Cyber Attacks: Protecting National Infrastructure, STUDENT EDITION


Product Description
This textbook offers a technical, architectural, and management approach to solving the problems of protecting national infrastructure and includes practical and empirically-based guidance for students wishing to become security engineers, network operators, software designers, technology managers, application developers, Chief Security Officers, etc.. This approach includes controversial themes such as the deliberate use of deception to trap intruders. In short, it serves as an attractive framework for a new national strategy for cyber security. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows students to understand how any organization, such as a government agency, integrates the principles into their local environment. The STUDENT EDITION features several case studies illustrating actual implementation scenarios of the principals and requirements discussed in the text. It also includes helpful pedagogical elements such as chapter outlines, chapter summaries, learning checklists, and a 2-color interior. And it boasts a new and complete instructor ancillary package including test bank, IM, Ppt slides, case study questions, and more.
� � Provides case studies focusing on cyber security challenges and solutions to display how theory, research, and methods, apply to real-life challenges
• Utilizes, end-of-chapter case problems that take chapter content and relate it to real security situations and issues
• Includes instructor slides for each chapter as well as an instructor� s manual with sample syllabi and test bank
</p>Cyber Attacks: Protecting National Infrastructure, STUDENT EDITION Review
In Cyber Attacks Protecting National Infrastructure, Edward Amoroso lays out the foundation on how to secure this monstrosity called national infrastructure, often referred to as critical infrastructure.The US has had a critical infrastructure protection program in place since 1996. In 2001, the Patriot Act defined critical infrastructure as those "systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters".
The critical infrastructures and responsible agencies in the US are:
1. Agriculture and food - Departments of Agriculture and Health and Human Services
2. Water - Environmental Protection Agency
3. Public Health - Department of Health and Human Services
4. Emergency Services - Department of Homeland Security
5. Government - Department of Homeland Security
6. Defense Industrial Base - Department of Defense
7. Information and Telecommunications - Department of Commerce
8. Energy - Department of Energy
9. Transportation and Shipping - Department of Transportation
10. Banking and Finance - Department of the Treasury
11. Chemical Industry and Hazardous Materials - Department of Homeland Security
12. Post - Department of Homeland Security
13. National Monuments and icons - Department of the Interior
14. Critical Manufacturing - Department of Homeland Security
As CSO at AT&T, Amoroso brings significant experience to every chapter in this excellent resource.
In 11 densely-packed but very readable chapters, provides a comprehensive overview on how to secure the national infrastructure. While the title states national infrastructure; the entire book is completely relevant for any organization that has information assets they need to secure.
The book provides a good mix of both high-level overviews, suitable for management; and highly technical details, suitable for security architects.
Chapter 1 is titled introduction, but by page 7, the author is already detailing the nature of the threats of botnets. The chapter provides a detailed list of the five entities that comprise a botnet attack.
The chapter and the rest of the book also make excellent use of graphics and illustration.
Each chapter also includes review questions, exercises and hands-on projects to review and internalize the topics discussed.
Cyber Attacks Protecting National Infrastructure is a very readable and engaging book on one of the most important topics the US is currently facing.
While Amoroso lays out the technical issues, he also notes that the only way to remediate them is via a commitment to infrastructure protection; based on a top-down approach from management. If management is supportive of information security, and understands its significant, the security teams ability to secure the infrastructure will be inordinately easier.
For those looking for a reference that provides both the breadth and depth on the topic, Cyber Attacks Protecting National Infrastructure is an invaluable resource written by one of the smartest minds in the industry.
Most of the consumer Reviews tell that the "Cyber Attacks: Protecting National Infrastructure, STUDENT EDITION" are high quality item. You can read each testimony from consumers to find out cons and pros from Cyber Attacks: Protecting National Infrastructure, STUDENT EDITION ...

No comments:
Post a Comment