDPS Capabilities -- Information Acquisition -- Information Loggings -- Detection Techniques -- Prevention Actions -- IDPS Management -- Implementation -- Step One Features -- Step Two Architecture -- Step Three Installation -- Step Four Testing --
Contents note continued: Step Five Activation -- Operation -- Maintenance -- IDPS Classification -- Host-Based IDPS -- Network-Based IDPS -- Network Behavior Analysis System -- Wireless IDPS -- IDPS Comparison -- Exercises -- 8.Cyberspace Defense -- Introduction -- File Protection Applications -- File Backup -- Disaster Recovery -- History Deletion -- Shredding and Wiping -- File Undelete -- File Encryption -- Loggers -- Anti-Loggers -- PC Performance Applications -- Registry Repair -- Anti-Rootkits -- Antivirus -- Junk Files -- Fragmentation -- Protection Tools -- Security Analyzer -- Password Analyzer -- Firewalls -- Packet-Level Filtering -- Circuit-Level Filtering -- Application-Level Gateway -- Email Protection -- Exercises -- 9.Cyberspace and the Law -- Introduction -- International Laws -- Europe -- United Nations -- North Atlantic Treaty Organization -- INTERPOL -- Impediments to Cyber Law Enforcement -- Cyber-Related Laws in the United States --
Contents note continued: Commercial Privacy Bill of Rights Act of 2011 -- Cybersecurity Act of 2010 -- Federal Information Security Management Act of 2002 -- USA PATRIOT Act of 2001 -- Communications Assistance for Law Enforcement Act of 1994 -- Computer Security Act of 1987 -- Privacy Act of 1974 -- Cybercrime -- Trends in Cyber Abuse -- Combating Cybercrime -- Exercises -- 10.Cyber Warfare and Homeland Security -- Introduction -- Cyber Warfare -- Cyber Weapons Convention -- Cyber Terrorism -- Cyber Espionage -- Homeland Security -- National Cyber Security Division -- Cybersecurity Preparedness -- Challenges -- Distributed Defense -- Countermeasures -- Cyber Defense Ecosystem -- Cybersecurity Training -- Cyber Simulation and Exercises -- Exercises.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
Books Books Raman Research Institute Library 681.32.063 KOS (Browse shelf(Opens below)) Available 27238

Includes bibliographical references and index.

Machine generated contents note: 1.Vulnerabilities in Information Systems -- Introduction -- Measuring Vulnerability -- Avoiding Vulnerabilities through Secure Coding -- Mistakes Can Be Good -- Threats Classification -- Threat Modeling Process -- Security Starts at Home -- Security in Applications -- International Awareness -- Exercises -- 2.Vulnerabilities in the Organization -- Introduction -- Common Organizational Vulnerabilities -- Access Authorization and Authentication -- Human Factors -- Security Services -- External Technologies -- Wireless Networks -- Bluetooth -- Passive Vulnerabilities -- Active Vulnerabilities -- Precautions -- Wireless Fidelity -- Wi-Fi Precautions at Home -- Wi-Fi Precautions at the Hotspot -- Wi-Fi Precautions at the Enterprise -- Worldwide Interoperability Microwave Access -- WiMAX Features -- Cloud Computing -- Exercises -- 3.Risks in Information Systems Infrastructure -- Introduction -- Risks in Hardware -- Risks in Software --

Contents note continued: Risks in People -- Risks in Laptops -- Risks in Cyberspace -- Risk Insurance in Cyberspace -- Exercises -- 4.Secure Information Systems -- Introduction -- Assets Identification -- Assets Communication -- Assets Storage -- Resource Access Control Facility -- Securing the Email Communications -- Email Server Side -- Email Client Side -- Information Security Management -- Exercises -- 5.Cybersecurity and the CIO -- Introduction -- CIO: Personality -- Trust and Ethics -- Communication and Intelligence -- Leadership and Entrepreneurship -- Courage and Limitations -- CIO: Education -- University Degrees -- Certifications -- CIO: Experience -- CIO: Responsibilities -- Data Backup and Archiving -- Culture of Security -- Cyber Training -- Contingency Plans -- Liability -- CIO: Information Security -- Internal Information Security Components -- Access Control---Electronic -- Access Control---Physical -- Cyber Policies -- Cyber Awareness and Training -- Training --

Contents note continued: Business Continuity -- CIO: The Changing Role -- Exercises -- 6.Building a Secure Organization -- Introduction -- Business Continuity Planning -- Business Impact Analysis (BIA) -- Business Recovery Strategy (BRS) -- Drafting of the BCP -- Testing of the BCP -- Training in BCP Implementation -- BCP Performance Indicators -- System Access Control -- System Development and Maintenance -- Physical and Environmental Security -- Compliance -- Personnel Security -- Security Organization -- Computer and Network Management -- Asset Classification and Control -- Security Policy -- Exercises -- 7.Cyberspace Intrusions -- Introduction -- IDPS Configuration -- Sensors -- Processor -- Consoles -- Network -- IDPS Capabilities -- Information Acquisition -- Information Loggings -- Detection Techniques -- Prevention Actions -- IDPS Management -- Implementation -- Step One Features -- Step Two Architecture -- Step Three Installation -- Step Four Testing --

Contents note continued: Step Five Activation -- Operation -- Maintenance -- IDPS Classification -- Host-Based IDPS -- Network-Based IDPS -- Network Behavior Analysis System -- Wireless IDPS -- IDPS Comparison -- Exercises -- 8.Cyberspace Defense -- Introduction -- File Protection Applications -- File Backup -- Disaster Recovery -- History Deletion -- Shredding and Wiping -- File Undelete -- File Encryption -- Loggers -- Anti-Loggers -- PC Performance Applications -- Registry Repair -- Anti-Rootkits -- Antivirus -- Junk Files -- Fragmentation -- Protection Tools -- Security Analyzer -- Password Analyzer -- Firewalls -- Packet-Level Filtering -- Circuit-Level Filtering -- Application-Level Gateway -- Email Protection -- Exercises -- 9.Cyberspace and the Law -- Introduction -- International Laws -- Europe -- United Nations -- North Atlantic Treaty Organization -- INTERPOL -- Impediments to Cyber Law Enforcement -- Cyber-Related Laws in the United States --

Contents note continued: Commercial Privacy Bill of Rights Act of 2011 -- Cybersecurity Act of 2010 -- Federal Information Security Management Act of 2002 -- USA PATRIOT Act of 2001 -- Communications Assistance for Law Enforcement Act of 1994 -- Computer Security Act of 1987 -- Privacy Act of 1974 -- Cybercrime -- Trends in Cyber Abuse -- Combating Cybercrime -- Exercises -- 10.Cyber Warfare and Homeland Security -- Introduction -- Cyber Warfare -- Cyber Weapons Convention -- Cyber Terrorism -- Cyber Espionage -- Homeland Security -- National Cyber Security Division -- Cybersecurity Preparedness -- Challenges -- Distributed Defense -- Countermeasures -- Cyber Defense Ecosystem -- Cybersecurity Training -- Cyber Simulation and Exercises -- Exercises.

There are no comments on this title.

to post a comment.
Maintained by RRI Library