Higher Education

Cybersecurity: The Essential Body Of Knowledge, 1st Edition

  • Dan Shoemaker University of Detroit Mercy
  • Wm. Arthur Conklin University of Houston
  • ISBN-10: 1435481690  |  ISBN-13: 9781435481695
  • 528 Pages
  • © 2012 | Published
  • College Bookstore Wholesale Price = $92.25
  *Why an online review copy?
  • It's the greener, leaner way to review! An online copy cuts down on paper and on time. Reduce the wait (and the weight) of printed texts. Your online copy arrives instantly, and you can review it anytime from your computer or favorite mobile device.

If you prefer a print copy to review, please contact your representative.

About

Overview

CYBERSECURITY: THE ESSENTIAL BODY OF KNOWLEDGE provides a comprehensive, trustworthy framework of practices for assuring information security. This book is organized to help readers understand how the various roles and functions within cybersecurity practice can be combined and leveraged to produce a secure organization. In this unique book, concepts are not presented as stagnant theory; instead, the content is interwoven in a real world adventure story that runs throughout. In the story, a fictional company experiences numerous pitfalls of cyber security and the reader is immersed in the everyday practice of securing the company through various characters' efforts. This approach grabs learners' attention and assists them in visualizing the application of the content to real-world issues that they will face in their professional life. Derived from the Department of Homeland Security's Essential Body of Knowledge (EBK) for IT Security, this book is an indispensable resource dedicated to understanding the framework, roles, and competencies involved with information security.

Features and Benefits

  • This content represents the authoritative, comprehensive, complete guide to the Essential Body of Knowledge competencies for IT Security.
  • A running story throughout the book allows the reader to "visualize" the issues and the application of the content much better than would be typical of a conventional textbook. The case material in the book allows instructors to create realistic scenarios for professional applications.
  • Information is specifically applied to conventional professional roles such as CISO, security engineer, procurement specialist and IT Compliance Officer.
  • The role-based nature of the book allows the competencies to be tailored to a range of levels of students and professionals.
  • Division into three sections divides the book's focus among security considerations and issues; roles and levels of cybersecurity work; and competency recommendations for those roles.

Table of Contents

Section I: BACKGROUND.
1. The Field of Cyber Security.
2. The DHS EBK Initiative.
3. Applying the EBK.
Section II: EBK ROLES AND REQUIRED CAPABILITIES.
4. The Executive role.
5. The Functional role.
6. The Corollary role.
Section II: THE 14 AREAS OF INFORMATION SECURITY.
7. Data Security.
8. Digital Forensics.
9. Enterprise Continuity.
10. Incident Management.
11. IT Security Training and Awareness.
12. IT Systems Operations and Maintenance.
13. Network and Telecommunications Security.
14. Personnel Security.
15. Physical and Environmental Security.
16. Procurement.
17. Regulatory and Standards Compliance.
18. Security Risk Management.
19. Strategic Security Management.
20. System and Application Security.

Supplements

All supplements have been updated in coordination with the main title. Select the main title's "About" tab, then select "What's New" for updates specific to title's edition.

For more information about these supplements, or to obtain them, contact your Learning Consultant.

Instructor Supplements

Instructor's Resource CD-ROM  (ISBN-10: 1435481704 | ISBN-13: 9781435481701)

The Instructor Resources CD includes the following materials: Electronic Instructor's Manual: The Instructor's Manual that accompanies this book includes additional material to assist in class preparation, including suggestions for classroom activities, discussion topics, and additional activities. Solutions: The instructor resources include solutions to all end-of-chapter material, including review questions and case projects. PowerPoint presentations: This book comes with Microsoft PowerPoint slides for each chapter. They're included as a teaching aid for classroom presentation, to make available to students on the network for chapter review, or to be printed for classroom distribution. Instructors, please feel free to add your own slides for additional topics you introduce to the class. Figure files: All figures and tables in the book are reproduced on the Instructor Resources CD. Similar to the PowerPoint presentations, they're included as a teaching aid for classroom presentation, to make available to students for review, or to be printed for classroom distribution.

Meet the Author

Author Bio

Dan Shoemaker

Dan Shoemaker is a professor and senior research scientist at the Center for Cyber Security and Intelligence Studies--a National Security Agency (NSA) Center of Academic Excellence--at the University of Detroit Mercy (UDM). He also served as chair of the Computer and Information Systems Department at UDM for 25 years and holds a visiting appointment at London South Bank University. Dr. Shoemaker is co-chair of the Software Assurance Workforce Training and Education working group within the Department of Homeland Security's National Cybersecurity Division (NCSD). He has also served the NCSD as a member of the working group that developed its Essential Body of Knowledge, and as an expert panelist on three national working groups. A prolific author, Dr. Shoemaker is one of three domain editors for the Software Assurance Common Body of Knowledge. He lectures internationally on cybersecurity, information assurance, and software engineering topics, and he founded the International Cybersecurity Education Coalition (ICSEC) to connect higher education institutions and expand teaching of standard information assurance curricula throughout the Midwest. Dr. Shoemaker is the recipient of the Michigan Homeland Security annual Statewide award for Educators (2007).

Wm. Arthur Conklin

Wm. Arthur Conklin is an Assistant Professor and Director of the Center for Information Security Research and Education in the College of Technology at the University of Houston. He received his Ph.D. in Business Administration, from The University of Texas at San Antonio (UTSA). He holds Security+, CISSP, CSSLP, IAM and IEM certifications. His research interests include the use of systems theory to explore information security, specifically in Cyber Physical Systems. He has an extensive background in secure coding and is a co-chair of the DHS Software Assurance Forum working group for workforce education, training and development.