Cyber-security and global information assurance threat analysis and response solutions /
The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community. This book provides a valuable resource for academicians and practitioners by addressing the most pressing issues facing cyber-secu...
Corporate Author: | |
---|---|
Other Authors: | |
Format: | Electronic |
Language: | English |
Published: |
Hershey, Pa. :
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
c2009.
|
Subjects: | |
Online Access: | View fulltext via EzAccess |
Table of Contents:
- 1. Dynamic modeling of the cyber security threat problem / Jaziar Radianti, Jose Gonzalez
- 2. An attack graph based approach for threat identification of an enterprise network / Somak Bhattacharya, Samresh Malhotra, S. Ghosh
- 3. Insider threat prevention, detection and mitigation / Robert Mills, Gilbert Peterson, Michael Grimaila
- 4.An autocorrelation methodology for the assessment of security assurance / Richard Gordon, Allison Gehrke
- 5. Security implications for management from the onset of information terrorism / Ken Webb
- 6. The adoption of information security management standards / Yves Barlette, Vladislav Fomin
- 7. Data smog, techno creep and the hobbling of the cognitive dimension / Peter Marksteiner
- 8. Balancing the public policy drivers in the tension between privacy and security / John Bagby
- 9. Human factors in security / Indira Guzman, Kathryn Stam, Shaveta Hans, Carole Angolano
- 10. Diagnosing misfits, inducing requirements, and delineating transformations within computer network operations organizations / Nikolaos Bekatoros HN, Jack Koons III, Mark Nissen
- 11. An approach to managing identity fraud / Rodger Jamieson, Stephen Smith, Greg Stephens, Donald Winchester
- 12. A repeatable collaboration process for incident response planning / Alanah Davis, Gert-Jan de Vreede, Leah Pietron
- 13. Pandemic influenza, worker absenteeism and impacts on critical infrastructures / Dean Jones, Linda Nozick, Mark Turnquist, William Sawaya
- 14.Information sharing / Preeti Singh, Pranav Singh, Insu Park, JinKyu Lee
- 15. An overview of the community cyber security maturity model / Gregory White, Mark Huson
- 16. Server hardening model development / Doug White, Alan Rea
- 17. Trusted computing / Jeff Teo
- 18. Introduction, classification and implementation of honeypots / Miguel Hernandez y Lopez, Carlos Lerma Resendez.