Cyber-security and global information assurance threat analysis and response solutions /

The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community. This book provides a valuable resource for academicians and practitioners by addressing the most pressing issues facing cyber-secu...

Full description

Bibliographic Details
Corporate Author: IGI Global.
Other Authors: Knapp, Kenneth J.
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2009.
Subjects:
Online Access:View fulltext via EzAccess
Table of Contents:
  • 1. Dynamic modeling of the cyber security threat problem / Jaziar Radianti, Jose Gonzalez
  • 2. An attack graph based approach for threat identification of an enterprise network / Somak Bhattacharya, Samresh Malhotra, S. Ghosh
  • 3. Insider threat prevention, detection and mitigation / Robert Mills, Gilbert Peterson, Michael Grimaila
  • 4.An autocorrelation methodology for the assessment of security assurance / Richard Gordon, Allison Gehrke
  • 5. Security implications for management from the onset of information terrorism / Ken Webb
  • 6. The adoption of information security management standards / Yves Barlette, Vladislav Fomin
  • 7. Data smog, techno creep and the hobbling of the cognitive dimension / Peter Marksteiner
  • 8. Balancing the public policy drivers in the tension between privacy and security / John Bagby
  • 9. Human factors in security / Indira Guzman, Kathryn Stam, Shaveta Hans, Carole Angolano
  • 10. Diagnosing misfits, inducing requirements, and delineating transformations within computer network operations organizations / Nikolaos Bekatoros HN, Jack Koons III, Mark Nissen
  • 11. An approach to managing identity fraud / Rodger Jamieson, Stephen Smith, Greg Stephens, Donald Winchester
  • 12. A repeatable collaboration process for incident response planning / Alanah Davis, Gert-Jan de Vreede, Leah Pietron
  • 13. Pandemic influenza, worker absenteeism and impacts on critical infrastructures / Dean Jones, Linda Nozick, Mark Turnquist, William Sawaya
  • 14.Information sharing / Preeti Singh, Pranav Singh, Insu Park, JinKyu Lee
  • 15. An overview of the community cyber security maturity model / Gregory White, Mark Huson
  • 16. Server hardening model development / Doug White, Alan Rea
  • 17. Trusted computing / Jeff Teo
  • 18. Introduction, classification and implementation of honeypots / Miguel Hernandez y Lopez, Carlos Lerma Resendez.