Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
by: O. Sami Saydjari
ISBN-10: 1260118177
ISBN-13: 9781260118179
Edition 版次: 1
Publication Date 出版日期: 2018-07-26
Print Length 页数: 592
Cutting-edge cybersecurity solutions to defend against the most sophisticated attacks
This professional guide shows,step by step,how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples,objectives,and best practices and shows how to build and maintain powerful,cost-effective cybersecurity systems. Readers will learn to think strategically,identify the highest priority risks,and apply advanced countermeasures that address the entire attack space. Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time showcases 35 years of practical engineering experience from an expert whose persuasive vision has advanced national cybersecurity policy and practices.
Readers of this book will be prepared to navigate the tumultuous and uncertain future of cyberspace and move the cybersecurity discipline forward by adopting timeless engineering principles,including:
Defining the fundamental nature and full breadth of the cybersecurity problem
Adopting an essential perspective that considers attacks,failures,and attacker mindsets
Developing and implementing risk-mitigating,systems-based solutions
Transforming sound cybersecurity principles into effective architecture and evaluation strategies that holistically address the entire complex attack space
Contents
Foreword
Acknowledgments
Introduction
Part l What Do You Want?
Chapter 1 What’s the Problem?
Chapter 2 Cybersecurity Right-Think
IP Chapter 3 Value and Mission: Know Thyself
Chapter 4 Harm: Mission in Peril
Chapter 5 Approximating Reality
Part ll What Could Go Wrong?
Chapter 6 Adversaries: Know Thy Enemy
Chapter 7 Forests of Attack Trees
Part ll What Are the Building Blocks of Mitigating
Risk?
Chapter 8 Countermeasures: Security Controls
Chapter 9 Trustworthy Hardware: Bedrock
Chapter 10 Cryptography: A Sharp and Fragile Tool
Chapter 11 Authentication
Chapter 12 Authorization
Chapter 13 Detection Foundation
Chapter 14Detection Systems
Chapter 15 Detection Strategy
Chapter 16 Deterrence and Adversarial Risk
Part IV How Do You Orchestrate Cybersecurity?
Chapter 17 Cybersecurity Risk Assessment
Chapter 18 Risk Mitigation and Optimization
Chapter 19 Engineering Fundamentals
Chapter 20 Architecting Cybersecurity
IP Chapter 21 Assuring Cybersecurity: Getting It Right
Chapter 22 Cyber Situation Understanding: What’s
Going On
Chapter 23 Command and Control: What to Do
About Attacks
Part V Moving Cybersecurity Forward
Chapter 24 Strategic Policy and Investment
Chapter 25 Thoughts on the Future of Cybersecurity
Part VI Appendix and Glossary
WAppendix Resources
Glossary
Index
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
未经允许不得转载:finelybook » Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
相关推荐
- Wi-Fi 7 In Depth: Your guide to mastering Wi-Fi 7, the 802.11be protocol, and their deployment
- World Design for 2D Action-Adventures: Level Design Practices
- Mathematical Theory of Fuzzy Sets
- Practical Machine Learning A Beginner's Guide with Ethical Insights
- Cloud Native Application Protection Platforms: A Guide to CNAPPs and the Foundations of Comprehensive Cloud Security
- Mastering Unity Game Development with C#: Harness the full potential of Unity 2022 game development using C#