Cyber Attacks, Student Edition, offers a technical, architectural, and management approach to solving the problems of protecting national infrastructure. This approach includes controversial themes such as the deliberate use of deception to trap intruders. This volume thus serves as an attractive framework for a new national strategy for cyber security. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment.
In this edition, each principle is presented as a separate security strategy and illustrated with compelling examples. The book adds 50-75 pages of new material aimed specifically at enhancing the student experience and making it more attractive for instructors teaching courses such as cyber security, information security, digital security, national security, intelligence studies, technology and infrastructure protection. It now also features case studies illustrating actual implementation scenarios of the principles and requirements discussed in the text, along with a host of new pedagogical elements, including chapter outlines, chapter summaries, learning checklists, and a 2-color interior. Furthermore, a new and complete ancillary package includes test bank, lesson plans, PowerPoint slides, case study questions, and more.
This text is intended for security practitioners and military personnel as well as for students wishing to become security engineers, network operators, software designers, technology managers, application developers, etc.
- Provides case studies focusing on cyber security challenges and solutions to display how theory, research, and methods, apply to real-life challenges
- Utilizes, end-of-chapter case problems that take chapter content and relate it to real security situations and issues
- Includes instructor slides for each chapter as well as an instructor's manual with sample syllabi and test bank
Please Note: This is an On Demand product, delivery may take up to 11 working days after payment has been received.
Chapter One: Introduction
Chapter Two: Deception
Chapter Three: Separation
Chapter Four: Diversity
Chapter Five: Commonality
Chapter Six: Depth
Chapter Seven: Discretion
Chapter Eight: Collection
Chapter Nine: Correlation
Chapter Ten: Awareness
Chapter Eleven: Response
Appendix A: Case Studies
Appendix B: National Requirements
Edward Amoroso is currently Senior Vice President and Chief Security Officer of AT&T, where he has worked in cyber security for the past twenty-five years. He has also held the adjunct professor position in the computer science department at the Stevens Institute of Technology for the past twenty years. Edward has written four previous books on computer security, and his writings and commentary have appeared in major national newspapers, television shows, and books. He holds a BS degree in physics from Dickinson College, and the MS/PhD degrees in computer science from Stevens Institute of Technology. He is also a graduate of the Columbia Business School.