logo

[PDF] [eBook] Information Security Text and Cases 2.0 By Gurpreet S. Dhillon

[PDF] [eBook] Information Security Text and Cases 2.0 By Gurpreet S. Dhillon
Edition : 2.0
Genres : Information Technology, IT, Security System
Author : Gurpreet S. Dhillon
Publisher : Prospect Press
ISBN : 9781943153251
Print ISBN : 1943153256
eText ISBN : 9781943153244
File Type : ZIP

Instant Download

  • $21.99

[PDF] [eBook] Information Security Text and Cases 2.0 By Gurpreet S. Dhillon

Print ISBN: 9781943153251, 1943153256

eText ISBN: 9781943153244, 1943153248

You are buying eBook in pdf file, its not text book, we will send it by email after payment; you can read this eBook from your mobile, laptop or Desktop. Please confirm book title and TOC before payment to avoid any payment disputes.

 

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Contents
  5. List of Figures
  6. Preface
  7. Acknowledgments
  8. About the Author
  9. Chapter 1. Information System Security: Nature and Scope
  10. Coordination in Threes
  11. Security in Threes
  12. Institutionalizing Security in Organizations
  13. Questions and Exercises
  14. Case Study: Virtual Companies and Identity Theft
  15. References
  16. Part I. Technical Aspects of Information Systems Security
  17. Chapter 2. Security of Technical Systems in Organizations
  18. Vulnerabilities
  19. Methods of Defense
  20. Historical Review of Models for Security Specification
  21. Away from the Military
  22. Toward Integrity: Biba, Clark-Wilson, and Chinese Walls
  23. Emergent Issues
  24. Concluding Remarks
  25. Questions and Exercises
  26. Case Study: Breaking into Sprint’s Backbone Network
  27. References
  28. Chapter 3. Cryptography and Technical IS Security
  29. Cryptography
  30. Cryptanalysis
  31. Conventional Encryption Algorithms
  32. Asymmetric Encryption
  33. Future of Encryption
  34. Blockchains
  35. Questions and Exercises
  36. Case Study: The PGP Attack
  37. Case Study: Visa Goes Blockchain
  38. References
  39. Chapter 4. Network Security
  40. TCP/UDP/IP Protocol Architecture
  41. Middleware Devices
  42. Types of Network Attacks
  43. New Trends in Network Security
  44. Discussion Questions
  45. Exercise
  46. Short Questions
  47. Case Study: The Distributed Denial of Service Attack
  48. References
  49. Part II. Formal Aspects of Information Systems Security
  50. Chapter 5. Planning for Information System Security
  51. Formal IS Security Dimensions
  52. Security Strategy Levels
  53. Classes of Security Decisions in Firms
  54. Security Planning Process
  55. IS Security Planning Principles
  56. Summary
  57. Questions and Exercises
  58. Case Study: The Hack at UC Berkley
  59. References
  60. Chapter 6. Risk Management for Information System Security
  61. Risk Assessment
  62. Risk Mitigation
  63. Risk Evaluation and Assessment
  64. COBRA: A Hybrid Model for Software Cost Estimation, Benchmarking, and Risk Assessment
  65. A Risk Management Process Model
  66. Concluding Remarks
  67. Questions and Exercises
  68. Case Study: Insiders Play a Role in Security Breaches
  69. References
  70. Chapter 7. Information Systems Security Standards and Guidelines
  71. The Role of Standards in Information Systems Security
  72. Process Improvement Software
  73. The SSE-CMM
  74. Key Constructs and Concepts in SSE-CMM
  75. SSE-CMM Architecture Description
  76. From the Rainbow Series to Common Criteria
  77. ITSEC
  78. International Harmonization
  79. Other Miscellaneous Standards and Guidelines
  80. Concluding Remarks
  81. Questions and Exercises
  82. Case Study: Remote Access Problems at the DHS
  83. References
  84. Chapter 8. Responding to an Information Security Breach
  85. Technicalities of a Breach
  86. Policy Considerations
  87. Reputation and Responsiveness
  88. Risk and Resilience
  89. Governance
  90. Steps to Avoid a Potential Attack
  91. How to Respond When a Breach Occurs
  92. Best Practices: How to Be Prepared for an Intrusion
  93. Concluding Remarks
  94. Questions and Exercises
  95. Case Study: Equifax Breach
  96. References
  97. Part III. Informal Aspects of Information Systems Security
  98. Chapter 9. Behavioral Aspects of Information System Security
  99. Employee Threats
  100. Social Engineering Attacks
  101. Individual Motivation to Prevent Cyberattacks
  102. Cybercrime: Criminals and Mediums
  103. Cyberespionage
  104. Cyberterrorism
  105. Cyberstalking
  106. Questions and Exercises
  107. Case Study: Cyberterrorism—A New Reality
  108. References
  109. Chapter 10. Culture and Information System Security
  110. Understanding the Concept of Security Culture
  111. Silent Messages and IS Security
  112. Leadership and Security Culture
  113. Security Culture Framework
  114. OECD Principles for Security Culture
  115. Concluding Remarks
  116. Questions and Exercises
  117. Case Study: The T-Mobile Hack
  118. References
  119. Chapter 11. Ethical and Professional Issues in IS Security Management
  120. Coping with Unemployment and Underemployment
  121. Intellectual Property and Crime
  122. IT and White Collar Crime
  123. Managing Ethical Behavior
  124. Codes of Conduct
  125. Credentialing
  126. Questions and Exercises
  127. Case Study: The DoubleClick Case
  128. References
  129. Part IV. Regulatory Aspects of Information Systems Security
  130. Chapter 12. Legal Aspects of Information System Security
  131. The Computer Fraud and Abuse Act (CFAA)
  132. The Computer Security Act (CSA)
  133. Health Insurance Portability and Accountability Act (HIPPA)
  134. Sarbanes-Oxley Act (SOX)
  135. Federal Information Security Management Act (FISMA)
  136. Concluding Remarks
  137. Questions and Exercises
  138. Case Study: FTC versus Wyndham Worldwide Corporation
  139. References
  140. Chapter 13. Computer Forensics
  141. The Basics
  142. Types and Scope of Crimes
  143. Lack of Uniform Law
  144. What Is “Computer Forensics”?
  145. Gathering Evidence Forensically
  146. Formal Procedure for Gathering Data
  147. Law Dictating Formal Procedure
  148. Law Governing Seizure of Evidence
  149. Law Governing Analysis and Presentation of Evidence
  150. Emergent Issues
  151. Concluding Remarks
  152. Questions and Exercises
  153. Case Study: The Deathserv Case
  154. Case Study: Tradeoffs in Eavesdropping
  155. References
  156. Chapter 14. Summary Principles for IS Security
  157. Principles for Technical Aspects of IS Security
  158. Principles for Formal Aspects of IS Security
  159. Principles for Informal Aspects of IS Security
  160. Concluding Remarks
  161. References
  162. Part V. Case Studies
  163. Case Study 1: The Anthem Data Breach
  164. Anthem’s History and Background of the Industry
  165. Who Is at Stake?
  166. Lawsuits and Policy Issues
  167. Significance of the Problem and What Anthem Is Doing About It
  168. Strategic Alignment—A Possible Cause of the Breach
  169. Strategic Choices
  170. Questions
  171. References
  172. Case Study 2: Process and Data Integrity Concerns in a Scheduling System
  173. Case Description
  174. Reform
  175. Implications
  176. Summary
  177. Questions
  178. Sources Used
  179. Case Study 3: Case of a Computer Hack
  180. Computer System
  181. Changes
  182. History of the System
  183. Other Issues
  184. Hack Discovered
  185. Immediate Response
  186. Further Research and Additional Symptoms
  187. Summary
  188. Case Study 4: Critical Infrastructure Protection: The Big Ten Power Company
  189. The Big Ten Power Company
  190. Federal and State Efforts to Secure Critical Infrastructure
  191. Federal Legislation
  192. Questions
  193. Case Study 5: The Case of Sony’s PlayStation Network Breach
  194. Sony Gets Attacked
  195. Technical Details of the Attack
  196. The Emergent Challenges
  197. Questions
  198. Index

Related Books

Browse the collection of related category ebooks.



Cart
View Cart

    Cart is empty.

Total :
$0