Cybersecurity: an interdisciplinary problem
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Minnesota
West Academic Publishing
2021
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | xiv, 573 Seiten |
ISBN: | 9781642422535 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV047327195 | ||
003 | DE-604 | ||
005 | 20210726 | ||
007 | t | ||
008 | 210615s2021 |||| 00||| eng d | ||
020 | |a 9781642422535 |9 978-1-64242-253-5 | ||
035 | |a (OCoLC)1261748689 | ||
035 | |a (DE-599)BVBBV047327195 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Cybersecurity |b an interdisciplinary problem |
264 | 1 | |a Minnesota |b West Academic Publishing |c 2021 | |
300 | |a xiv, 573 Seiten | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Interdisziplinarität |0 (DE-588)4449808-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Interdisziplinarität |0 (DE-588)4449808-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Bambauer, Derek E. |e Sonstige |0 (DE-588)1237552877 |4 oth | |
700 | 1 | |a Hurwitz, Justin (Gus) |d ca. 20./21. Jh. |e Sonstige |0 (DE-588)1237552966 |4 oth | |
700 | 1 | |a Thaw, David |d ca. 20./21. Jd. |e Sonstige |0 (DE-588)1237664756 |4 oth | |
700 | 1 | |a Tschider, Charlotte A. |e Sonstige |0 (DE-588)1185462147 |4 oth | |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032729804&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-032729804 |
Datensatz im Suchindex
_version_ | 1804182529355284480 |
---|---|
adam_text | Summary of Contents Introduction.............................................................................................................. 1 Chapter 1. What Is (Cyber)Security?............................................................... 5 A. Insecurity in the Wild................................................................................... 5 B. Assets Threats: Central Cybersecurity Concepts..................................14 C. (“Cyber”)Security “Law”?............................................................................ 17 D. A Note on Terminology and Navigating This Text...................................21 Chapter 2. Security, Privacy, “Security vs. Privacy”.........................29 A. Defining Cybersecurity, as Risk.................................................................29 B. Defining Cybersecurity, as Process............................................................35 C. Privacy (Is Not Security).............................................................................37 D. Privacy and Security................................................................................... 57 Chapter 3. A Basic Introduction to Cybersecurity Risk........................69 A. Risk Types.................................................................................................... 70 B. Risk Governance..........................................................................................83 C. Risk Assessment and Risk Rating.............................................................85 Chapter 4. The Cybersecurity
Ecosystem................................................... 91 A. Hackers and Attackers................................................................................92 B. Attacker Motivations..................................................................................94 C. The Overall Security Ecosystem.............................................................. 113 D. The “Security Mindset”.............................................................................118 Chapter 5. Technical Foundations............................................................... 151 A. Computers.................................................................................................. 151 B. Networks.................................................................................................... 168 C. Identity, Authentication, and Encryption...............................................184 Chapter 6. Legal Foundations........................................................................203 A. Legal Structures........................................................................................204 B. Legal Principles.........................................................................................227 C. Substantive Categories of Law (Private Law, Criminal Law, and Public Law)................................................................................................251 Chapter 7. Business Foundations................................................................. 253 A. Introduction to the
Organization.............................................................253 B. A Bit More About Transaction Costs.......................................................266 C. Agency and Responsibilities.....................................................................267 Chapter 8. Why Cybersecurity Is Hard.......................................................277 A. The Problem of Complexity, or the “Halting” Problem..........................278 v
vi B. C. D. E. Summary of Contents The Problem of Changing, Evolving Environments............................... 284 The Problem of Fit-for-Purpose Security................................................ 288 The Problem of Technical Debt and Complexity as-implemented....... 291 The Problem of Intransigence and Writing Laws for Cybersecurity.... 292 Chapter 9. Engineering for Risk................................................................... 309 A. Understanding the Development and Engineering Mentalities........... 309 B. Business Influence on Technology Spend................................................322 C. The Software Development Lifecycle.......................................................323 D. Technical Debt and Deferred Costs..........................................................336 E. Considering the Interdisciplinary Struggles of Cybersecurity.............. 349 Chapter 10. Risk and the Law.......................................................................353 A. The Common Law of Tort.........................................................................355 B. The Common Law of Contracts................................................................384 C. Shareholder Derivative Lawsuits............................................................393 D. State Statutes State Attorneys General............................................. 401 E. General Regulatory Regimes................................................................... 414 F. Criminal
Statutes......................................................................................449 Chapter 11. Business Approaches to Cybersecurity Risk.................. 457 A. Governance................................................................................................ 457 B. Policy Management.................................................................................. 462 C. Risk Assessment........................................................................................473 D. Risk Rating and Decisioning....................................................................476 E. Third Party Management.........................................................................483 F. Industry Standards...................................................................................493 G. The Incident Response Process................................................................500 H. In Conclusion.............................................................................................507 Chapter 12. Alternative Modalities of Risk Regulation...................... 509 A. Regulating Process, Not Outcomes..........................................................509 B. Alternative Governmental Regulation.....................................................522 C. Self-Regulation..........................................................................................529 D. Public-Private Partnerships.....................................................................530 E.
Insurance...................................................................................................555 F. Concluding Thoughts and Questions.......................................................564 Index.................................................................................................................. 567
|
adam_txt |
Summary of Contents Introduction. 1 Chapter 1. What Is (Cyber)Security?. 5 A. Insecurity in the Wild. 5 B. Assets Threats: Central Cybersecurity Concepts.14 C. (“Cyber”)Security “Law”?. 17 D. A Note on Terminology and Navigating This Text.21 Chapter 2. Security, Privacy, “Security vs. Privacy”.29 A. Defining Cybersecurity, as Risk.29 B. Defining Cybersecurity, as Process.35 C. Privacy (Is Not Security).37 D. Privacy and Security. 57 Chapter 3. A Basic Introduction to Cybersecurity Risk.69 A. Risk Types. 70 B. Risk Governance.83 C. Risk Assessment and Risk Rating.85 Chapter 4. The Cybersecurity
Ecosystem. 91 A. Hackers and Attackers.92 B. Attacker Motivations.94 C. The Overall Security Ecosystem. 113 D. The “Security Mindset”.118 Chapter 5. Technical Foundations. 151 A. Computers. 151 B. Networks. 168 C. Identity, Authentication, and Encryption.184 Chapter 6. Legal Foundations.203 A. Legal Structures.204 B. Legal Principles.227 C. Substantive Categories of Law (Private Law, Criminal Law, and Public Law).251 Chapter 7. Business Foundations. 253 A. Introduction to the
Organization.253 B. A Bit More About Transaction Costs.266 C. Agency and Responsibilities.267 Chapter 8. Why Cybersecurity Is Hard.277 A. The Problem of Complexity, or the “Halting” Problem.278 v
vi B. C. D. E. Summary of Contents The Problem of Changing, Evolving Environments. 284 The Problem of Fit-for-Purpose Security. 288 The Problem of Technical Debt and Complexity as-implemented. 291 The Problem of Intransigence and Writing Laws for Cybersecurity. 292 Chapter 9. Engineering for Risk. 309 A. Understanding the Development and Engineering Mentalities. 309 B. Business Influence on Technology Spend.322 C. The Software Development Lifecycle.323 D. Technical Debt and Deferred Costs.336 E. Considering the Interdisciplinary Struggles of Cybersecurity. 349 Chapter 10. Risk and the Law.353 A. The Common Law of Tort.355 B. The Common Law of Contracts.384 C. Shareholder Derivative Lawsuits.393 D. State Statutes State Attorneys General. 401 E. General Regulatory Regimes. 414 F. Criminal
Statutes.449 Chapter 11. Business Approaches to Cybersecurity Risk. 457 A. Governance. 457 B. Policy Management. 462 C. Risk Assessment.473 D. Risk Rating and Decisioning.476 E. Third Party Management.483 F. Industry Standards.493 G. The Incident Response Process.500 H. In Conclusion.507 Chapter 12. Alternative Modalities of Risk Regulation. 509 A. Regulating Process, Not Outcomes.509 B. Alternative Governmental Regulation.522 C. Self-Regulation.529 D. Public-Private Partnerships.530 E.
Insurance.555 F. Concluding Thoughts and Questions.564 Index. 567 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author_GND | (DE-588)1237552877 (DE-588)1237552966 (DE-588)1237664756 (DE-588)1185462147 |
building | Verbundindex |
bvnumber | BV047327195 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)1261748689 (DE-599)BVBBV047327195 |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01577nam a2200373 c 4500</leader><controlfield tag="001">BV047327195</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210726 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">210615s2021 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781642422535</subfield><subfield code="9">978-1-64242-253-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1261748689</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047327195</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity</subfield><subfield code="b">an interdisciplinary problem</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Minnesota</subfield><subfield code="b">West Academic Publishing</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xiv, 573 Seiten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Interdisziplinarität</subfield><subfield code="0">(DE-588)4449808-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Interdisziplinarität</subfield><subfield code="0">(DE-588)4449808-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bambauer, Derek E.</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1237552877</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hurwitz, Justin (Gus)</subfield><subfield code="d">ca. 20./21. Jh.</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1237552966</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thaw, David</subfield><subfield code="d">ca. 20./21. Jd.</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1237664756</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tschider, Charlotte A.</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1185462147</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032729804&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032729804</subfield></datafield></record></collection> |
id | DE-604.BV047327195 |
illustrated | Not Illustrated |
index_date | 2024-07-03T17:31:28Z |
indexdate | 2024-07-10T09:09:00Z |
institution | BVB |
isbn | 9781642422535 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032729804 |
oclc_num | 1261748689 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | xiv, 573 Seiten |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | West Academic Publishing |
record_format | marc |
spelling | Cybersecurity an interdisciplinary problem Minnesota West Academic Publishing 2021 xiv, 573 Seiten txt rdacontent n rdamedia nc rdacarrier Computersicherheit (DE-588)4274324-2 gnd rswk-swf Interdisziplinarität (DE-588)4449808-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Interdisziplinarität (DE-588)4449808-1 s DE-604 Bambauer, Derek E. Sonstige (DE-588)1237552877 oth Hurwitz, Justin (Gus) ca. 20./21. Jh. Sonstige (DE-588)1237552966 oth Thaw, David ca. 20./21. Jd. Sonstige (DE-588)1237664756 oth Tschider, Charlotte A. Sonstige (DE-588)1185462147 oth Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032729804&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Cybersecurity an interdisciplinary problem Computersicherheit (DE-588)4274324-2 gnd Interdisziplinarität (DE-588)4449808-1 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4449808-1 |
title | Cybersecurity an interdisciplinary problem |
title_auth | Cybersecurity an interdisciplinary problem |
title_exact_search | Cybersecurity an interdisciplinary problem |
title_exact_search_txtP | Cybersecurity an interdisciplinary problem |
title_full | Cybersecurity an interdisciplinary problem |
title_fullStr | Cybersecurity an interdisciplinary problem |
title_full_unstemmed | Cybersecurity an interdisciplinary problem |
title_short | Cybersecurity |
title_sort | cybersecurity an interdisciplinary problem |
title_sub | an interdisciplinary problem |
topic | Computersicherheit (DE-588)4274324-2 gnd Interdisziplinarität (DE-588)4449808-1 gnd |
topic_facet | Computersicherheit Interdisziplinarität |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032729804&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT bambauerdereke cybersecurityaninterdisciplinaryproblem AT hurwitzjustingus cybersecurityaninterdisciplinaryproblem AT thawdavid cybersecurityaninterdisciplinaryproblem AT tschidercharlottea cybersecurityaninterdisciplinaryproblem |