Skip to:Content
|
Bottom
Cover image for Introduction to information security : a strategic-based approach
Title:
Introduction to information security : a strategic-based approach
Personal Author:
Publication Information:
New York : Syngress , 2014
Physical Description:
xxi, 360 p. : ill. ; 24 cm.
ISBN:
9781597499699
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010345568 TK5102.85 S55 2014 Open Access Book Book
Searching...
Searching...
30000010285196 TK5102.85 S55 2014 Open Access Book Book
Searching...

On Order

Summary

Summary

Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information. This understanding provides a basis for engineering and risk-management decisions in the defense of information.

Information security is a rapidly growing field, with a projected need for thousands of professionals within the next decade in the government sector alone. It is also a field that has changed in the last decade from a largely theory-based discipline to an experience-based discipline. This shift in the field has left several of the classic texts with a strongly dated feel.


Author Notes

Dr. Timothy J. Shimeall is a senior member of the technical staff with the CERT Division of the Software Engineering Institute, and an Adjunct Professor at the Heinz College, both of Carnegie Mellon University.
Jonathan M. Spring is a member of the technical staff with the CERT Network Situational Awareness Group of the Software Engineering Institute, Carnegie Mellon University, and an Adjunct Professor at the University of Pittsburgh.


Reviews 1

Choice Review

This work can best serve as a supplemental general resource to accompany a more-technical work on information security (IS). Shimeall and Spring (both, Carnegie Mellon Univ.) provide much relevant content, but their conversational writing style is not conducive to using the work as the sole textbook in an IS course. The authors' central purpose of focusing on strategy is readily apparent, and students will gain insight from this approach. The book contains 16 chapters and four parts: "Deception," "Frustration," "Resistance," and "Recognition/Recovery." This organization and the ideas presented are arranged logically to support IS fundamentals, with concepts usually clearly linked to each other. For the most part, students will be able to follow the authors' line of reasoning; overall, the text is well written and engaging. Discussions will keep students' attention, but there are some dry spots. Further, the end-of-chapter review questions and exercises are not particularly stimulating and will not necessarily help students apply knowledge gained from previous chapters to chapters that follow. The authors state in the introduction that the exercises are focused on understanding concepts, but including some practical hands-on exercises would have been useful. A glossary of terms would also have been helpful. Summing Up: Recommended. Lower-division undergraduates, two-year technical program students, faculty. C. W. Brown University of Baltimore


Table of Contents

Acknowledgmentsp. xiii
Introductionp. xvii
Chapter 1 Motivation and Security Definitionsp. 1
Introductionp. 1
Information Security and its Motivationp. 1
Terminology: Vulnerabilities of Software, Exploits, Malware, Intrusions, and Controlsp. 6
Security Risk Managementp. 11
How to use this Bookp. 15
By Security Strategyp. 15
By Security Technologyp. 16
Summaryp. 16
Referencesp. 17
Chapter 2 Strategies and Securityp. 21
Introductionp. 21
Security Strategiesp. 22
Attack Strategiesp. 22
Defense Strategiesp. 28
Deceptionp. 29
Frustrationp. 31
Resistancep. 32
Recognition and Recoveryp. 33
Security Controlsp. 35
Summaryp. 37
Referencesp. 37
Part 1 Deception
Chapter 3 Deception Strategies: Networks, Organization, and Structuresp. 43
Introductionp. 43
How the Internet Worksp. 44
Deception and Network Organizationp. 48
Outsourcingp. 51
Application Hostingp. 53
Dynamic Addressingp. 56
Summaryp. 57
Referencesp. 50
Chapter 4 Deception Strategies: Defensive Technologiesp. 61
Introductionp. 61
Internet Protocolsp. 61
Proxies and Gatewaysp. 64
Honeypots and Honeynetsp. 69
Tarpitsp. 73
Virtual Hostsp. 75
Summaryp. 77
Referencesp. 77
Part 2 Frustration
Chapter 5 Frustration Strategies: Technical Controlsp. 83
Introductionp. 83
Minimization Goals and Objectivesp. 84
Asymmetry in Information Securityp. 84
Host Hardeningp. 86
Disabling Servicesp. 86
Importance of Disabling Servicesp. 87
Local Intrusion Detectionp. 88
Service Wrappersp. 89
Application Managementp. 90
Network Devices and Minimizationp. 91
Routers and Access Control Listsp. 92
Firewallsp. 94
Proxiesp. 95
Network Architecture and Frustrationp. 100
Summaryp. 102
Referencesp. 103
Chapter 6 Frustration Strategies: Formal Verificationp. 107
Introductionp. 107
Formal Models and Model Verificationp. 108
Discretionary Modelsp. 110
Confidentiality Modelsp. 113
Integrity Modelsp. 116
Limits of Formal Modelsp. 117
Summaryp. 118
Referencesp. 118
Part 3 Resistance
Chapter 7 Resistance Strategies: Authentication and Permissionsp. 125
Introductionp. 125
Authentication and Permission Goals and Objectivesp. 126
Authentication Methodsp. 126
Passwordsp. 127
A Brief Note on Cryptologyp. 131
Security Tokensp. 132
Biometricsp. 136
Authentication Systemsp. 138
Permissions and Access Controlp. 140
Agent-based Permissionsp. 141
Role-based Access Controlp. 143
Attacksp. 144
Social Engineering and Phishingp. 145
Password Crackingp. 148
Summaryp. 150
Referencesp. 161
Chapter 8 Resistance Strategies: Symmetric Encryptionp. 155
Introductionp. 155
Encryption Conceptsp. 156
Utility and Failingsp. 158
Symmetric Encryptionp. 159
Historic Ciphersp. 159
Modern Ciphersp. 165
File and Disk Encryptionp. 173
Asymmetric Encryptionp. 175
Key Management and Distributionp. 177
Computer Identificationp. 179
Digital Certificatesp. 180
Transport Layer Securityp. 182
Steganographyp. 182
Summaryp. 184
Referencesp. 184
Chapter 9 Resistance Strategies: Partitioning and Need to Knowp. 187
Introductionp. 187
Outsider and Insider Threatp. 188
Internal Security Partitionsp. 190
Need to Knowp. 192
Policy Managementp. 194
Summaryp. 197
Referencesp. 197
Chapter 10 Change Managementp. 201
Introductionp. 201
Change Management Versus Configuration Managementp. 203
Why Use Change and Configuration Management Systemsp. 204
Change Management Processp. 207
Phase 1 Request for Change is Submitted to a Change Managerp. 210
Phase 2 Change Manager Assesses the RFCp. 210
Phase 3 Change Request is Forwarded to an IT Executive Committee for Approvalp. 211
Phase 4 Change Request is Passed to the Change Advisory Committee for Schedulingp. 211
Phase 5 Change Request is Passed to the Change Implementersp. 211
Phase 6 Change Process Evaluationp. 212
Minor or Insignificant Change Processp. 212
Automation of the Change Processp. 214
Change Management and Security-Related Issuesp. 214
Change Management and Software Control issuesp. 214
Change Management Documentationp. 215
Patch Managementp. 216
Security and Patch Information Knowledgep. 218
Establishing Patch Priorities and Schedulingp. 218
Patch Testingp. 218
Patch Installation and Deploymentp. 219
Patch Auditsp. 219
Configuration Management Systemp. 219
Configuration Management Examplep. 222
Software Configuration Managementp. 223
Configuration Management and Information Assurancep. 224
Configuration Management and System Maintenancep. 225
Automation of Configuration Managementp. 225
Network Configuration Management Systemp. 227
Configuration Management Databasep. 228
Certificationp. 229
Summaryp. 229
Referencesp. 230
Part 4 Recognition/Recovery
Chapter 11 Network Analysis and Forensicsp. 235
Introductionp. 235
Introduction to the OSI Modelp. 236
Analysis for Managersp. 239
Flow-Level Analysisp. 240
Metadata Analysisp. 242
Application-Level Analysisp. 243
Signature Analysisp. 245
Full-Packet Capturep. 246
Network Forensicsp. 247
Sensor Network Architecturep. 249
Summaryp. 249
Referencesp. 250
Chapter 12 Recognition Strategies: Intrusion Detection and Preventionp. 253
Introductionp. 253
Why Intrusion Detectionp. 265
Network Intrusion Detection Pitfallsp. 256
Fragmentation and IP Validationp. 257
Application Reassemblyp. 259
Out-of-Band Problemsp. 259
Centrality Problemsp. 260
Base-rate Fallacyp. 261
Modes of Intrusion Detectionp. 264
Network Intrusion Detection: Signaturesp. 264
Network Intrusion Detection: Anomaly Basedp. 267
Network Behavior Analyzersp. 267
Wireless IDPSp. 268
Network Intrusion Prevention Systemsp. 269
Summaryp. 271
Referencesp. 271
Chapter 13 Digital Forensicsp. 275
Introductionp. 275
Uses of Digital Forensicsp. 275
Forensic Fundamentalsp. 276
General Forensic Principlesp. 276
Digital Forensic Processp. 280
Hashingp. 281
Types of Hashing Algorithmsp. 281
Uses of Hashingp. 281
Technologyp. 282
Characteristics of Digital Evidencep. 283
Inside the Host Machinep. 285
Solid-State Drivesp. 287
Volatile versus Nonvolatile Memoryp. 288
File Systemsp. 289
How Magnetic Hard Drives Store Datap. 290
Onsite Collectionsp. 293
Documenting the Incidentp. 294
Photographyp. 295
Notesp. 295
Marking Evidencep. 295
Purpose of Cloningp. 296
Cloning Processp. 296
Live System versus Dead Systemp. 297
Conducting and Documenting a Live Collectionp. 299
Final Reportp. 300
Organizational Preparednessp. 301
Summaryp. 301
Referencesp. 301
Chapter 14 Recognition Strategies: Integrity Detectionp. 303
Introductionp. 303
Checksumsp. 304
Parity Bitsp. 304
Repetition Codesp. 305
Hamming Codesp. 306
Cryptographic Integrity Detectionp. 307
Digital Signaturesp. 307
Rule-Based Integrity Checkingp. 311
Entity Integrityp. 311
Referential Integrityp. 312
Domain Integrityp. 312
Content Comparisonsp. 312
An Example: GPSp. 314
Summaryp. 315
Referencesp. 315
Chapter 15 Recovery of Securityp. 317
Introductionp. 317
Emergency Managementp. 318
Recovery Prioritiesp. 319
Building a Response Policyp. 321
Recovery from Accidents: Continuity of Operationsp. 323
Recovery from Malicious Eventsp. 324
Incident Handlingp. 326
CSIRTsp. 327
Incidentsp. 329
Incorporating Lessons Learnedp. 332
Summaryp. 334
Referencesp. 334
Chapter 16 Professional Certifications and Overall Conclusionsp. 339
Introductionp. 339
Professional Certificationsp. 339
Certified Information Systems Security Professionalp. 340
Global Information Assurance Certificationsp. 341
CERT Computer Security Incident Handlerp. 342
Certified Ethical Hackingp. 342
Vendor-specific Certificationsp. 342
Other Certificationsp. 343
Critiques of Certificationp. 344
Tying the Pieces Togetherp. 346
Where to Go from Herep. 348
Referencesp. 350
Indexp. 353
Go to:Top of Page