000 02728cam a22002297a 4500
999 _c23361
_d23361
010 _a 2012288209
020 _a9781466501331 (alk. paper)
020 _a1466501332 (alk. paper)
082 _a005.8 KO CY
100 1 _aKostopoulos, George K.,
_d1939-
_938699
245 1 0 _aCyberspace and cybersecurity /
_cGeorge K. Kostopoulos.
260 _aBoca Raton, Fl. :
_bCRC Press,
_cc2013.
300 _axvii, 218 p. ;
_bill. :
_c24 cm.
504 _aIncludes bibliographical references and index.
520 _aBased on related courses and research on the cyber environment in Europe, the United States, and Asia, Cyberspace and Cybersecurity supplies complete coverage of cyberspace and cybersecurity. It not only emphasizes technologies but also pays close attention to human factors and organizational perspectives. Detailing guidelines for quantifying and measuring vulnerabilities, the book also explains how to avoid these vulnerabilities through secure coding. It covers organizational-related vulnerabilities, including access authorization, user authentication, and human factors in information security. Providing readers with the understanding required to build a secure enterprise, block intrusions, and handle delicate legal and ethical issues, the text: Examines the risks inherent in information system components, namely hardware, software, and people Explains why asset identification should be the cornerstone of any information security strategy Identifies the traits a CIO must have to address cybersecurity challenges Describes how to ensure business continuity in the event of adverse incidents, including acts of nature Considers intrusion detection and prevention systems (IDPS), focusing on configurations, capabilities, selection, management, and deployment Explaining how to secure a computer against malware and cyber attacks, the texte(tm)s wide-ranging coverage includes security analyzers, firewalls, antivirus software, file shredding, file encryption, and anti-loggers. It reviews international and U.S. federal laws and legal initiatives aimed at providing a legal infrastructure for what transpires over the Internet. The book concludes by examining the role of the U.S. Department of Homeland Security in our countrye(tm)s cyber preparedness. Exercises with solutions, updated references, electronic presentations, evaluation criteria for projects, guidelines to project preparations, and teaching suggestions are available upon qualified course adoption.
650 0 _aComputer security.
_9641
650 0 _aCyberspace
_xSecurity measures.
_938700
856 _uhttps://uowd.box.com/s/txqrjlyxzuknfqfmikirkc6zqx0e9ip8
_zLocation Map