The cybersecurity body of knowledge : the ACM/IEEE/AIS/IFIP recommendations for a complete curriculum in cybersecurity /: the ACM/IEEE/AIS/IFIP recommendations for a complete curriculum in cybersecurity. (2020)
- Record Type:
- Book
- Title:
- The cybersecurity body of knowledge : the ACM/IEEE/AIS/IFIP recommendations for a complete curriculum in cybersecurity /: the ACM/IEEE/AIS/IFIP recommendations for a complete curriculum in cybersecurity. (2020)
- Main Title:
- The cybersecurity body of knowledge : the ACM/IEEE/AIS/IFIP recommendations for a complete curriculum in cybersecurity
- Further Information:
- Note: Dan Shoemaker, Anne Kohnke, Ken Sigler.
- Authors:
- Shoemaker, Dan
Kohnke, Anne
Sigler, Kenneth - Contents:
- Foreword 1 Foreword 2 Author Biographies Introduction Chapter 1 Securing Cyberspace Is Everybody’s Business Introduction: The Current Situation Is Out of Control The Challenge: How Do You Protect Something that Doesn’t Actually Exist? We Must Re-evaluate Our Assumptions The Adversary Changes Thing The Three-Legged Stool Learning to Play Better with Others Creating a Holistic Solution The Importance of Knowing What to Do Enabling Common Understanding Education Is the Key The Body of Knowledge and Educational Strategy Cybersecurity as an Academic Study The Importance of Unified Recommendations about Areas of Vital Interest Circumscribing the Field: Background and Intention of CC2005 Defining the Elements of the Discipline of Cybersecurity: CSEC2017 Knowledge Area One: Data Security Knowledge Area Two: Software Security Knowledge Area Three: Component Security Knowledge Area Four: Connection Security Knowledge Area Five: System Security Knowledge Area Six: Human Security Knowledge Area Seven: Organizational Security Knowledge Area Eight: Societal Security Real-World Utilization of the CSEC2017 Body of Knowledge CSEC2017 Framework Areas of Application Thirty Review Questions: Introduction to the CSEC Standard You Might Also Like to Read Chapter Summary Keywords References Chapter 2 The Cybersecurity Body of Knowledge 39 Bodies of Knowledge Are Essential Tools in Educational Settings Bodies of Knowledge Making Cybersecurity Teaching Real Validating Curricular Concepts ApplyingForeword 1 Foreword 2 Author Biographies Introduction Chapter 1 Securing Cyberspace Is Everybody’s Business Introduction: The Current Situation Is Out of Control The Challenge: How Do You Protect Something that Doesn’t Actually Exist? We Must Re-evaluate Our Assumptions The Adversary Changes Thing The Three-Legged Stool Learning to Play Better with Others Creating a Holistic Solution The Importance of Knowing What to Do Enabling Common Understanding Education Is the Key The Body of Knowledge and Educational Strategy Cybersecurity as an Academic Study The Importance of Unified Recommendations about Areas of Vital Interest Circumscribing the Field: Background and Intention of CC2005 Defining the Elements of the Discipline of Cybersecurity: CSEC2017 Knowledge Area One: Data Security Knowledge Area Two: Software Security Knowledge Area Three: Component Security Knowledge Area Four: Connection Security Knowledge Area Five: System Security Knowledge Area Six: Human Security Knowledge Area Seven: Organizational Security Knowledge Area Eight: Societal Security Real-World Utilization of the CSEC2017 Body of Knowledge CSEC2017 Framework Areas of Application Thirty Review Questions: Introduction to the CSEC Standard You Might Also Like to Read Chapter Summary Keywords References Chapter 2 The Cybersecurity Body of Knowledge 39 Bodies of Knowledge Are Essential Tools in Educational Settings Bodies of Knowledge Making Cybersecurity Teaching Real Validating Curricular Concepts Applying the CSEC2017 The CSEC2017 Model The CSEC2017 Organization The CSEC2017 Implementation Process Knowledge Area One: Data Security Knowledge Area Two: Software Security Knowledge Area Three: Component Security Knowledge Area Four: Connection Security Knowledge Area Five: System Security Knowledge Area Six: Human Security Knowledge Area Seven: Organizational Security Knowledge Area Eight: Societal Security Twenty Review Questions: The Cybersecurity Body of Knowledge You Might Also Like to Read Chapter Summary Keywords Chapter 3 Data Security Surviving in a Digital Era The CSEC2017 Data Security Knowledge Units Knowledge Unit One: Cryptography Knowledge Unit Two: Digital Forensics Knowledge Unit Three: Data Integrity and Authentication Knowledge Unit Four: Access Control Knowledge Unit Five: Secure Communication Protocols Knowledge Unit Six: Cryptanalysis Knowledge Unit Seven: Data Privacy Knowledge Unit Eight: Information Storage Security Chapter Review Questions You Might Also Like to Read Chapter Summary Learning Objectives for the Data Security Knowledge Area Keywords References Chapter 4 Software Security Building Pathways toward Software Security The CSEC2017 Software Security Knowledge Units Knowledge Unit One: Fundamental Principles Knowledge Unit Two: Design Knowledge Unit Three: Implementation Knowledge Unit Four: Analysis and Testing Knowledge Unit Five: Deployment and Maintenance Knowledge Unit Six: Documentation Knowledge Unit Seven: Ethics Twenty Review Questions for This Chapter You Might Also Like to Read Chapter Summary Learning Objectives for the Component Security Knowledge Area Keywords Reference Chapter 5 Component Security It All Starts with the Components The CSEC2017 Component Security Knowledge Units Knowledge Unit One: Component Design Knowledge Unit Two: Component Procurement Knowledge Unit Three: Component Testing Knowledge Unit Four: Component Reverse Engineering Forty Review Questions: Component Security You Might Also Like to Read Chapter Summary Learning Objectives for the Component Security Knowledge Area Keywords Reference Chapter 6 Connection Security Introduction: The Challenge of Connecting the Enterprise The CSEC Connection Security Knowledge Areas Knowledge Unit One: Physical Media Knowledge Unit Two: Physical Interfaces and Connectors Knowledge Unit Three: Hardware Architecture Knowledge Unit Four: Distributed Systems Architecture Knowledge Unit Five: Network Architecture Knowledge Unit Six: Network Implementations Knowledge Unit Seven: Network Services Knowledge Unit Eight: Network Defense Twenty Review Questions: Connection Security You Might Also Like to Read Chapter Summary Learning Objectives for the Connection Security Knowledge Area Keywords References Chapter 7 System Security Assembling the Parts into a Useful Whole The Key Role of Design in Systems The CSEC2017 System Security Knowledge Units Knowledge Unit One: System Thinking Knowledge Unit Two: System Management Knowledge Unit Three: System Access Knowledge Unit Four: System Control Knowledge Unit Five: System Retirement Knowledge Unit Six: System Testing Knowledge Unit Seven: Common System Architectures Seventy Review Questions: System Security 380 You Might Also Like to Read Chapter Summary Learning Objectives for the Component Security Knowledge Area Keywords References Chapter 8 Human Security Human-Centered Threats Ensuring Disciplined Practice The Challenging Case of Human Behavior The CSEC2017 Human Security Knowledge Units Knowledge Unit One: Identity Management Knowledge Unit Two: Social Engineering Knowledge Unit Three: Personal Compliance Knowledge Unit Four: Awareness and Understanding Knowledge Unit Five: Social and Behavioral Privacy Knowledge Unit Six: Personal Data Privacy and Security Knowledge Unit Seven: Usable Security and Privacy Seventy Review Questions: Human Security You Might Also Like to Read Chapter Summary Learning Objectives for the Human Security Knowledge Area Keywords References Chapter 9 Organizational Security Introduction Securing the Entire Enterprise Integrating the Elements of Cybersecurity into an Applied Solution The CSEC2017 Organizational Security Knowledge Units Knowledge Area One: Risk Management Knowledge Area Two: Security Governance and Policy Knowledge Area Three: Analytical Tools Knowledge Unit Four: Systems Administration Knowledge Area Five: Cybersecurity Planning Knowledge Unit Six: Business Continuity, Disaster Knowledge Unit Seven: Security Program Management Knowledge Unit Eight: Personnel Security Knowledge Unit Nine: Security Operations Forty Review Questions: Organizational Security You Might Also Like to Read Cha … (more)
- Edition:
- 1st
- Publisher Details:
- Boca Raton : CRC Press
- Publication Date:
- 2020
- Extent:
- 1 online resource, illustrations (black and white)
- Subjects:
- 005.80711
Computer security -- Study and teaching (Higher) - Languages:
- English
- ISBNs:
- 9781000050417
9781000050394
9781000050400
9781003022596 - Related ISBNs:
- 9780367900946
- Notes:
- Note: Includes bibliographical references and index.
Note: Description based on CIP data; resource not viewed. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.512776
- Ingest File:
- 03_093.xml