Beautiful Security
Leading Security Experts Explain how they Think
Samenvatting
In this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found unusual solutions for writing secure code, designing secure applications, addressing modern challenges such as wireless security and Internet vulnerabilities, and much more.
Among the book's wide-ranging topics, you'll learn how new and more aggressive security measures work - and where they will lead us.
Topics include:
- Rewiring the expectations and assumptions of organizations regarding security
- Security as a design requirement
- Evolution and new projects in Web of Trust
- Legal sanctions to enforce security precautions
- An encryption/hash system for protecting user data
- The criminal economy for stolen information
- Detecting attacks through context
Go beyond the headlines, hype, and hearsay. With Beautiful Security, you'll delve into the techniques, technology, ethics, and laws at the center of the biggest revolution in the history of network security. It's a useful and far-reaching discussion you can't afford to miss.
Specificaties
Inhoudsopgave
Why Security Is Beautiful
Audience for This Book
Donation
Organization of the Material
Conventions Used in This Book
Using Code Examples
Safari Books Online
How to Contact Us
1. Psychological Security Traps
-Learned Helplessness and Naïveté
-Confirmation Traps
-Functional Fixation
-Summary
2. Wireless Networking: Fertile Ground for Social Engineering
-Easy Money
-Wireless Gone Wild
-Still, Wireless Is the Future
3. Beautiful Security Metrics
-Security Metrics by Analogy: Health
-Security Metrics by Example
-Summary
4. The Underground Economy of Security Breaches
-The Makeup and Infrastructure of the Cyber Underground
-The Payoff
-How Can We Combat This Growing Underground Economy?
-Summary
5. Beautiful Trade: Rethinking E-Commerce Security
-Deconstructing Commerce
-Weak Amelioration Attempts
-E-Commerce Redone: A New Security Model
-The New Model
6. Securing Online Advertising: Rustlers and Sheriffs in the New Wild -West
-Attacks on Users
-Advertisers As Victims
-Creating Accountability in Online Advertising
7. The Evolution of PGP's Web of Trust
-PGP and OpenPGP
-Trust, Validity, and Authority
-PGP and Crypto History
-Enhancements to the Original Web of Trust Model
-Interesting Areas for Further Research
-References
8. Open Source Honeyclient: Proactive Detection of Client-Side Exploits
-Enter Honeyclients
-Introducing the World's First Open Source Honeyclient
-Second-Generation Honeyclients
-Honeyclient Operational Results
-Analysis of Exploits
-Limitations of the Current Honeyclient Implementation
-Related Work
-The Future of Honeyclients
9. Tomorrow's Security Cogs and Levers
-Cloud Computing and Web Services: The Single Machine Is Here
-Connecting People, Process, and Technology: The Potential for Business Process Management
-Social Networking: When People Start Communicating, Big Things Change
-Information Security Economics: Supercrunching and the New Rules of the Grid
-Platforms of the Long-Tail Variety: Why the Future Will Be Different for Us All
-Conclusion
-Acknowledgments
10. Security by Design
-Metrics with No Meaning
-Time to Market or Time to Quality?
-How a Disciplined System Development Lifecycle Can Help
-Conclusion: Beautiful Security Is an Attribute of Beautiful Systems
11. Forcing Firms to Focus: Is Secure Software in Your Future?
-Implicit Requirements Can Still Be Powerful
-How One Firm Came to Demand Secure Software
-Enforcing Security in Off-the-Shelf Software
-Analysis: How to Make the World's Software More Secure
12. Oh No, Here Come the Infosecurity Lawyers!
-Culture
-Balance
-Communication
-Doing the Right Thing
13. Beautiful Log Handling
-Logs in Security Laws and Standards
-Focus on Logs
-When Logs Are Invaluable
-Challenges with Logs
-Case Study: Behind a Trashed Server
-Future Logging
-Conclusions
14. Incident Detection: Finding the Other 68%
-A Common Starting Point
-Improving Detection with Context
-Improving Perspective with Host Logging
-Summary
15. Doing Real Work Without Real Data
-How Data Translucency Works
-A Real-Life Example
-Personal Data Stored As a Convenience
-Trade-offs
-Going Deeper
-References
16. Casting Spells: PC Security Theater
-Growing Attacks, Defenses in Retreat
-The Illusion Revealed
-Better Practices for Desktop Security
-Conclusion
Anderen die dit boek kochten, kochten ook
Net verschenen
Rubrieken
- aanbestedingsrecht
- aansprakelijkheids- en verzekeringsrecht
- accountancy
- algemeen juridisch
- arbeidsrecht
- bank- en effectenrecht
- bestuursrecht
- bouwrecht
- burgerlijk recht en procesrecht
- europees-internationaal recht
- fiscaal recht
- gezondheidsrecht
- insolventierecht
- intellectuele eigendom en ict-recht
- management
- mens en maatschappij
- milieu- en omgevingsrecht
- notarieel recht
- ondernemingsrecht
- pensioenrecht
- personen- en familierecht
- sociale zekerheidsrecht
- staatsrecht
- strafrecht en criminologie
- vastgoed- en huurrecht
- vreemdelingenrecht