Cyber security and global information assurance: threat analysis and response solutions
"This book provides a valuable resource by addressing the most pressing issues facing cyber-security from both a national and global perspective"--Provided by publisher.
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Hershey [u.a.]
Information Science Reference
2009
|
Schriftenreihe: | Premier reference source
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | "This book provides a valuable resource by addressing the most pressing issues facing cyber-security from both a national and global perspective"--Provided by publisher. |
Beschreibung: | XXII, 434 S. graph. Darst. |
ISBN: | 1605663263 9781605663265 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV035431938 | ||
003 | DE-604 | ||
005 | 20160929 | ||
007 | t | ||
008 | 090414s2009 d||| |||| 00||| eng d | ||
020 | |a 1605663263 |9 1-6056-6326-3 | ||
020 | |a 9781605663265 |c hbk |9 978-1-60566-326-5 | ||
035 | |a (OCoLC)286505380 | ||
035 | |a (DE-599)BVBBV035431938 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-12 |a DE-473 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
245 | 1 | 0 | |a Cyber security and global information assurance |b threat analysis and response solutions |c Kenneth J. Knapp [ed.] |
246 | 1 | 3 | |a Cyber-security and global information assurance |
264 | 1 | |a Hershey [u.a.] |b Information Science Reference |c 2009 | |
300 | |a XXII, 434 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Premier reference source | |
520 | 3 | |a "This book provides a valuable resource by addressing the most pressing issues facing cyber-security from both a national and global perspective"--Provided by publisher. | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security |x Management | |
650 | 4 | |a Cyberspace |x Security measures | |
650 | 4 | |a Data protection | |
650 | 4 | |a Information technology |x Security measures | |
650 | 0 | 7 | |a Management |0 (DE-588)4037278-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyberspace |0 (DE-588)4266146-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Cyberspace |0 (DE-588)4266146-8 |D s |
689 | 0 | 2 | |a Management |0 (DE-588)4037278-9 |D s |
689 | 0 | |C b |5 DE-604 | |
700 | 1 | |a Knapp, Kenneth J. |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-60566-327-2 |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017352318&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-017352318 |
Datensatz im Suchindex
_version_ | 1804138874309443584 |
---|---|
adam_text | Table
of Contents
Foreword
.............................................................................................................................................
xvl
Preface
..............................................................................................................................................xviii
Acknowledgment
...............................................................................................................................xxii
Section I
Risk and Threat Assessment
Chapter I
Dynamic Modeling of the Cyber Security Threat Problem: The Black Market for
Vulnerabilities
....................................................................................................................
Jaziar
Radianti,
University ofAgder, Norway
Jose J. Gonzalez, University ofAgder and Gjevik University College, Norway
Chapter II
An Attack Graph Based Approach for Threat Identification of an Enterprise Network
.......................23
Somak Bhattacharya, Indian Institute of Technology, Kharagpur, India
Samresh Malhotra, Indian Institute of Technology, Kharagpur, India
S. K. Ghosh, Indian Institute of Technology, Kharagpur, India
Chapter III
Insider Threat Prevention, Detection and Mitigation
............................................................................48
Robert
F
Mills, Air Force Institute of Technology, USA
Gilbert L. Peterson, Air Force Institute of Technology, USA
Michael R. Grimaila, Air Force Institute of Technology, USA
Chapter IV
An Autocorrelation Methodology for the Assessment of Security Assurance
......................................75
Richard T. Gordon, Bridging The Gap, Inc., USA
Allison S. Gehrke, University of
Colorado,
Denver, USA
Chapter V
Security Implications for Management from the Onset of Information Terrorism
...............................97
Ken Webb, Webb Knowledge Services, Australia
Section
II
Organizational and Human Security
Chapter VI
The Adoption
ofinformation
Security Management Standards: A Literature Review
......................119
Yves
Barlette, GSCM-Montpellier
Business School, France
Vladislav V. Fomin, Vytautas Magnus University, Lithuania
Chapter
VII
Data Smog, Techno Creep and the Hobbling of the Cognitive Dimension
........................................141
Peter R. Marbteiner, United States Air Force, USA
Chapter
VIII
Balancing the Public Policy Drivers in the Tension between Privacy and Security
...........................164
John W. Bagby, The Pennsylvania State University, USA
Chapter IX
Human Factors in Security: The Role
ofinformation
Security Professionals within
Organizations
......................................................................................................................................184
Indira R. Guzman,
TUI
University, USA
Kathryn Stam,
SUNY
Institute of Technology, USA
Shaveta Hans,
TUI
University, USA
Carole
Angolano,
TUI
University, USA
Chapter X
Diagnosing Misfits, Inducing Requirements, and Delineating Transformations within
Computer Network Operations Organizations
....................................................................................201
Nikolaos
Behatoros
ΗΝ,
Naval Postgraduate School, USA
Jack L. Koons III, Naval Postgraduate School, USA
Mark
E. Nissen,
Naval Postgraduate School, USA
Chapter XI
An Approach to Managing Identity Fraud
..........................................................................................233
Rodger Jamieson, The University of New South Wales, Australia
Stephen Smith, The University of New South Wales, Australia
Greg Stephens, The University of New South Wales, Australia
Donald Winchester, The University of New South Wales, Australia
Section III
Emergency Response Planning
Chapter
XII
A Repeatable Collaboration Process for Incident Response Planning
................................................250
Alanah Davis, University of Nebraska at Omaha, USA
Gert-Jan de
Vreede, University of Nebraska at Omaha, USA
Leah R. Pietron, University of Nebraska at Omaha, USA
Chapter
XIII
Pandemic Influenza, Worker Absenteeism and Impacts on Critical Infrastructures:
Freight Transportation as an Illustration
.............................................................................................265
Dean A. Jones,
Sandia
National Laboratories, USA
Linda K. Nozick, Cornell University, USA
Mark A. Turnquist, Cornell University, USA
William J. Sawaya, Texas A&M University, USA
Chapter
XIV
Information Sharing: A Study of Information Attributes and their Relative Significance During
Catastrophic Events
............................................................................................................................283
Preeti Singh, University at Buffalo, The State University of New York, USA
Pranav Singh, University at Buffalo, The State University of New York, USA
Insu
Park, University at Buffalo, The State University of New York, USA
JinKyuLee, Oklahoma State University, USA
H. Raghav Rao, University at Buffalo, The State University of New York, USA
Chapter XV
An Overview of the Community Cyber Security Maturity Model
.....................................................306
Gregory B. White, The University of Texas at San Antonio, USA
MarkL. Huson, The University of Texas at San Antonio, USA
Section IV
Security Technologies
Chapter
XVI
Server Hardening Model Development: A Methodology-Based Approach to Increased
System Security
..................................................................................................................................319
Doug White, Roger Williams University, USA
Alan
Rea,
Western Michigan University, USA
Chapter
XVII
Trusted Computing: Evolution and Direction
.....................................................................................343
JeffTeo, Montreat College, USA
Chapter
XVIII
Introduction, Classification and Implementation of Honeypots
.........................................................371
Miguel Jose Hernandez
y
Lopez,
Universidad de
Buenos Aires, Argentina
Carlos Francisco
Lerma Resendez, Universidad Autónoma
de Tamaulìpas,
Mexico
Compilation of References
...............................................................................................................383
About the Contributors
....................................................................................................................420
Index
...................................................................................................................................................430
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV035431938 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)286505380 (DE-599)BVBBV035431938 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02245nam a2200517 c 4500</leader><controlfield tag="001">BV035431938</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160929 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">090414s2009 d||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1605663263</subfield><subfield code="9">1-6056-6326-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781605663265</subfield><subfield code="c">hbk</subfield><subfield code="9">978-1-60566-326-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)286505380</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV035431938</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-473</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber security and global information assurance</subfield><subfield code="b">threat analysis and response solutions</subfield><subfield code="c">Kenneth J. Knapp [ed.]</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Cyber-security and global information assurance</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey [u.a.]</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXII, 434 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book provides a valuable resource by addressing the most pressing issues facing cyber-security from both a national and global perspective"--Provided by publisher.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Management</subfield><subfield code="0">(DE-588)4037278-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Management</subfield><subfield code="0">(DE-588)4037278-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="C">b</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Knapp, Kenneth J.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-60566-327-2</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017352318&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017352318</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV035431938 |
illustrated | Illustrated |
indexdate | 2024-07-09T21:35:07Z |
institution | BVB |
isbn | 1605663263 9781605663265 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017352318 |
oclc_num | 286505380 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-12 DE-473 DE-BY-UBG |
owner_facet | DE-355 DE-BY-UBR DE-12 DE-473 DE-BY-UBG |
physical | XXII, 434 S. graph. Darst. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Information Science Reference |
record_format | marc |
series2 | Premier reference source |
spelling | Cyber security and global information assurance threat analysis and response solutions Kenneth J. Knapp [ed.] Cyber-security and global information assurance Hershey [u.a.] Information Science Reference 2009 XXII, 434 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Premier reference source "This book provides a valuable resource by addressing the most pressing issues facing cyber-security from both a national and global perspective"--Provided by publisher. Computer networks Security measures Computer security Management Cyberspace Security measures Data protection Information technology Security measures Management (DE-588)4037278-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Cyberspace (DE-588)4266146-8 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Computersicherheit (DE-588)4274324-2 s Cyberspace (DE-588)4266146-8 s Management (DE-588)4037278-9 s b DE-604 Knapp, Kenneth J. Sonstige oth Erscheint auch als Online-Ausgabe 978-1-60566-327-2 Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017352318&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Cyber security and global information assurance threat analysis and response solutions Computer networks Security measures Computer security Management Cyberspace Security measures Data protection Information technology Security measures Management (DE-588)4037278-9 gnd Computersicherheit (DE-588)4274324-2 gnd Cyberspace (DE-588)4266146-8 gnd |
subject_GND | (DE-588)4037278-9 (DE-588)4274324-2 (DE-588)4266146-8 (DE-588)4143413-4 |
title | Cyber security and global information assurance threat analysis and response solutions |
title_alt | Cyber-security and global information assurance |
title_auth | Cyber security and global information assurance threat analysis and response solutions |
title_exact_search | Cyber security and global information assurance threat analysis and response solutions |
title_full | Cyber security and global information assurance threat analysis and response solutions Kenneth J. Knapp [ed.] |
title_fullStr | Cyber security and global information assurance threat analysis and response solutions Kenneth J. Knapp [ed.] |
title_full_unstemmed | Cyber security and global information assurance threat analysis and response solutions Kenneth J. Knapp [ed.] |
title_short | Cyber security and global information assurance |
title_sort | cyber security and global information assurance threat analysis and response solutions |
title_sub | threat analysis and response solutions |
topic | Computer networks Security measures Computer security Management Cyberspace Security measures Data protection Information technology Security measures Management (DE-588)4037278-9 gnd Computersicherheit (DE-588)4274324-2 gnd Cyberspace (DE-588)4266146-8 gnd |
topic_facet | Computer networks Security measures Computer security Management Cyberspace Security measures Data protection Information technology Security measures Management Computersicherheit Cyberspace Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017352318&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT knappkennethj cybersecurityandglobalinformationassurancethreatanalysisandresponsesolutions AT knappkennethj cybersecurityandglobalinformationassurance |