Cyber-Security and Global Information Assurance: Threat Analysis and Response Solutions, 1st Edition

  • Published By:
  • ISBN-10: 1605663271
  • ISBN-13: 9781605663272
  • Grade Level Range: College Freshman - College Senior
  • 434 Pages | eBook
  • Original Copyright 2009 | Published/Released September 2009
  • This publication's content originally published in print form: 2009

  • Price:  Sign in for price

About

Overview

The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community. "Cyber-Security and Global Information Assurance: Threat Analysis and Response Solutions" provides a valuable resource for academicians and practitioners by addressing the most pressing issues facing cyber-security from both a national and global perspective. This reference source takes a holistic approach to cyber security and information assurance by treating both the technical as well as managerial sides of the field.

Table of Contents

Cover Page.
Title Page.
Copyright Page.
Editorial Advisory Board.
List of Reviewers.
Table of Contents.
Detailed Table of Contents.
Foreword.
Preface.
Acknowledgment.
1: Risk and Threat Assessment.
2: Dynamic Modeling of the Cyber Security Threat Problem: The Black Market for Vulnerabilities.
3: An Attack Graph Based Approach for Threat Identification of an Enterprise Network.
4: Insider Threat Prevention, Detection and Mitigation.
5: An Autocorrelation Methodology for the Assessment of Security Assurance.
6: Security Implications for Management from the Onset of Information Terrorism.
7: Organizational and Human Security.
8: The Adoption of Information Security Management Standards: A Literature Review.
9: Data Smog, Techno Creep and the Hobbling of the Cognitive Dimension.
10: Balancing the Public Policy Drivers in the Tension between Privacy and Security.
11: Human Factors in Security: The Role of Information Security Professionals within Organizations.
12: Diagnosing Misfits, Inducing Requirements, and Delineating Transformations within Computer Network Operations Organizations.
13: An Approach to Managing Identity Fraud.
14: Emergency Response Planning.
15: A Repeatable Collaboration Process for Incident Response Planning.
16: Pandemic Influenza, Worker Absenteeism and Impacts on Critical Infrastructures: Freight Transportation as an Illustration.
17: Information Sharing: A Study of Information Attributes and their Relative Significance During Catastrophic Events.
18: An Overview of the Community Cyber Security Maturity Model.
19: Security Technologies.
20: Server Hardening Model Development: A Methodology-Based Approach to Increased System Security.
21: Trusted Computing: Evolution and Direction.
22: Introduction, Classification and Implementation of Honeypots.
Compilation of References.
About the Contributors.
Index.
Advertisement.