Advances in Cyber Security: Technology, Operation, and ExperiencesAs you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect yourselves from this threat.The world's foremost cyber security experts, from Ruby Lee, Ph.D., the Forrest G. Hamrick professor of engineering and Director of the Princeton Architecture Laboratory for Multimedia and Security (PALMS) at Princeton University; to Nick Mankovich, Chief Information Security Officer of Royal Philips Electronics; to FBI Director Robert S. Mueller III; to Special Assistant to the President Howard A. Schmidt, share critical practical knowledge on how the cyberspace ecosystem is structured, how it functions, and what we can do to protect it and ourselves fromattack and exploitation.The proliferation of social networking and advancement of information technology provide endless benefits in our living and working environments. However, these benefits also bring horrors in various forms of cyber threats andexploitations. Advances in Cyber Security collects the wisdom of cyber security professionals and practitioners from government, academia, and industry across national and international boundaries to provide ways and means to secure and sustain the cyberspace ecosystem. Readers are given a first-hand look at critical intelligence on cybercrime and security--including details of real-life operations. The vast, useful knowledge and experience shared in this essential new volume enables cyber citizens and cyber professionals alike to conceive novel ideasand construct feasible and practical solutions for defending against all kinds of adversaries and attacks.Among the many important topics covered in this collection are building a secure cyberspace ecosystem; public-private partnership to secure cyberspace; operation and law enforcement to protect our cyber citizens and to safeguard our cyber infrastructure; and strategy and policy issues to secure and sustain our cyber ecosystem. |
What people are saying - Write a review
We haven't found any reviews in the usual places.
Contents
Improving Cyber Security | 37 |
Practical Vulnerabilities of the Tor Anonymity Network | 60 |
Defending Software Systems against Cyber Attacks | 74 |
Internet Exchange | 90 |
Uses and Limitations of Online Anonymity | 109 |
Cyber Security | 121 |
Partners in Cybercrime | 146 |
Computer Forensics from a Law Enforcement Perspective | 188 |
Other editions - View all
Advances in Cyber Security: Technology, Operations, and Experiences Derbiau Frank Hsu,Dorothy Marinucci No preview available - 2013 |
Common terms and phrases
actors adversary analysis anonymity application architecture Authoritative Data Sources Available Bastion botnet cache carders circuit cloud computing communication computer forensic computer systems configuration connected criminal Crowdsourcing cyber attacks cyber crime cyber security cybercrime cybercriminals cyberspace ecosystem detection encrypted environment example file find first flow Fordham University forensic Gbps global hardware hidden service hypervisor identified identity IEEE improving cyber security indegree individual centrality informatics InfraGard infrastructure interconnected Internet investigation IPv6 ISP-A ISP—B ISPs IXPs law enforcement layer locations malicious malware medical device monitoring multiple National onion routing operations organizations outdegree peering percent physical protect protocol relays reputation requires router routing secure cyberspace significant social network specific strategy target threats Tier 2 providers tion Tor network traffic trustworthy spaces untrusted users vulnerabilities Wikileaks