Cyberspace and cybersecurity:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton
CRC Press
[2018]
|
Ausgabe: | Second edition |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Klappentext |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XXIV, 291 Seiten Illustrationen, Diagramm |
ISBN: | 9781138057715 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044711827 | ||
003 | DE-604 | ||
005 | 20180214 | ||
007 | t | ||
008 | 180112s2018 xxua||| |||| 00||| eng d | ||
010 | |a 017018342 | ||
020 | |a 9781138057715 |c hardback |9 978-1-138-05771-5 | ||
035 | |a (OCoLC)1024107945 | ||
035 | |a (DE-599)BVBBV044711827 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-355 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Kostopoulos, George K. |4 aut | |
245 | 1 | 0 | |a Cyberspace and cybersecurity |c George Kostopoulos |
250 | |a Second edition | ||
264 | 1 | |a Boca Raton |b CRC Press |c [2018] | |
300 | |a XXIV, 291 Seiten |b Illustrationen, Diagramm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Cyberspace |x Security measures | |
650 | 4 | |a Computer crimes |x Prevention | |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyberspace |0 (DE-588)4266146-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Cyberspace |0 (DE-588)4266146-8 |D s |
689 | 0 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-315-11648-8 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-351-65307-7 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-351-65165-3 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-351-64193-7 |
856 | 4 | 2 | |m Digitalisierung UB Regensburg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030108338&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Regensburg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030108338&sequence=000002&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
999 | |a oai:aleph.bib-bvb.de:BVB01-030108338 |
Datensatz im Suchindex
_version_ | 1804178192473260032 |
---|---|
adam_text | Cybersecurity
Providing comprehensive coverage of cyberspace and cybersecurity, this new edition
of Cyberspace and Cybersecurity not only focuses on technologies but also ex-
plores human factors and organizational perspectives and emphasizes why asset iden-
tification should be the cornerstone of any information security strategy. Topics include
addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and
legal issues, and business continuity. Updates include topics such as cyber risks in mo-
bile telephony, steganography, cybersecurity as an added value, ransomware defense,
review of recent cyber laws, new types of cybercrime, plus new chapters on digital
currencies and encryption key management.
Cyberspace and Cybersecurity, Second Edition has two purposes. First, it offers
readers—both students and professionals—an educated awareness of the issues that
affect cyberspace and cybersecurity, as they stand today. Secondly, it provides the
necessary infrastructure on which the readers can build their own cyberspace and
cybersecurity expertise in a lifelong learning mode. It
• Provides complete coverage of cybersecurity including new chapters on digital
currencies and FinTech and on key management
• Integrates technology with organizational and human factor perspectives
• Offers guidelines for project preparations as well as evaluation criteria
• Reflects research of the cyber environment in different areas including Europe,
the United States, and Asia
• Includes access to instructor and student resources, such as electronic
presentations, solutions to exercises, and updated references, upon qualified
course adoption
For non-cybersecurity techies who want to tip-toe into cyberspace and cybersecurity,
this book provides a flavor of the wide spectrum of related issues before they dedicate
themselves to cyber defense. For non-techies concerned with cyberspace and cyber-
security, it provides a head start on this very important aspect of modern life.
Cyberspace and cybersecurity are two wagons of a fast-moving train. Cyberspace and
Cybersecurity helps readers pick up speed and hop on the train. Once on it and with
the acquired background, readers will be able to follow the technological advances and
eventually contribute to making the train safer.
Contents
Foreword xi
Preface xv
Acknowledgments xxi
Author xxiii
Charter 1 Vulnerabilities in Information Systems 1
Introduction 1
Causes of Vulnerability 4
Measuring Vulnerability 5
Avoiding Vulnerabilities through Secure Coding 9
Mistakes Can Be Good 13
Threats Classification 14
Threat ^Modeling Process 15
Security Starts at Home 15
Security in Applications 18
Introducing Countermeasures 19
International Awareness 20
Exercises 20
Chapter 2 Vulnerabilities in the Organization 23
Introduction 23
Common Organizational Vulnerabilities 24
Access Authorization and Authentication 25
Human Factors 29
Security Services 30
External Technologies 31
Vulnerabilities in Networks 32
V
VI
CONTENTS
Wireless Networks 33
Bluetooth 34
Passive Vulnerabilities 35
Active Vulnerabilities 35
Precautions 36
Wireless Fidelity 36
Wi-Fi Precautions at Home 39
Wi-Fi Precautions at the Hotspot 41
Wi-Fi Precautions at the Enterprise 43
Worldwide Interoperability Microwave Access 44
WiMAX Features 44
Cloud Computing 47
Internet of Things 50
Automotive Cybersecurity 54
Vulnerability Assessment Tools 55
Exercises 56
Chapter 3 Risks in Information Systems
Infrastructure 59
Introduction 59
Risks in Hardware 60
Risks in Software 64
Risks in People 67
Risks in Laptops 69
Risks in Cyberspace 71
Risks in Legacy Infrastructure 71
Risks in Mobile Telephony 72
Risk Insurance in Cyberspace 75
Exercises 78
Chapter 4 Secure Information Systems 81
Introduction 81
Assets Identification 82
Assets Communication 84
Assets Storage 90
Resource Access Control Facility 91
Securing the Email Communications 92
Email Server Side 93
Email Client Side 93
Information Security Management 94
Encryption Options in Emails 97
Steganography 98
Exercises 98
Chapter 5 Cybersecurity and the CIO 101
Introduction 101
CIO: Personality 102
Trust and Ethics 102
CONTENTS
VII
Communication and Intelligence 103
Leadership and Entrepreneurship 103
Courage and Limitations 104
CIO; Education 104
University Degrees 104
Certifications 105
Continuing Education and Skills Acquisition 105
CIO: Experience 107
CIO: Responsibilities 108
Data Backup and Archiving 109
Culture of Security 109
Cyber Training 109
Contingency Plans 109
Liability 110
CIO: Information Security 110
Internal Information Security Components 111
Access Control—Electronic 111
Access Control—Physical 111
Cyber Policies 111
Cyber Awareness and Training 112
Training 113
Business Continuity 113
CIO: The Changing Role 114
Adding Business Value through Cybersecurity 115
Exercises 116
Chapter 6 Building a Secure Organization 117
Introduction 117
Business Continuity Planning 118
Business Impact Analysis (BIA) 120
Business Recovery Strategy (BRS) 121
Drafting of the Business Continuity Plan 121
Testing of the Business Continuity Plan 122
Training in Business Continuity Plan Implementation 122
Business Continuity Plan Performance Indicators 122
System Access Control 123
System Development and Maintenance 125
Physical and Environmental Security 126
Compliance 127
Personnel Security 129
Security Organization 129
Computer and Network Management 129
Asset Classification and Control 130
Security Policy 130
Encryption Key Management 131
EKM Features 131
Key Selection 132
VIII
Algorithms
Exercises
CONTENTS
132
133
Chapter 7
Chapter 8
Cyberspace Intrusions 135
Introduction 135
IDPS Configuration 136
Sensors 137
Processor 140
Consoles 140
Network 140
IDPS Capabilities 141
Information Acquisition 141
Information Loggings 141
Detection Techniques 142
Prevention Actions 144
IDPS Management 144
Implementation 144
Step One: Features 145
Step Two: Architecture 145
Step Three: Installation 146
Step Four: Testing 146
Step Five: Activation 146
Operation 147
Maintenance . 148
IDPS Classification 149
Host-Based IDPS 149
Network-Based IDPS 151
Network Behavior Analysis System 152
Wireless IDPS 154
IDPS Comparison 156
Predicting Cybersecurity Attacks 157
Cybersecurity Trends 158
Ransomware 159
Exercises 159
Cyberspace Defense 161
Introduction 161
File Protection Applications 161
File Backup 161
Disaster Recovery 163
History Deletion 165
Shredding and Wiping 165
File Undelete 165
File Encryption 166
Loggers 166
Anti-Loggers 167
PC Performance Applications 168
Registry Repair 168
CONTENTS IX
Anti-Rootkits 169
Antivirus 169
Junk Files 170
Fragmentation 170
Protection Tools 171
S ecu rity Analyzer 171
Password Analyzer 173
Firewalls 175
Packet-Level Filtering 177
Circuit-Level Filtering 177
Application-Level Gateway 177
Email Protection 178
Exercises 179
Chapter 9 Cyberspace and the Law 181
Introduction 181
International Laws 182
Europe 182
United Nations 183
North Atlantic Treaty Organization 184
INTERPOL 186
Impediments to Cyber Law Enforcement 186
Cyber-Related Laws in the United States 187
National Cybersecurity Protection Act of 2014 189
Cybersecurity Workforce Assessment Act of 2014 189
Cybersecurity Workforce Recruitment and Retention
Act of 2014 190
Commercial Privacy Bill of Rights Act of 2011 190
Cyber security Act of 2010 192
Federal Information Security Management Act of 2002 194
USA PATRIOT Act of 2001 196
Communications Assistance for Law Enforcement Act
of 1994 197
Computer Security Act of 1987 199
Privacy Act of 1974 200
Cybercrime 201
Trends in Cyber Abuse 202
Combating Cybercrime 202
Cybercrime in Banking 206
Cybercrime in e-Commerce 206
Cybersecurity in Maritime 207
Exercises 210
Chapter 10 Cyber Warfare and Homeland Security 213
Introduction 213
Cyber Warfare 214
Cyber Weapons Convention 216
Cyber Terrorism 219
X
CONTENTS
Cyber Espionage 223
Homeland Security 224
National Cyber Security Division 227
Cybersecurity Preparedness 228
Cyberspace Security Challenges 228
Distributed Defense 230
Cybersecurity Countermeasures 231
Cyber Defense Ecosystem 232
Cybersecurity Training 233
Cyber Simulation and Exercises 234
Warfare Information in an Information Warfare Terrain 237
Developing a National Strategy for Cybersecurity 239
Exercises 240
Chapter 11 Digital Currencies 243
Introduction 243
The Blockchain Concept 243
Cryptocurrencies 244
Bitcoin 245
Cryptocurrency Wallet 246
Cybercrime in the Cryptocurrencies Domain 246
Purchasing Cryptocurrencies 247
Exercises 248
Chapter 12 Transformation of Traditional Crime
into Cybercrime 249
Introduction 249
Electronic Crime 251
Forms of Cybercrime 252
Investigating Electronic Crimes 253
Hackers and Crackers 254
Investigating Cybercrimes 255
Financial Cyber Scams 255
The Nigerian Letter 255
The Spanish Lotto 257
Data Phishing 257
Software Piracy 257
Credit Cards 258
Chat Rooms 258
Trends in Cybercrime 259
Cyber Bullying 259
Suicides and Disappearances 260
Conclusion 261
Exercises 261
References 263
Index 277
|
any_adam_object | 1 |
author | Kostopoulos, George K. |
author_facet | Kostopoulos, George K. |
author_role | aut |
author_sort | Kostopoulos, George K. |
author_variant | g k k gk gkk |
building | Verbundindex |
bvnumber | BV044711827 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)1024107945 (DE-599)BVBBV044711827 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Second edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02200nam a2200505 c 4500</leader><controlfield tag="001">BV044711827</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180214 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">180112s2018 xxua||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">017018342</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781138057715</subfield><subfield code="c">hardback</subfield><subfield code="9">978-1-138-05771-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1024107945</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044711827</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kostopoulos, George K.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyberspace and cybersecurity</subfield><subfield code="c">George Kostopoulos</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton</subfield><subfield code="b">CRC Press</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIV, 291 Seiten</subfield><subfield code="b">Illustrationen, Diagramm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-315-11648-8</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-351-65307-7</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-351-65165-3</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-351-64193-7</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030108338&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030108338&sequence=000002&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030108338</subfield></datafield></record></collection> |
id | DE-604.BV044711827 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:00:04Z |
institution | BVB |
isbn | 9781138057715 |
language | English |
lccn | 017018342 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030108338 |
oclc_num | 1024107945 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | XXIV, 291 Seiten Illustrationen, Diagramm |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | CRC Press |
record_format | marc |
spelling | Kostopoulos, George K. aut Cyberspace and cybersecurity George Kostopoulos Second edition Boca Raton CRC Press [2018] XXIV, 291 Seiten Illustrationen, Diagramm txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Computer networks Security measures Cyberspace Security measures Computer crimes Prevention Datenschutz (DE-588)4011134-9 gnd rswk-swf Cyberspace (DE-588)4266146-8 gnd rswk-swf Cyberspace (DE-588)4266146-8 s Datenschutz (DE-588)4011134-9 s DE-604 Erscheint auch als Online-Ausgabe 978-1-315-11648-8 Erscheint auch als Online-Ausgabe 978-1-351-65307-7 Erscheint auch als Online-Ausgabe 978-1-351-65165-3 Erscheint auch als Online-Ausgabe 978-1-351-64193-7 Digitalisierung UB Regensburg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030108338&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung UB Regensburg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030108338&sequence=000002&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Klappentext |
spellingShingle | Kostopoulos, George K. Cyberspace and cybersecurity Computer networks Security measures Cyberspace Security measures Computer crimes Prevention Datenschutz (DE-588)4011134-9 gnd Cyberspace (DE-588)4266146-8 gnd |
subject_GND | (DE-588)4011134-9 (DE-588)4266146-8 |
title | Cyberspace and cybersecurity |
title_auth | Cyberspace and cybersecurity |
title_exact_search | Cyberspace and cybersecurity |
title_full | Cyberspace and cybersecurity George Kostopoulos |
title_fullStr | Cyberspace and cybersecurity George Kostopoulos |
title_full_unstemmed | Cyberspace and cybersecurity George Kostopoulos |
title_short | Cyberspace and cybersecurity |
title_sort | cyberspace and cybersecurity |
topic | Computer networks Security measures Cyberspace Security measures Computer crimes Prevention Datenschutz (DE-588)4011134-9 gnd Cyberspace (DE-588)4266146-8 gnd |
topic_facet | Computer networks Security measures Cyberspace Security measures Computer crimes Prevention Datenschutz Cyberspace |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030108338&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030108338&sequence=000002&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kostopoulosgeorgek cyberspaceandcybersecurity |