Limit search to available items
Book Cover
E-book
Author Kostopoulos, George

Title Cyberspace and Cybersecurity, Second Edition
Edition 2nd ed
Published London : CRC Press, 2017

Copies

Description 1 online resource (316 pages)
Contents Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Foreword -- Preface -- The Modern World -- Purpose and Audience -- The Book -- Acknowledgments -- Author -- Chapter 1: Vulnerabilities in Information Systems -- Introduction -- Causes of Vulnerability -- Measuring Vulnerability -- Avoiding Vulnerabilities through Secure Coding -- Mistakes Can Be Good -- Threats Classification -- Threat Modeling Process -- Security Starts at Home -- Security in Applications -- Introducing Countermeasures
International Awareness Exercises -- Chapter 2: Vulnerabilities in the Organization -- Introduction -- Common Organizational Vulnerabilities -- Access Authorization and Authentication -- Human Factors -- Security Services -- External Technologies -- Vulnerabilities in Networks -- Wireless Networks -- Bluetooth -- Passive Vulnerabilities -- Active Vulnerabilities -- Precautions -- Wireless Fidelity -- Wi-Fi Precautions at Home -- Wi-Fi Precautions at the Hotspot -- Wi-Fi Precautions at the Enterprise
Worldwide Interoperability Microwave Access WiMAX Features -- Cloud Computing -- Internet of Things -- Automotive Cybersecurity -- Vulnerability Assessment Tools -- Exercises -- Chapter 3: Risks in Information Systems Infrastructure -- Introduction -- Risks in Hardware -- Risks in Software -- Risks in People -- Risks in Laptops -- Risks in Cyberspace -- Risks in Legacy Infrastructure -- Risks in Mobile Telephony -- Risk Insurance in Cyberspace -- Exercises -- Chapter 4: Secure Information Systems -- Introduction
Assets Identification Assets Communication -- Assets Storage -- Resource Access Control Facility -- Securing the Email Communications -- Email Server Side -- Email Client Side -- Information Security Management -- Encryption Options in Emails -- Steganography -- Exercises -- Chapter 5: Cybersecurity and the CIO -- Introduction -- CIO: Personality -- Trust and Ethics -- Communication and Intelligence -- Leadership and Entrepreneurship -- Courage and Limitations -- CIO: Education -- University Degrees -- Certifications
Continuing Education and Skills Acquisition CIO: Experience -- CIO: Responsibilities -- Data Backup and Archiving -- Culture of Security -- Cyber Training -- Contingency Plans -- Liability -- CIO: Information Security -- Internal Information Security Components -- Access Controlâ#x80;#x94;Electronic Here, we have three questions: Who? What? How? Sometimes one more question is added: When? Todayâ#x80;#x99;s database systems allow access control down to the cell of a spreadsheet. Programming security to that level might be tedious, but
""Access Controlâ#x80;#x94;Physical In an enterprise, it is often the case where access is granted for specific areas of the facilities. In such cases, combination locks or card swiping devices allow authorized access. In the former case, the drawback is possible los""
Notes Print version record
Subject Cyberspace -- Security measures.
Cyberspace -- Security measures
Form Electronic book
ISBN 9781351651653
135165165X