Nowadays, cyber security is widely viewed as a matter of pressing national importance. Many elements of cyberspace are notoriously vulnerable to an expanding range of attacks by a spectrum of hackers, criminals, terrorists, and state actors. For example, government agencies and private-sector companies both large and small suffer from cyber thefts of sensitive information, cyber vandalism (e.g., defacing of Web sites), and denial-of-service attacks. The nation's critical infrastructure, including the electric power grid, air traffic control system, financial systems, and communication networks, depends extensively on information technology for its operation. National policy makers have become increasingly concerned that adversaries backed by considerable resources will attempt to exploit the cyber vulnerabilities in the critical infrastructure, thereby inflicting substantial harm on the nation. Numerous policy proposals have been advanced, and a number of bills have been introduced in Congress to tackle parts of the cyber security challenge. This book is designed to serve as the textbook for a semester course devoted to cyber security. It is focused on helping students acquired the skills sought in the professional workforce.
Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction. As the IT field is grooming continuously day by day, the dependency on them increases manifold. Computer systems now include a wide variety of smart devices such as smartphones, televisions, and other portable devices which are part of the Internet of Things (IoT), etc. Cyber security covers technologies, processes, and practices that are designed to protect computers, networks, programs, and data from damage, attack, or unauthorized access. A security model is described by three elements (availability, integrity, and confidentiality). Privacy infringement and security vulnerability can happen due to internal users or malicious attackers.
A firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality or result in data corruption or DoS. It may be a hardware device or a software program running on a secure host computer. In either case, it must have at least two network interfaces, one for the network it is intended to protect, and one for the network it is exposed to. A firewall sits at the junction point or gateway between the two networks, usually a private network and a public network such as the Internet. The earliest firewalls were simply routers. The term firewall comes from the fact that by segmenting a network into different physical sub networks, they limited the damage that could spread from one subnet to another just like fire doors or firewalls.
Contents: Chapter 1 Introduction to Cybercrime Chapter 2 System Vulnerabilities Chapter 3 Network Security Chapter 4 Cyber Forensics Chapter 5 IR - Incident Response Chapter 6 Online Safety and Precautions Practical Approach Index
Security Risk Models for Cyber Insurance Название: Security Risk Models for Cyber Insurance Автор: David Rios Insua, Caroline Baylon, Jose Vila Издательство: Chapman and Hall/CRC Press Год:...