Teaching cybersecurity : a handbook for teaching the cybersecurity body of knowledge in a conventional classroom /: a handbook for teaching the cybersecurity body of knowledge in a conventional classroom. (2023)
- Record Type:
- Book
- Title:
- Teaching cybersecurity : a handbook for teaching the cybersecurity body of knowledge in a conventional classroom /: a handbook for teaching the cybersecurity body of knowledge in a conventional classroom. (2023)
- Main Title:
- Teaching cybersecurity : a handbook for teaching the cybersecurity body of knowledge in a conventional classroom
- Further Information:
- Note: Daniel Shoemaker, Ken Sigler, Tamara Shoemaker.
- Authors:
- Shoemaker, Dan
Sigler, Kenneth
(Cyber security expert), Shoemaker, Tamara - Contents:
- 1. Why You Should Read This Book How We Plan to Present This? But First: An Overview of the Contents of the CSEC The Beginning of the Story: Tom Is Handed a Challenge 2. Getting Down to Business: Data Security Topic One: Why Is Data Security Important? The Basic Elements of Data Security: Processing, Transmitting, and Storing Ensuring Secure Data Transmission: Secure Transmission Protocols Ensuring Secure Data Storage: Information Storage Security Making Data Indecipherable: Cryptology Cracking the Code: Cryptanalysis Forensics: The Investigative Aspect Privacy: Ensuring Personal Data 3. Software Security: Software Underlies Everything Topic One: Fundamental Principles of Software Security Thinking about Security in Design Building the Software Securely Assuring the Security of the Software Secure Deployment and Maintenance Ensuring Proper Documentation Software Security and Ethics 4. Component Security: It All Starts with Components Designing Secure Components Assuring the Architecture: Component Testing Buying Components Instead of Making Them The Mystery of Reverse Engineering 5. Connection Security The CSEC Connection Security Knowledge Areas Topic One: The Physical Components of the Network Topic Two: Physical Interfaces and Connectors Topic Three: Physical Architecture: The Tangible Part of the Network Topic Four: Building a Distributed System Topic Five: Building a Network Topic Six: The Bits and Pieces of Network Operation Top Seven: The Practical Considerations of1. Why You Should Read This Book How We Plan to Present This? But First: An Overview of the Contents of the CSEC The Beginning of the Story: Tom Is Handed a Challenge 2. Getting Down to Business: Data Security Topic One: Why Is Data Security Important? The Basic Elements of Data Security: Processing, Transmitting, and Storing Ensuring Secure Data Transmission: Secure Transmission Protocols Ensuring Secure Data Storage: Information Storage Security Making Data Indecipherable: Cryptology Cracking the Code: Cryptanalysis Forensics: The Investigative Aspect Privacy: Ensuring Personal Data 3. Software Security: Software Underlies Everything Topic One: Fundamental Principles of Software Security Thinking about Security in Design Building the Software Securely Assuring the Security of the Software Secure Deployment and Maintenance Ensuring Proper Documentation Software Security and Ethics 4. Component Security: It All Starts with Components Designing Secure Components Assuring the Architecture: Component Testing Buying Components Instead of Making Them The Mystery of Reverse Engineering 5. Connection Security The CSEC Connection Security Knowledge Areas Topic One: The Physical Components of the Network Topic Two: Physical Interfaces and Connectors Topic Three: Physical Architecture: The Tangible Part of the Network Topic Four: Building a Distributed System Topic Five: Building a Network Topic Six: The Bits and Pieces of Network Operation Top Seven: The Practical Considerations of Building a Network Top Eight: Network Defense 6. System Security: Assembling the Parts into a Useful Whole Topic One: Thinking Systematically Topic Two: Managing What You Create Topic Three: Controlling Access Topic Four: Defending Your System Topic Five: Retiring an Old System Securely Topic Six: System Testing Topic Seven: Common System Architectures 7. Human Security: Human-Centered Threats Topic One: Identity Management Topic Two: Social Engineering Topic Three: Personal Compliance Topic Four: Awareness and Understanding Topic Five: Social and Behavioral Privacy Topic Six: Personal Data Privacy and Security Topic Seven: Usable Security and Privacy 8. Organizational Security: Introduction Securing the Enterprise Topic One: Risk Management Topic Two: Security Management Topic Three: Cybersecurity Planning Topic Four: Business Continuity, Disaster Recovery, and Incident Management Topic Five: Personnel Security Topic Six: Systems Management Topic Seven: Security Program Management Topic Eight: Security Operations Management Topic Nine: Analytical Tools 9. Societal Security: Security and Society Topic One: Cybercrime Topic Two: Cyber Law Topic Three: Cyber Ethics Topic Four: Cyber Policy Topic Five: Privacy … (more)
- Edition:
- 1st
- Publisher Details:
- Boca Raton : CRC Press
- Publication Date:
- 2023
- Extent:
- 1 online resource (228 pages), illustrations (colour)
- Subjects:
- 005.8071
Computer networks -- Security measures -- Study and teaching
Internet -- Security measures -- Study and teaching - Languages:
- English
- ISBNs:
- 9781000833423
9781000833409 - Related ISBNs:
- 9781032034089
9781032034096 - Notes:
- Note: Includes bibliographical references.
Note: Description based on CIP data; resource not viewed. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.741223
- Ingest File:
- 15_023.xml