The Digital Big Bang the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity

This important book: -Guides readers on both fundamental tactics and advanced strategies -Features observations, hypotheses, and conclusions on a wide range of cybersecurity issues -Helps readers work with the central elements of cybersecurity, rather than fight or ignore them -Includes content by c...

Full description

Bibliographic Details
Main Author: Quade, Phil
Format: eBook
Language:English
Published: Indianapolis, IN Wiley 2019
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Table of Contents:
  • Fill the Skills Gap with an Environment of Continual TrainingEmployee Training Is Key for Cybersecurity; Training Is a Mindset; Section 3 Fundamental Strategies: Proven Strategies that Don't Let us Down; Chapter 6 Cryptography; Cryptography: The Backbone of Cybersecurity; Cryptography: The Good, the Bad, and the Future; Chapter 7 Access Control; Managing Access in Challenging Environments; A Systematic Approach to Access Control; Chapter 8 Segmentation; Successful Segmentation Isn't Separation: It's Collaboration; Why We Need to Segment Networks
  • Section 5 Higher-Order Dimensions: Where Human Factors Can Eclipse Computing WizardryChapter 12 Complexity Management; Shift Your Mindset to Manage Complexity; Seven Steps to Reducing Complexity; Chapter 13 Privacy; Don't Panic! Security Pros Must Learn to Embrace the New Era of Privacy; Stricter Privacy Regulations Are Driving the Conversations-and Innovations-We Need; Chapter 14 Human Frailty; Overcoming Human Frailty: People and the Power of Obligation; Overcoming Human Frailty by Design; The Future; Unifying Forces; Relationships; Informed Optimism; Pursuit of Facts and Wisdom
  • Section 4 Advanced Strategies: Sophisticated Cybersecurity OperationsChapter 9 Visibility; Visibility: Identifying Pathogens, Risk Factors, and Symptoms of Cyberattacks; 20/20 Insight: Redefining Visibility to Stop Modern Cybercrime Syndicates; The Challenge of Visibility; Chapter 10 Inspection; In and Out of the Shadows: The Visibility That Inspection Enables Is Not Confined to Technology Alone; The Fundamental Importance of Inspection; Chapter 11 Failure Recovery; Preparation, Response, and Recovery; Cyber Event Recovery
  • Is Speed an Advantage? It Depends on the ContextChapter 2 Connectivity; Managing the Intensifying Connectivity of the IoT Era; Cyberspace: Making Some Sense of It All; Section 2 Elementary Shortfalls :The Things we didn't get Right at the Beginning; Chapter 3 Authentication; Authentication, Data Integrity, Nonrepudiation, Availability, and Confidentiality: The Five Pillars of Security; Authentication and Models of Trust; Chapter 4 Patching; Patching: A Growing Challenge and a Needed Discipline; Conquer or Be Conquered; Chapter 5 Training
  • Cover; Title Page; Copyright; About the Author; Contributors; Acknowledgments; Content; Introduction; The Cosmic Big Bang: The Birth of the Physical Universe and the Human Society That Emerged; The Digital Big Bang: The Birth of the Digital Universe; The Scientific Revolution; The Bang Begins; What We Got Right; What We Got Wrong; An Unwarranted Assumption of Trust; An Honest Assessment of the Current State; What Cybercrimes Exploit; What We Can Get Right Now; The Digital Nucleus; Section 1 Binding Strategies: The Core of Cybersecurity; Chapter 1 Speed; Speed: The Nucleus of the Cyberfrontier