Engineering trustworthy systems get cybersecurity design right the first time

This professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to thin...

Full description

Bibliographic Details
Main Author: Saydjari, O. Sami
Format: eBook
Language:English
Published: New York, NY McGraw-Hill Education 2018
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 04764nmm a2200397 u 4500
001 EB001919576
003 EBX01000000000000001082478
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9781260118186 
020 |a 1260118185 
050 4 |a TK5105.59 
100 1 |a Saydjari, O. Sami 
245 0 0 |a Engineering trustworthy systems  |b get cybersecurity design right the first time  |c O. Sami Saydjari 
260 |a New York, NY  |b McGraw-Hill Education  |c 2018 
300 |a 1 online resource 
505 0 |a 1.2.6 Who Is Attacking? -- 1.2.7 What Are They Trying to Do? -- 1.2.8 What Is the Attacker's Next Step? -- 1.2.9 What Can I Do About It? -- 1.2.10 What Are My Options and How Effective Will Each Option Be? -- 1.2.11 How Will My Mitigation Actions Affect Operation? -- 1.2.12 How Do I Better Defend Myself in the Future? -- 1.3 Asymmetry of Cyberspace Effects -- 1.3.1 Dimensionality -- 1.3.2 Nonlinearity -- 1.3.3 Coupling -- 1.3.4 Velocity -- 1.3.5 Manifestation -- 1.3.6 Detectability -- 1.4 The Cybersecurity Solution Landscape -- 1.4.1 Information Assurance Science and Engineering 
505 0 |a 2.2.6 Quantity of Service or Product -- 2.2.7 Quality of Service or Product -- 2.2.8 Cost of Service or Product -- 2.2.9 Limited Resources -- 2.3 Theories of Security Come from Theories of Insecurity -- 2.4 They Come at You Through the Weeds -- 2.5 Top-Down Meets Bottom-Up -- 2.6 Cybersecurity Is a Live Orchestra, Not a Recorded Instrument -- Conclusion -- Questions -- Chapter 3 Value and Mission: Know Thyself -- Overview -- Learning Objectives -- 3.1 Focus on Mission and Value -- 3.1.1 Avoid Concentrating Value -- 3.1.2 Beware the Complacency of Trust 
505 0 |a 1.4.2 Defensive Mechanisms -- 1.4.3 Cybersensors and Exploitation -- 1.4.4 Cyber Situation Understanding -- 1.4.5 Cyber Actuation -- 1.4.6 Cyber Command and Control -- 1.4.7 Cyber Defense Strategy and Tactics -- 1.5 Ounces of Prevention and Pounds of Cure -- Conclusion -- Questions -- Chapter 2 Cybersecurity Right-Think -- Overview -- Learning Objectives -- 2.1 It's About Risk -- 2.2 The Cybersecurity Trade-off: Performance and Functionality -- 2.2.1 User-Friendliness -- 2.2.2 Time to Market -- 2.2.3 Employee Morale -- 2.2.4 Missed Opportunity -- 2.2.5 Opportunity Cost 
505 0 |a Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Foreword -- Acknowledgments -- Introduction -- Part I What Do You Want? -- Chapter 1 What's the Problem? -- Overview -- Learning Objectives -- 1.1 Baking in Trustworthiness: Design-Time -- 1.1.1 What Is Trust? -- 1.1.2 Trust and Belief -- 1.1.3 Engineering -- 1.1.4 Why Trust? -- 1.2 Operational Perspective: Basic Questions -- 1.2.1 Am I Under Attack? -- 1.2.2 What Is the Nature of the Attack? -- 1.2.3 What Is the Mission Impact So Far? -- 1.2.4 What Is the Potential Mission Impact? -- 1.2.5 When Did It Start? 
505 0 |a 3.2 Confidentiality: Value of Secrecy from Adversaries -- 3.2.1 Acquired-Knowledge Secrets -- 3.2.2 Planning Secrets -- 3.2.3 Stolen Secrets -- 3.2.4 Means-of-Stealing-Secrets Secrets -- 3.3 Confidentiality: Beware the Tyranny of Secrecy -- 3.3.1 Secrecy Is Tenuous -- 3.3.2 Secrecy Is Expensive -- 3.3.3 Secrecy Can Be Self-Defeating -- 3.3.4 Secrecy Is Self-Breeding -- 3.3.5 Secrecy Creates a Form of Corrupting Power and Impediment to Operation -- 3.4 Confidentiality: Changing the Value Proposition -- 3.4.1 Minimize Secrecy and Dependency on Secrecy -- 3.4.2 Minimize Impact of Loss of Secrecy 
653 |a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277 
653 |a Computer networks / Security measures / fast 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
500 |a Includes index 
776 |z 9781260118179 
776 |z 1260118177 
776 |z 1260118185 
776 |z 9781260118186 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781260118186/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 005.8 
520 |a This professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to think strategically, identify the highest priority risks, and apply advanced countermeasures that address the entire attack space. Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time showcases 35 years of practical engineering experience from an expert whose persuasive vision has advanced national cybersecurity policy and practices--