Limit search to available items
Book Cover
E-book
Author DeFranco, Joanna F

Title What Every Engineer Should Know about Cyber Security and Digital Forensics
Edition 2nd ed
Published Milton : Taylor & Francis Group, 2022

Copies

Description 1 online resource (199 p.)
Series What Every Engineer Should Know Ser
What Every Engineer Should Know Ser
Contents Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- What Every Engineer Should Know: Series Statement -- Preface -- Acknowledgments -- Authors -- Chapter 1 Security Threats -- 1.1 Introduction -- 1.2 Social Engineering -- 1.3 Travel -- 1.4 Mobile Devices -- 1.5 Internet -- 1.6 The Cloud -- 1.7 Cyber Physical Systems -- 1.8 Theft -- References -- Notes -- Chapter 2 Cyber Security -- 2.1 Introduction -- 2.2 Information Security -- 2.3 Security Architecture -- 2.4 Access Controls -- 2.5 Cryptography -- 2.5.1 Types of Cryptography or Cryptographic Algorithms
2.6 Network and Telecommunications Security -- 2.7 Operating System Security -- 2.8 Software Development Security -- 2.9 Database Security -- 2.10 Internet of Things Security -- 2.11 Business Continuity and Disaster Recovery -- 2.12 Physical Security -- 2.13 Legal, Regulations, Compliance, and Investigations -- 2.14 Operations Security -- 2.15 Information Security Governance and Risk Management -- References -- Chapter 3 Strategy to Outpace the Adversary -- 3.1 Introduction -- 3.2 The Problem -- 3.3 Boyd's OODA Loop Overview -- 3.3.1 Observe in Depth -- 3.3.2 Orient in Depth
3.3.3 Decide in Depth -- 3.3.4 Act in Depth -- 3.4 OODA Loop Applied: The Ukraine-Russia Cyberwar -- 3.4.1 Observe -- 3.4.2 Orient -- 3.4.2.1 Understand the Cyber Security Posture of Your Third and Fourth Parties -- 3.4.2.2 Understand the Ransomware Susceptibility of Your Vendors -- 3.4.3 Decide -- 3.4.3.1 Monitor the DDoS Resiliency of Your Vendors -- 3.4.4 Act -- 3.4.5 Take Away Points -- 3.5 Conclusions and Recommendations -- References -- Note -- Chapter 4 Preparing for an Incident -- 4.1 Introduction -- 4.1.1 The Zachman Framework
4.1.2 Adaptation of the Zachman Framework to Incident Response Preparation -- 4.2 Risk Identification -- 4.3 Host Preparation -- 4.4 Network Preparation -- 4.5 Establishing Appropriate Policies and Procedures -- 4.6 Establishing an Incident Response Team -- 4.7 Preparing a Response Toolkit -- 4.8 Training -- References -- Notes -- Chapter 5 Incident Response and Digital Forensics -- 5.1 Introduction -- 5.2 Incident Response -- 5.2.1 Detection/Identification -- 5.2.2 Containment -- 5.2.3 Eradication -- 5.2.4 Recovery -- 5.3 Incident Response for Cloud Computing -- 5.4 Digital Forensics
5.4.1 Preparation -- 5.4.2 Collection -- 5.4.3 Analysis -- 5.4.4 Reporting -- 5.5 Mobile Phone Forensics -- References -- Notes -- Chapter 6 Development, Security, and Operations -- 6.1 What Is a Secure Software Development Life Cycle? -- 6.2 Reasons to Use SDLC -- 6.3 Segregation of Environments -- 6.4 Secure SDLC Phases -- 6.5 Why Do Developers Not Follow SDLC? -- 6.6 Is SDLC an OODA Loop? -- References -- Chapter 7 Mobile Device Forensic Tools -- 7.1 Introduction -- 7.2 Tools -- 7.2.1 Axiom and Axiom Cyber by Magnet Forensics -- 7.2.2 ALEAPP Android and iOS Analysis Tools
Summary Designed for the non-security professional, this book is an overview of the field of cyber security. The new edition updates content and introduces topics such as business changes and outsourcing. It addresses new cyber security risks such as IoT and Distributed Networks (i.e., blockchain) and covers strategy based on the OODA loop in the cycle
Notes Description based upon print version of record
7.2.3 Belkasoft Evidence Center X
Subject Digital forensic science
Computer networks -- Security measures
Computer security
Computer networks -- Security measures.
Computer security.
Digital forensic science.
Form Electronic book
Author Maley, Bob
ISBN 9781000797961
1000797961