Cover image for Cyber-security and global information assurance threat analysis and response solutions
Cyber-security and global information assurance threat analysis and response solutions
Title:
Cyber-security and global information assurance threat analysis and response solutions
Author:
Knapp, Kenneth J.
ISBN:
9781605663272
Publication Information:
Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2009.
Physical Description:
electronic texts (xxii, 434 p. : ill.) : digital files.
Contents:
1. Dynamic modeling of the cyber security threat problem / Jaziar Radianti, Jose Gonzalez -- 2. An attack graph based approach for threat identification of an enterprise network / Somak Bhattacharya, Samresh Malhotra, S. Ghosh -- 3. Insider threat prevention, detection and mitigation / Robert Mills, Gilbert Peterson, Michael Grimaila -- 4.An autocorrelation methodology for the assessment of security assurance / Richard Gordon, Allison Gehrke -- 5. Security implications for management from the onset of information terrorism / Ken Webb -- 6. The adoption of information security management standards / Yves Barlette, Vladislav Fomin -- 7. Data smog, techno creep and the hobbling of the cognitive dimension / Peter Marksteiner -- 8. Balancing the public policy drivers in the tension between privacy and security / John Bagby -- 9. Human factors in security / Indira Guzman, Kathryn Stam, Shaveta Hans, Carole Angolano -- 10. Diagnosing misfits, inducing requirements, and delineating transformations within computer network operations organizations / Nikolaos Bekatoros HN, Jack Koons III, Mark Nissen -- 11. An approach to managing identity fraud / Rodger Jamieson, Stephen Smith, Greg Stephens, Donald Winchester -- 12. A repeatable collaboration process for incident response planning / Alanah Davis, Gert-Jan de Vreede, Leah Pietron -- 13. Pandemic influenza, worker absenteeism and impacts on critical infrastructures / Dean Jones, Linda Nozick, Mark Turnquist, William Sawaya --

14.Information sharing / Preeti Singh, Pranav Singh, Insu Park, JinKyu Lee -- 15. An overview of the community cyber security maturity model / Gregory White, Mark Huson -- 16. Server hardening model development / Doug White, Alan Rea -- 17. Trusted computing / Jeff Teo -- 18. Introduction, classification and implementation of honeypots / Miguel Hernandez y Lopez, Carlos Lerma Resendez.
Abstract:
The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community. This book provides a valuable resource for academicians and practitioners by addressing the most pressing issues facing cyber-security from both a national and global perspective. This reference source takes a holistic approach to cyber security and information assurance by treating both the technical as well as managerial sides of the field.
Added Author:
Added Corporate Author:
Holds: Copies: