Fundamentals of Cyber Security
US$ 19.95
The publisher has enabled DRM protection, which means that you need to use the BookFusion iOS, Android or Web app to read this eBook. This eBook cannot be used outside of the BookFusion platform.
Description
Contents
Reviews
Language
English
ISBN
9789386551559
Cover Page
Title Page
Copyright Page
Dedication
Preface
Acknowledgement
Table of Contents
Chapter-1 Introduction to Information Systems
1.1 Introduction
1.2 Modelling the Business Process
1.2.1 Business Profile, Model and Process
1.3 Information System Components
1.4 Information System Categories
1.5 Individuals in the Information System
1.6 Development of Information Systems
1.6.1 Beginning with the users
1.6.2 Determining need and Performance Expectations
1.6.2.1 System Integrity
1.6.2.2 Operating Integrity
1.6.2.3 Internal Integrity
1.6.2.4 Procedural Integrity
1.6.3 Characteristics of good Organizational IS talent
1.6.3.1 Personal Attributes
1.6.3.1.1 Knowledge of Information Systems
1.6.3.1.2 Managerial Style
1.6.3.1.3 Manager's Perception of Information needs
1.6.3.2 Organizational Environment
1.6.3.2.1 Nature of the Company
1.6.3.2.2 Level of Management
1.6.3.2.3 Structure of the organization
1.6.4 Stages in Process Design
1.6.4.1 Requirements determination
1.6.4.2 Analysis Phase
1.6.4.3 Logical Design
1.6.4.4 Physical Design
1.6.4.5 Process Design
1.6.4.6 Human Computer System design
1.6.4.7 Implementation and testing
1.6.4.8 Maintenance
1.7 Questions
Chapter-2 Information Security
2.1 Introduction
2.1.1 What is Security?
2.1.2 Why Information Security is Important?
2.2 Threats to Information systems
2.2.1 Security Threat Source
2.2.1.1 Internal threats
2.2.1.2 External Threats
2.2.2 Threat Agents
2.2.2.1 Human Threats
2.2.2.2 Environmental factors
2.2.2.3 Technological Threats
2.2.3 Threat Motivation
2.2.4 Threat Intent
2.2.4.1 Intentional Threats
2.2.4.2 Unintentional Threats
2.3 Information Assurance
2.4 Cyber Security and Security risk analysis
2.4.1 Quantitative Risk Analysis
2.4.2 Qualitative Risk Analysis
2.5 Questions
Chapter-3 Application Security
3.1 Introduction
3.1.1 Database security
3.1.2 E-mail Security
3.1.3 Internet Security
3.2 Data Security Considerations
3.2.1 Back-up Considerations
3.2.2 Archival Storage
3.2.2.1 Archival Photo Storage
3.2.3 Disposal of Data
3.2.3.1 Data Removal/Disposal Techniques
3.2.3.2 Data Removal from Live Systems
3.2.3.3 Data Removal for Media Reuse
3.2.3.4 Verification of Data Removal
3.3 Security Technology
3.3.1 Firewall
3.3.2.1 Transport Mode
3.4 Intrusion Detection
3.5 Access Control
3.5.1 Access Control models
3.5.1.1 Discretionary Access Control
3.5.1.2 Mandatory Access Control
3.5.1.3 Role Based access Control
3.6 Questions
Chapter-4 Security Threats
4.1 Introduction to Security Threats
4.1.1 Virus
4.1.2 Worms
4.1.3 Trojan Horse
4.1.4 Bombs
4.1.5 TrapDoor
4.1.6 E-mail spoofing
4.1.7 E-mail Virus
4.1.7.1 Virus Life-Cycle
4.1.7.2 How Virus Works?
4.1.8 Macro Viruses
4.1.9 Malicious Software
4.2 Network and Services Attack
4.2.1 Denial-of-Service Attack
4.2.2 Types of DOS Attacks
4.2.3 Methods of attacks
4.2.4 Examples of Attacks
4.2.4.1 SYN Flood Attack
4.2.4.2 TCP Flooding
4.2.4.3 UDP Flooding
4.2.4.4 ICMP Flooding
4.2.4.5 Smurf
4.2.4.6 Ping of death
4.2.4.7 Tear Drop
4.2.4.8 Land
4.2.4.9 Echo/Chargen
4.2.4.10 Naptha Attack
4.3 Security Threats to E-Commerce
4.3.1 Electronic Payment system
4.3.2 Credit/Debit Cards
4.3.2.1 What are Debit Cards?
4.3.2.2 What are Credit Cards?
4.3.2.3 Pros and Cons of using Debit vs Credit Cards
4.3.2.4 Types of Debit Cards
4.3.2.5 Types of Credit Cards
4.3.2.6 Credit Card payment process
4.3.3 Smart Cards
4.3.4 E-Money
4.3.5 Electronic Fund Transfer
4.3.6 E-commerce Business Model
4.3.7 E-Commerce Advantages
4.3.8 E-Commerce Disadvantages
4.3.9 E-Commerce Security Systems
4.3.9.1 Measures to ensure Security
4.3.9.2 Security Protocols in Internet
4.3.10 Electronic-Cash
4.3.10.1 How it is used?
4.3.10.2 Relevance to business and Electronic Commerce
4.3.11 Digital Signature
4.3.11.1 Digital Signature Process
4.3.12 Public Key Cryptography
4.4 Questions
Chapter-5 Development of secure Information System
5.1 Introduction
5.1.1 Why Information System Security is Important?
5.2 Developing Secure Information System
5.2.1 Information security Management System
5.3 Key Elements of an Information Security Policy
5.3.1 Elements of Information Security Policy
5.3.1.1 Purpose
5.3.1.2 Scope
5.3.1.3 Information Security Objectives
5.3.1.4 Authority and Access Control Policy
5.3.1.5 Classification of Data
5.3.1.6 security awareness sessions
5.4 Information System Development Life-Cycle
5.5 Application Security
5.5.1 The Foundation OF Security
5.5.2 Threats, Vulnerabilities and Attacks Defined
5.5.3 How do we build a Secure Web Application?
5.5.4 Secure our Network, Host and Application
5.5.5 Securing our Network
5.5.6 Network Component Categories
5.5.7 Securing our Host
5.5.8 Host Configuration Categories
5.5.9 Securing our Application
5.5.10 Security Principles
5.6 Information Security Governance and Risk Management
5.6.1 Objectives of Information Security Governance and Risk Management
5.6.2 Why Information Security is important?
5.6.3 What benefits cab be gained from a Security Governance Program?
5.6.4 Governance Models
5.6.5 Existing Problems
5.7 Risk Management
5.8 Security Architecture and Design
5.8.1 Relationships and Dependencies
5.8.2 Benefits
5.8.3 Forum
5.8.4 Drivers
5.8.4.1 Financial
5.8.4.2 Risk Management
5.8.4.3 Benchmarking and Good Practice
5.8.4.4 Legal and Regulatory
5.9 Questions
Chapter-6 Security Issues In Hardware
6.1 Introduction
6.1.1 Hardware Supply Chain Security
6.1.2 Testing for Trojan Circuits
6.1.2.1 Design for hardware Trust
6.1.2.2 Architectural Techniques
6.1.3 Hardware Support for Software Security
6.1.3.1 Memory Protection
6.1.4 Architectural Support for Control Flow Security
6.1.4.1 Architectural Support for Buffer Overflow Defense
6.1.4.2 Information Flow Tracking
6.1.5 Secure Co-processing
6.2 Data Storage and Downloadable Devices
6.2.1 Data Storage Security
6.2.2 Data Protection Act
6.2.3 Necessity of information Security
6.2.4 What needs to be Protected by Information Security Arrangements?
6.2.5 What Level of security is Required?
6.2.6 What kind of Security Measures might be Appropriate?
6.3 Physical security of IT Assets
6.3.1 Security of Assets Location
6.3.2 Human Access Control
6.3.3 Environmental Security Control
6.4 CCTV and Intrusion Detection Systems
6.4.1 Intrusion Detection System
6.4.2 Intrusion Detection System Principles
6.5 Security Measures
6.5.1 Back-up Security Measures
6.6 Questions
Chapter-7 Security Policies
7.1 Introduction
7.1.1 Computer Security Policy Categories and types
7.1.1.1 User Policies
7.1.1.2 IT Policies
7.1.1.3 General Policies
7.1.2 Policy Levels
7.2 Why do we need Security Policies?
7.2.1 Basic Purpose of Policy
7.2.2 Policy and legislative Compliance
7.2.3 Policies as Catalysts for change
7.2.4 Policies must be workable
7.3 Security Policy Development
7.4 E-mail Security Policies
7.4.1 Why study E-mail security?
7.4.2 Threats to E-mail
7.4.3 Why do we need an E-mail Policy?
7.4.4 E-mail Policy
7.5 Policy Review Process
7.5.1 An effective Review Process
7.5.2 Policy Review Objectives
7.5.3 Policy achieved?
7.5.4 Policy Review Feedback
7.5.5 Procedure Flow
7.6 Corporate Policy
7.6.1 Policy Development and Consultation Process
7.6.2 Corporate Privacy and Security Policy Examples
7.6.2.1 Personal Information
7.6.2.2 Non Disclosure Policies
7.6.2.3 Physical Security
7.6.2.4 Information Security
7.7 Sample Template of Cyber Security Policy
7.7.1 Introduction
7.7.2 What we are Protecting?
7.7.2.1 Classification of Information
7.7.2.2 Classification of Computer Systems
7.7.2.3 LAN Classifications
7.7.3 Definitions
7.7.4 Threats to Security
7.7.4.1 Employees
7.7.4.2 Amateur Hackers and Vandals
7.7.4.3 Criminal Hackers and Saboteurs
7.7.4.4 User Responsibilities
7.7.4.5 Acceptable Use
7.7.4.6 Use of internet
7.7.4.7 User Classification
7.7.4.8 Monitoring of Computer Systems
7.7.5 Access Control
7.7.5.1 User System and Network access-Normal User Identification
7.7.5.2 System Administrator Access
7.7.5.3 Special access
7.7.5.4 Connecting to third party networks
7.7.5.5 Connecting Devices to the Network
7.7.5.6 Remote Access
7.7.5.7 Unauthorized Remote Access
7.7.6 Penalty for Security Violation
7.7.7 Security Incident Handling Procedures
7.8 Questions
Chapter-8 Information Security Standards
8.1 Introduction
8.1.1 What is ISO?
8.1.2 IT Act 2000
8.1.3 Copyright
8.1.4 Patent
8.1.4.1 Governing Laws
8.1.4.2 Patent Duration
8.1.4.3 Patentable Inventions
8.1.5 Intellectual Property Rights
8.1.6 Cyber Laws in India
8.1.7 Software Licensing
8.1.7.1 Software License Types
8.1.8 Semiconductor Law and Patent Law
8.1.8.1 Why protect the topography of a semiconductor product?
8.1.8.2 Reverse Engineering allowed for Semiconductor Chips
8.1.8.3 Chip Act: A Hybrid of Laws
8.1.8.4 Chip Act Right and Exceptions
8.2 Questions
Important Questions
Previous Years University Question Papers
References
The book hasn't received reviews yet.