Includes bibliographical references (pages 383-419) and index.
Contents:
Sec. I. Risk and threat assessment -- Dynamic modeling of cyber security threat problem: the black market for vulnerabilities / Jaziar Radianti, Jose J. Gonzalez-- An attack graph based approach for threat identification of an enterprise network / Somak Bhattacharya, Samresh Malhotra, S.K. Ghosh -- Insider threat prevention, detection and mitigation / Robert F. Mills, Gilbert L. Peterson, Michael R. Grimaila -- An autocorrelation methodology for the assessment of security assurance / Richard T. Gordon, Allison S. Gehrke -- Security implications for management from the onset of information terrorism / Ken Webb -- Sec. II. Organizational and human security -- The adoption of information security management standards: a literature review / Yves Barlette, Vladislav V. Fomin -- Data smog, techno creep and the hobbling of the cognitive dimension / Pater R. Marksteiner -- Balancing the public policy drivers in the tension between privacy and security / John W. Bagby -- Human factors in security: the role of information security professionals within organizations / Indira R. Guzman [and others] -- Diagnosing misfits, inducing requirements, and delineating transformations within computer network operations organizations / Nikolaos Bekatoros HN, Jack L. Koons III., Mark E. Nissen -- An approach to managing identity fraud / Rodger Jamieson [and others]. Sec. III. Emergency response planning -- A repeatable collaboration process for incident response planning / Alanah Davis, Gert-Jan de Vreede, Leah R. Pietron -- Pandemic influenza, worker absenteeism and impacts on critical infrastructures: freight transportation as an illustration / Dean A. Jones [and others] -- Information sharing: a study of information attributes and their relative significance during catastrophic events / Preeti Singh [and others] -- An overview of the community cyber security maturity model / Gregory B. White, Mark L. Huson -- Sec. IV. Security technologies -- Server hardening model development: a methodology-based approach to inreased system security / Doug White, Alan Rea -- Trusted computing: evolution and direction / Jeff Teo -- Introduction, classification and implementation of Honeypots / Miguel Jose Hernandez y Lopez, Carlos Francisco Lerma Resendez.
Summary:
"This book provides a valuable resource by addressing the most pressing issues facing cyber-security from both a national and global perspective"--Provided by publisher.
Series:
Advances in information security and privacy series
This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.