| 000 | 05945cam a2200409 i 4500 | ||
|---|---|---|---|
| 005 | 20250918234657.0 | ||
| 008 | 140523s2013 flua b 001 0 eng | ||
| 020 |
_a9781466501331 (alk. paper) _cRM273.13 |
||
| 020 | _a1466501332 (alk. paper) | ||
| 039 | 9 |
_a201411121445 _badnan _c201411030920 _dmasrul _y05-23-2014 _zmasrul |
|
| 040 |
_aAU@ _beng _cAU@ _dDLC _dBTCTA _dUKMGB _dYDXCP _dBWX _dCDX _dUBY _dJHE _dUKM _erda |
||
| 090 | _aC18.K645 2 | ||
| 090 |
_aC18 _b.K645 2 |
||
| 100 | 1 |
_aKostopoulos, George K., _d1939-, _eauthor. |
|
| 245 | 1 | 0 |
_aCyberspace and cybersecurity / _cGeorge K. Kostopoulos. |
| 264 | 1 |
_aBoca Raton, Fl. : _bCRC Press, _c[2013] |
|
| 264 | 4 | _c©2013 | |
| 300 |
_axvii, 218 pages : _billustrations ; _c24 cm. |
||
| 336 |
_atext _2rdacontent |
||
| 337 |
_aunmediated _2rdamedia |
||
| 338 |
_avolume _2rdacarrier |
||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aMachine generated contents note: 1.Vulnerabilities in Information Systems -- Introduction -- Measuring Vulnerability -- Avoiding Vulnerabilities through Secure Coding -- Mistakes Can Be Good -- Threats Classification -- Threat Modeling Process -- Security Starts at Home -- Security in Applications -- International Awareness -- Exercises -- 2.Vulnerabilities in the Organization -- Introduction -- Common Organizational Vulnerabilities -- Access Authorization and Authentication -- Human Factors -- Security Services -- External Technologies -- Wireless Networks -- Bluetooth -- Passive Vulnerabilities -- Active Vulnerabilities -- Precautions -- Wireless Fidelity -- Wi-Fi Precautions at Home -- Wi-Fi Precautions at the Hotspot -- Wi-Fi Precautions at the Enterprise -- Worldwide Interoperability Microwave Access -- WiMAX Features -- Cloud Computing -- Exercises -- 3.Risks in Information Systems Infrastructure -- Introduction -- Risks in Hardware -- Risks in Software -- | |
| 505 | 0 | _aNote continued: Risks in People -- Risks in Laptops -- Risks in Cyberspace -- Risk Insurance in Cyberspace -- Exercises -- 4.Secure Information Systems -- Introduction -- Assets Identification -- Assets Communication -- Assets Storage -- Resource Access Control Facility -- Securing the Email Communications -- Email Server Side -- Email Client Side -- Information Security Management -- Exercises -- 5.Cybersecurity and the CIO -- Introduction -- CIO: Personality -- Trust and Ethics -- Communication and Intelligence -- Leadership and Entrepreneurship -- Courage and Limitations -- CIO: Education -- University Degrees -- Certifications -- CIO: Experience -- CIO: Responsibilities -- Data Backup and Archiving -- Culture of Security -- Cyber Training -- Contingency Plans -- Liability -- CIO: Information Security -- Internal Information Security Components -- Access Control -- Electronic -- Access Control -- Physical -- Cyber Policies -- Cyber Awareness and Training -- Training -- | |
| 505 | 0 | _aNote continued: Business Continuity -- CIO: The Changing Role -- Exercises -- 6.Building a Secure Organization -- Introduction -- Business Continuity Planning -- Business Impact Analysis (BIA) -- Business Recovery Strategy (BRS) -- Drafting of the BCP -- Testing of the BCP -- Training in BCP Implementation -- BCP Performance Indicators -- System Access Control -- System Development and Maintenance -- Physical and Environmental Security -- Compliance -- Personnel Security -- Security Organization -- Computer and Network Management -- Asset Classification and Control -- Security Policy -- Exercises -- 7.Cyberspace Intrusions -- Introduction -- IDPS Configuration -- Sensors -- Processor -- Consoles -- Network -- IDPS Capabilities -- Information Acquisition -- Information Loggings -- Detection Techniques -- Prevention Actions -- IDPS Management -- Implementation -- Step One Features -- Step Two Architecture -- Step Three Installation -- Step Four Testing -- | |
| 505 | 0 | _aNote continued: Step Five Activation -- Operation -- Maintenance -- IDPS Classification -- Host-Based IDPS -- Network-Based IDPS -- Network Behavior Analysis System -- Wireless IDPS -- IDPS Comparison -- Exercises -- 8.Cyberspace Defense -- Introduction -- File Protection Applications -- File Backup -- Disaster Recovery -- History Deletion -- Shredding and Wiping -- File Undelete -- File Encryption -- Loggers -- Anti-Loggers -- PC Performance Applications -- Registry Repair -- Anti-Rootkits -- Antivirus -- Junk Files -- Fragmentation -- Protection Tools -- Security Analyzer -- Password Analyzer -- Firewalls -- Packet-Level Filtering -- Circuit-Level Filtering -- Application-Level Gateway -- Email Protection -- Exercises -- 9.Cyberspace and the Law -- Introduction -- International Laws -- Europe -- United Nations -- North Atlantic Treaty Organization -- INTERPOL -- Impediments to Cyber Law Enforcement -- Cyber-Related Laws in the United States -- | |
| 505 | 0 | _aNote continued: Commercial Privacy Bill of Rights Act of 2011 -- Cybersecurity Act of 2010 -- Federal Information Security Management Act of 2002 -- USA PATRIOT Act of 2001 -- Communications Assistance for Law Enforcement Act of 1994 -- Computer Security Act of 1987 -- Privacy Act of 1974 -- Cybercrime -- Trends in Cyber Abuse -- Combating Cybercrime -- Exercises -- 10.Cyber Warfare and Homeland Security -- Introduction -- Cyber Warfare -- Cyber Weapons Convention -- Cyber Terrorism -- Cyber Espionage -- Homeland Security -- National Cyber Security Division -- Cybersecurity Preparedness -- Challenges -- Distributed Defense -- Countermeasures -- Cyber Defense Ecosystem -- Cybersecurity Training -- Cyber Simulation and Exercises -- Exercises. | |
| 650 | 0 | _aComputer security. | |
| 650 | 0 |
_aCyberspace _xSecurity measures. |
|
| 907 |
_a.b15907740 _b2019-11-12 _c2019-11-12 |
||
| 942 |
_c01 _n0 _kC18.K645 2 |
||
| 914 | _avtls003560158 | ||
| 990 | _amab | ||
| 991 | _aFakulti Undang-Undang | ||
| 998 |
_au _b2014-10-05 _cm _da _feng _gflu _y0 _z.b15907740 |
||
| 999 |
_c570335 _d570335 |
||