Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

Engineering Trustworthy Systems: Get Cybersecurity Design Right the First TimeEngineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
by: O. Sami Saydjari
ISBN-10: 1260118177
ISBN-13: 9781260118179
Edition 版次: 1
Publication Date 出版日期: 2018-07-26
Print Length 页数: 592
Cutting-edge cybersecurity solutions to defend against the most sophisticated attacks
This professional guide shows,step by step,how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples,objectives,and best practices and shows how to build and maintain powerful,cost-effective cybersecurity systems. Readers will learn to think strategically,identify the highest priority risks,and apply advanced countermeasures that address the entire attack space. Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time showcases 35 years of practical engineering experience from an expert whose persuasive vision has advanced national cybersecurity policy and practices.
Readers of this book will be prepared to navigate the tumultuous and uncertain future of cyberspace and move the cybersecurity discipline forward by adopting timeless engineering principles,including:
Defining the fundamental nature and full breadth of the cybersecurity problem
Adopting an essential perspective that considers attacks,failures,and attacker mindsets
Developing and implementing risk-mitigating,systems-based solutions
Transforming sound cybersecurity principles into effective architecture and evaluation strategies that holistically address the entire complex attack space
Contents
Foreword
Acknowledgments
Introduction
Part l What Do You Want?
Chapter 1 What’s the Problem?
Chapter 2 Cybersecurity Right-Think
IP Chapter 3 Value and Mission: Know Thyself
Chapter 4 Harm: Mission in Peril
Chapter 5 Approximating Reality
Part ll What Could Go Wrong?
Chapter 6 Adversaries: Know Thy Enemy
Chapter 7 Forests of Attack Trees
Part ll What Are the Building Blocks of Mitigating
Risk?
Chapter 8 Countermeasures: Security Controls
Chapter 9 Trustworthy Hardware: Bedrock
Chapter 10 Cryptography: A Sharp and Fragile Tool
Chapter 11 Authentication
Chapter 12 Authorization
Chapter 13 Detection Foundation
Chapter 14Detection Systems
Chapter 15 Detection Strategy
Chapter 16 Deterrence and Adversarial Risk
Part IV How Do You Orchestrate Cybersecurity?
Chapter 17 Cybersecurity Risk Assessment
Chapter 18 Risk Mitigation and Optimization
Chapter 19 Engineering Fundamentals
Chapter 20 Architecting Cybersecurity
IP Chapter 21 Assuring Cybersecurity: Getting It Right
Chapter 22 Cyber Situation Understanding: What’s
Going On
Chapter 23 Command and Control: What to Do
About Attacks
Part V Moving Cybersecurity Forward
Chapter 24 Strategic Policy and Investment
Chapter 25 Thoughts on the Future of Cybersecurity
Part VI Appendix and Glossary
WAppendix Resources
Glossary
Index

相关文件下载地址

打赏
未经允许不得转载:finelybook » Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

评论 抢沙发

觉得文章有用就打赏一下

您的打赏,我们将继续给力更多优质内容

支付宝扫一扫

微信扫一扫