Cyberspace and Cybersecurity is a comprehensive source of information on both the technological side of cyberspace and cyber security and the human and organisational side. The information in the book is based on global research on the cyber environment in Europe, the United States, and Asia. The book:
- Examines the risks inherent in information system components, namely hardware, software, and people.
- Explains why asset identification should be the cornerstone of any information security strategy.
- Identifies the traits a CIO must have to address cyber security challenges.
- Describes how to ensure business continuity in the event of adverse incidents, including acts of nature.
- Considers intrusion detection and prevention systems (IDPS), focusing on configurations, capabilities, selection, management, and deployment.
- Includes access to instructor and student resources such as electronic presentations, exercises and their solutions, making this an ideal resource for training courses.
If you are looking for an up-to-date resource on the many different aspects of cyber security, this is one of the key books you need. It provides guidelines for quantifying and measuring vulnerabilities, and explains how to mitigate the risk posed by these vulnerabilities using secure code. It also covers organisational-related vulnerabilities including access authorisation, user authentication, and human factors in information security; and how to build a secure enterprise, block intrusions and handle delicate legal and ethical issues.
Explaining how to secure a computer against malware and cyber attacks, Cyberspace and Cybersecurity’s wide-ranging coverage includes security analysers, firewalls, antivirus software, file shredding, file encryption, and anti-loggers. It also looks at the various laws around the world which provide a legal framework for what takes place on the Web. The book concludes by examining the role of the US Department of Homeland Security in the US's cyber preparedness.
Click to expand full contents »
- Vulnerabilities in Information Systems
- Vulnerabilities in the Organization
- Risks in Information Systems Infrastructure
- Secure Information Systems
- Cybersecurity and the CIO
- Building a Secure Organization
- Cyberspace Intrusions
- Cyberspace Defense
- Cyberspace and the Law
- Cyber Warfare and Homeland Security
About the author
Dr. George K. Kostopoulos is a faculty mentor in the master’s degree programs in cyber security and information assurance at the University of Maryland University College. Dr. Kostopoulos has an extensive international academic career, having taught in seventeen universities around the world, including Boston University, Texas A&M International University, Florida Atlantic University, the University of Heidelberg (Germany), and the American University of Sharjah (UAE). He is the author of numerous scholarly papers and two other books, Digital Engineering and Greece and the European Economic Community. Dr. Kostopoulos received his master’s and PhD degrees in electrical and computer engineering from the Arizona State University, and a master’s in economics from California State Polytechnic University. He is the founder and editor-in-chief of the Journal of Cybersecurity and Information Assurance and a reviewer of numerous scientific conferences.
Published: 10 Aug 2012
Availability: In Stock
There are no comments for this product.