This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats. This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity threats. The author builds from a common understanding based on previous class-tested works to introduce the reader to the current and newly innovative approaches to address the maliciously-by-human-created (rather than by-chance-occurring) vulnerability and threat, and related cost-effective management to mitigate such risk. This book is purely statistical data-oriented (not deterministic) and employs computationally intensive techniques, such as Monte Carlo and Discrete Event Simulation. The enriched JAVA ready-to-go applications and solutions to exercises provided by the author at the book s specifically preserved website will enable readers to utilize the course related problems. Enables the reader to use the book's website's applications to implement and see results, and use them making budgetary sense Utilizes a data analytical approach and provides clear entry points for readers of varying skill sets and backgrounds Developed out of necessity from real in-class experience while teaching advanced undergraduate and graduate courses by the author Cyber-Risk Informatics is a resource for undergraduate students, graduate students, and practitioners in the field of Risk Assessment and Management regarding Security and Reliability Modeling. Mehmet Sahinoglu, a Professor (1990) Emeritus (2000), is the founder of the Informatics Institute (2009) and its SACS-accredited (2010) and NSA-certified (2013) flagship Cybersystems and Information Security (CSIS) graduate program (the first such full degree in-class program in Southeastern USA) at AUM, Auburn University s metropolitan campus in Montgomery, Alabama. He is a fellow member of the SDPS Society, a senior member of the IEEE, and an elected member of ISI. Sahinoglu is the recipient of Microsoft's Trustworthy Computing Curriculum (TCC) award and the author of Trustworthy Computing (Wiley, 2007).
It's two years after the Zero Day attacks, and cyber-security analyst Jeff Aiken is reaping the rewards for crippling Al-Qaida's assault on the computer infrastructure of the Western world. His company is flourishing, and his relationship with former government agent Daryl Haugen has intensified since she became a part of his team.
But the West is under its greatest threat yet. A revolutionary, invisible trojan that alters data without leaving a trace—more sophisticated than any virus seen before—has been identified, roiling international politics. Jeff and Daryl are summoned to root it out and discover its source. As the trojan penetrates Western intelligence, and the terrifying truth about its creator is revealed, Jeff and Daryl find themselves in a desperate race to reverse it as the fate of both East and West hangs in the balance.
Continue reading “Trojan Horse: A Jeff Aiken Novel (Jeff Aiken Series Book 2)”
There has been a great deal of speculation recently concerning the likely impact of the ‘Information Age‘ on warfare. In this vein, much of the Revolution in Military Affairs (RMA) literature subscribes to the idea that the Information Age will witness a transformation in the very nature of war. In this book, David Lonsdale puts that notion to the test.
Using a range of contexts, the book sets out to look at whether the classical Clausewitzian theory of the nature of war will retain its validity in this new age. The analysis covers the character of the future battlespace, the function of command, and the much-hyped concept of Strategic Information Warfare. Finally, the book broadens its perspective to examine the nature of ‘Information Power' and its implications for geopolitics. Through an assessment of both historical and contemporary case studies (including the events following September 11 and the recent war in Iraq), the author concludes that although the future will see many changes to the conduct of warfare, the nature of war, as given theoretical form by Clausewitz, will remain essentially unchanged.
Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the equation that is the deployment strategy, then verifies the solution against the original problem by analyzing security incidents and mining hidden breaches, ultimately refines the security formula iteratively in a perpetual cycle. You will learn about: * Secure proxies the necessary extension of the endpoints * Application identification and control visualize the threats * Malnets where is the source of infection and who are the pathogens * Identify the security breach who was the victim and what was the lure * Security in Mobile computing SNAFU
With this book, you will be able to: * Identify the relevant solutions to secure the infrastructure * Construct policies that provide flexibility to the users so to ensure productivity * Deploy effective defenses against the ever evolving web threats * Implement solutions that are compliant to relevant rules and regulations * Offer insight to developers who are building new security solutions and products