Effective Cybersecurity
Autor William Stallingsen Limba Engleză Paperback – 31 aug 2018
Observăm că Effective Cybersecurity reprezintă o actualizare necesară în peisajul literaturii tehnice, trecând dincolo de simpla enumerare a riscurilor pentru a oferi un plan de acțiune unificat. Față de edițiile sau lucrările anterioare axate strict pe protocoale, această lucrare integrează noile cerințe de conformitate GDPR și securitatea mediilor virtualizate și de cloud, elemente esențiale în infrastructurile moderne. Remarcăm efortul autorului William Stallings de a mapa standardul ISF (Information Security Forum) pe cadrele ISO 27000 și NIST, oferind o viziune coerentă asupra guvernantei securității.
Abordarea diferă de Developing Cybersecurity Programs and Policies de Omar Santos prin nivelul de detaliu tehnic aplicat implementării; în timp ce Santos se concentrează pe crearea politicilor, Stallings intră în profunzimea execuției tehnice („the how”). Apreciem structura riguroasă a celor 800 de pagini, organizate progresiv de la planificarea strategică și guvernantă, până la securizarea specifică a rețelelor, comunicațiilor VoIP și a sistemelor de stocare. Fiecare capitol este conceput ca o unitate de lucru, conținând liste de cuvinte cheie, întrebări de revizuire și, inovator, coduri QR care fac legătura directă cu resursele web și documentele de standardizare relevante.
În contextul operei sale, Effective Cybersecurity servește drept punte practică pentru conceptele teoretice dezvoltate în Cryptography and Network Security: Principles and Practice, Global Edition. Dacă lucrarea menționată anterior analizează algoritmii și principiile, volumul de față le ancorează în realitatea operațională și managerială a unei organizații. Este, în esență, un manual de implementare care transformă standardele abstracte în proceduri de securitate hardenizate pentru întregul ciclu de viață al dezvoltării sistemelor (SDLC).
Preț: 344.19 lei
Preț vechi: 430.24 lei
-20%
Carte tipărită la comandă
Livrare economică 27 mai-10 iunie
Specificații
ISBN-10: 0134772806
Pagini: 800
Dimensiuni: 178 x 232 x 43 mm
Greutate: 1.35 kg
Editura: Pearson Education
De ce să citești această carte
Recomandăm această carte profesioniștilor IT care au nevoie de un fundament solid în implementarea standardelor de securitate. Cititorul câștigă o metodologie clară pentru auditarea și securizarea sistemelor, beneficiind de expertiza lui William Stallings în transformarea reglementărilor complexe (ISO, NIST, PCI DSS) în pași de execuție concreți. Este un instrument indispensabil pentru alinierea securității tehnice cu obiectivele de business și conformitatea legală.
Despre autor
William Stallings este o figură centrală în literatura tehnică de specialitate, având o carieră de peste 20 de ani ca manager tehnic și consultant pentru agenții guvernamentale și producători de top. A publicat 17 titluri fundamentale, ajungând la un total de 41 de ediții revizuite, acoperind arhitectura calculatoarelor și rețelele de date. Expertiza sa este recunoscută prin numeroase premii pentru manuale de informatică, fiind apreciat pentru capacitatea de a sintetiza evoluțiile tehnologice rapide în structuri educaționale coerente și aplicabile în mediul profesional.
Descriere scurtă
In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity. Stallings makes extensive use of standards and best practices documents that are often used to guide or mandate cybersecurity implementation. Going beyond these, he offers in-depth tutorials on the "how" of implementation, integrated into a unified framework and realistic plan of action.
Each chapter contains a clear technical overview, as well as a detailed discussion of action items and appropriate policies. Stallings offers many pedagogical features designed to help readers master the material: clear learning objectives, keyword lists, review questions, and QR codes linking to relevant standards documents and web resources.
Effective Cybersecurity aligns with the comprehensive Information Security Forum document "The Standard of Good Practice for Information Security," extending ISF's work with extensive insights from ISO, NIST, COBIT, other official standards and guidelines, and modern professional, academic, and industry literature. - Understand the cybersecurity discipline and the role of standards and best practices
- Define security governance, assess risks, and manage strategy and tactics
- Safeguard information and privacy, and ensure GDPR compliance
- Harden systems across the system development life cycle (SDLC)
- Protect servers, virtualized systems, and storage
- Secure networks and electronic communications, from email to VoIP
- Apply the most appropriate methods for user authentication
- Mitigate security risks in supply chains and cloud environments This knowledge is indispensable to every cybersecurity professional. Stallings presents it systematically and coherently, making it practical and actionable.
Notă biografică
In more than 30 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. He has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. Currently, he is an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions.
He created and maintains the Computer Science Student Resource Site at ComputerScienceStudent.com/. This site provides documents and links on a variety of subjects of general interest to computer science students (and professionals). He is a member of the editorial board of Cryptologia, a scholarly journal devoted to all aspects of cryptology.
Dr. Stallings holds a Ph.D. from M.I.T. in Computer Science and a B.S. from Notre Dame in Electrical Engineering.
Cuprins
14.1 Security Architecture 483 14.2 Malware Protection Activities 487 Types of Malware 487 The Nature of the Malware Threat 490 Practical Malware Protection 490 14.3 Malware Protection Software 494 Capabilities of Malware Protection Software 494 Managing Malware Protection Software 495 14.4 Identity and Access Management 496 IAM Architecture 497 Federated Identity Management 498 IAM Planning 500 IAM Best Practices 501 14.5 Intrusion Detection 502 Basic Principles 503 Approaches to Intrusion Detection 504 Host-Based Intrusion Detection Techniques 505 Network-Based Intrusion Detection Systems 506 IDS Best Practices 508 14.6 Data Loss Prevention 509 Data Classification and Identification 509 Data States 510 14.7 Digital Rights Management 512 DRM Structure and Components 513 DRM Best Practices 515 14.8 Cryptographic Solutions 517 Uses of Cryptography 517 Cryptographic Algorithms 518 Selection of Cryptographic Algorithms and Lengths 525 Cryptography Implementation Considerations 526 14.9 Cryptographic Key Management 528 Key Types 530 Cryptoperiod 532 Key Life Cycle 534 14.10 Public Key Infrastructure 536 Public Key Certificates 536 PKI Architecture 538 Management Issues 540 14.11 Technical Security Management Best Practices 541 14.12 Key Terms and Review Questions 543 Key Terms 543 Review Questions 543 14.13 References 544 Chapter 15: Threat and Incident Management 546 15.1 Technical Vulnerability Management 547 Plan Vulnerability Management 547 Discover Known Vulnerabilities 548 Scan for Vulnerabilities 549 Log and Report 551 Remediate Vulnerabilities 551 15.2 Security Event Logging 554 Security Event Logging Objective 556 Potential Security Log Sources 556 What to Log 557 Protection of Log Data 557 Log Management Policy 558 15.3 Security Event Management 559 SEM Functions 560 SEM Best Practices 561 15.4 Threat Intelligence 563 Threat Taxonomy 564 The Importance of Threat Intelligence 566 Gathering Threat Intelligence 568 Threat Analysis 569 15.5 Cyber Attack Protection 570 Cyber Attack Kill Chain 570 Protection and Response Measures 573 Non-Malware Attacks 576 15.6 Security Incident Management Framework 577 Objectives of Incident Management 579 Relationship to Information Security Management System 579 Incident Management Policy 580 Roles and Responsibilities 581 Incident Management Information 583 Incident Management Tools 583 15.7 Security Incident Management Process 584 Preparing for Incident Response 585 Detection and Analysis 586 Containment, Eradication, and Recovery 587 Post-Incident Activity 588 15.8 Emergency Fixes 590 15.9 Forensic Investigations 592 Prepare 593 Identify 594 Collect 594 Preserve 595 Analyze 595 Report 596 15.10 Threat and Incident Management Best Practices 597 15.11 Key Terms and Review Questions 598 Key Terms 598 Review Questions 599 15.12 References 599 Chapter 16: Local Environment Management 602 16.1 Local Environment Security 602 Local Environment Profile 603 Local Security Coordination 604 16.2 Physical Security 606 Physical Security Threats 606 Physical Security Officer 609 Defense in Depth 610 Physical Security: Prevention and Mitigation Measures 612 Physical Security Controls 615 16.3 Local Environment Management Best Practices 619 16.4 Key Terms and Review Questions 620 Key Terms 620 Review Questions 620 16.5 References 621 Chapter 17: Business Continuity 622 17.1 Business Continuity Concepts 625 Threats 626 Business Continuity in Operation 628 Business Continuity Objectives 629 Essential Components for Maintaining Business Continuity 630 17.2 Business Continuity Program 630 Governance 631 Business Impact Analysis 631 Risk Assessment 632 Business Continuity Strategy 634 17.3 Business Continuity Readiness 637 Awareness 637 Training 638 Resilience 639 Control Selection 640 Business Continuity Plan 642 Exercising and Testing 647 Performance Evaluation 650 17.4 Business Continuity Operations 655 Emergency Response 655 Crisis Management 656 Business Recovery/Restoration 657 17.5 Business Continuity Best Practices 660 17.6 Key Terms and Review Questions 661 Key Terms 661 Review Questions 661 17.7 References 662 PART III: SECURITY ASSESSMENT 665 Chapter 18: Security Monitoring and Improvement 666 18.1 Security Audit 666 Security Audit and Alarms Model 667 Data to Collect for Auditing 668 Internal and External Audit 672 Security Audit Controls 673 18.2 Security Performance 678 Security Performance Measurement 678 Security Monitoring and Reporting 686 Information Risk Reporting 688 Information Security Compliance Monitoring 690 18.3 Security Monitoring and Improvement Best Practices 691 18.4 Key Terms and Review Questions 692 Key Terms 692 Review Questions 692 18.5 References 693 Appendix A: References and Standards 694 Appendix B: Glossary 708 Index 726 Appendix C: Answers to Review Questions (Online Only)