Cyber-security and global information assurance threat analysis and response solutions /

The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community. This book provides a valuable resource for academicians and practitioners by addressing the most pressing issues facing cyber-secu...

Full description

Bibliographic Details
Corporate Author: IGI Global.
Other Authors: Knapp, Kenneth J.
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2009.
Subjects:
Online Access:View fulltext via EzAccess
LEADER 04812nam a2200613 a 4500
001 29297
003 IGIG
005 20100616114530.0
006 m e d
007 cr bn||||m|||a
008 081229s2009 paua fsb 001 0 eng d
010 # # |z 2008052439 
020 # # |a 9781605663272 (ebook) 
020 # # |z 1605663263 (hardcover) 
020 # # |z 9781605663265 (hardcover) 
020 # # |z 9781616924973 (pbk.) 
024 7 # |a 10.4018/978-1-60566-326-5  |2 doi 
035 # # |a (CaBNVSL)gtp00541068 
035 # # |a (OCoLC)430970889 
040 # # |a CaBNVSL  |c CaBNVSL  |d CaBNVSL 
050 # 4 |a QA76.9.A25  |b C918 2009e 
082 0 4 |a 005.8  |2 22 
245 0 0 |a Cyber-security and global information assurance  |b threat analysis and response solutions /  |c [edited by] Kenneth J. Knapp.  |h [electronic resource] : 
260 # # |a Hershey, Pa. :  |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),  |c c2009. 
300 # # |a electronic texts (xxii, 434 p. : ill.) :  |b digital files. 
504 # # |a Includes bibliographical references (p. 383-419) and index. 
505 0 # |a 1. Dynamic modeling of the cyber security threat problem / Jaziar Radianti, Jose Gonzalez -- 2. An attack graph based approach for threat identification of an enterprise network / Somak Bhattacharya, Samresh Malhotra, S. Ghosh -- 3. Insider threat prevention, detection and mitigation / Robert Mills, Gilbert Peterson, Michael Grimaila -- 4.An autocorrelation methodology for the assessment of security assurance / Richard Gordon, Allison Gehrke -- 5. Security implications for management from the onset of information terrorism / Ken Webb -- 6. The adoption of information security management standards / Yves Barlette, Vladislav Fomin -- 7. Data smog, techno creep and the hobbling of the cognitive dimension / Peter Marksteiner -- 8. Balancing the public policy drivers in the tension between privacy and security / John Bagby -- 9. Human factors in security / Indira Guzman, Kathryn Stam, Shaveta Hans, Carole Angolano -- 10. Diagnosing misfits, inducing requirements, and delineating transformations within computer network operations organizations / Nikolaos Bekatoros HN, Jack Koons III, Mark Nissen -- 11. An approach to managing identity fraud / Rodger Jamieson, Stephen Smith, Greg Stephens, Donald Winchester -- 12. A repeatable collaboration process for incident response planning / Alanah Davis, Gert-Jan de Vreede, Leah Pietron -- 13. Pandemic influenza, worker absenteeism and impacts on critical infrastructures / Dean Jones, Linda Nozick, Mark Turnquist, William Sawaya -- 
505 0 # |a 14.Information sharing / Preeti Singh, Pranav Singh, Insu Park, JinKyu Lee -- 15. An overview of the community cyber security maturity model / Gregory White, Mark Huson -- 16. Server hardening model development / Doug White, Alan Rea -- 17. Trusted computing / Jeff Teo -- 18. Introduction, classification and implementation of honeypots / Miguel Hernandez y Lopez, Carlos Lerma Resendez. 
506 # # |a Restricted to subscribers or individual electronic text purchasers. 
520 3 # |a The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community. This book provides a valuable resource for academicians and practitioners by addressing the most pressing issues facing cyber-security from both a national and global perspective. This reference source takes a holistic approach to cyber security and information assurance by treating both the technical as well as managerial sides of the field. 
530 # # |a Also available in print. 
538 # # |a Mode of access: World Wide Web. 
588 # # |a Title from PDF t.p. (viewed on June 5, 2010). 
650 # 0 |a Information technology  |x Security measures. 
650 # 0 |a Computer security  |x Management. 
650 # 0 |a Cyberspace  |x Security measures. 
650 # 0 |a Data protection. 
650 # 0 |a Computer networks  |x Security measures. 
653 # # |a Cyber security threat problem 
653 # # |a Global information assurance 
653 # # |a Human factors in security 
653 # # |a Information security management standards 
653 # # |a Information sharing 
653 # # |a Insider threat prevention, detection, and mitigation 
653 # # |a Managing identity fraud 
653 # # |a Onset of information terrorism 
653 # # |a Public policy drivers 
653 # # |a Security implications for management 
653 # # |a Threat identification of an enterprise network 
700 1 # |a Knapp, Kenneth J. 
710 2 # |a IGI Global. 
776 0 # |c (Original)  |w (DLC) 2008052439  |z 9781605663265  |z 1605663263 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-326-5  |z View fulltext via EzAccess