The Digital Big Bang. Phil QuadeЧитать онлайн книгу.
a14e1103-5eb8-5341-bc50-97c9cac14a12">
Table of Contents
1 Cover
5 INTRODUCTION THE COSMIC BIG BANG: THE BIRTH OF THE PHYSICAL UNIVERSE AND THE HUMAN SOCIETY THAT EMERGED THE DIGITAL BIG BANG: THE BIRTH OF THE DIGITAL UNIVERSE THE SCIENTIFIC REVOLUTION THE BANG BEGINS WHAT WE GOT RIGHT WHAT WE GOT WRONG AN UNWARRANTED ASSUMPTION OF TRUST AN HONEST ASSESSMENT OF THE CURRENT STATE WHAT CYBERCRIMES EXPLOIT WHAT WE CAN GET RIGHT NOW THE DIGITAL NUCLEUS
6 SECTION 1: BINDING STRATEGIES: THE CORE OF CYBERSECURITY 1 SPEED SPEED: THE NUCLEUS OF THE CYBERFRONTIER IS SPEED AN ADVANTAGE? IT DEPENDS ON THE CONTEXT 2 CONNECTIVITY MANAGING THE INTENSIFYING CONNECTIVITY OF THE IOT ERA CYBERSPACE: MAKING SOME SENSE OF IT ALL
7 SECTION 2: ELEMENTARY SHORTFALLS: THE THINGS WE DIDN'T GET RIGHT AT THE BEGINNING 3 AUTHENTICATION AUTHENTICATION, DATA INTEGRITY, NONREPUDIATION, AVAILABILITY, AND CONFIDENTIALITY: THE FIVE PILLARS OF SECURITY AUTHENTICATION AND MODELS OF TRUST 4 PATCHING PATCHING: A GROWING CHALLENGE AND A NEEDED DISCIPLINE CONQUER OR BE CONQUERED 5 TRAINING FILL THE SKILLS GAP WITH AN ENVIRONMENT OF CONTINUAL TRAINING EMPLOYEE TRAINING IS KEY FOR CYBERSECURITY TRAINING IS A MINDSET
8 SECTION 3: FUNDAMENTAL STRATEGIES: PROVEN STRATEGIES THAT DON'T LET US DOWN 6 CRYPTOGRAPHY CRYPTOGRAPHY: THE BACKBONE OF CYBERSECURITY CRYPTOGRAPHY: THE GOOD, THE BAD, AND THE FUTURE 7 ACCESS CONTROL MANAGING ACCESS IN CHALLENGING ENVIRONMENTS A SYSTEMATIC APPROACH TO ACCESS CONTROL 8 SEGMENTATION SUCCESSFUL SEGMENTATION ISN'T SEPARATION: IT'S COLLABORATION WHY WE NEED TO SEGMENT NETWORKS
9 SECTION 4: ADVANCED STRATEGIES: SOPHISTICATED CYBERSECURITY OPERATIONS 9 VISIBILITY VISIBILITY: IDENTIFYING PATHOGENS, RISK FACTORS, AND SYMPTOMS OF CYBERATTACKS 20/20 INSIGHT: REDEFINING VISIBILITY TO STOP MODERN CYBERCRIME SYNDICATES THE CHALLENGE OF VISIBILITY 10 INSPECTION IN AND OUT OF THE SHADOWS: THE VISIBILITY THAT INSPECTION ENABLES IS NOT CONFINED TO TECHNOLOGY ALONE THE FUNDAMENTAL IMPORTANCE OF INSPECTION 11 FAILURE RECOVERY PREPARATION, RESPONSE, AND RECOVERY CYBER EVENT RECOVERY
10 SECTION 5: HIGHER-ORDER DIMENSIONS: WHERE HUMAN FACTORS CAN ECLIPSE COMPUTING WIZARDRY 12 COMPLEXITY MANAGEMENT SHIFT YOUR MINDSET TO MANAGE COMPLEXITY SEVEN STEPS TO REDUCING COMPLEXITY 13 PRIVACY DON'T PANIC! SECURITY PROS MUST LEARN TO EMBRACE THE NEW ERA OF PRIVACY STRICTER PRIVACY REGULATIONS ARE DRIVING THE CONVERSATIONS—AND INNOVATIONS—WE NEED 14 HUMAN FRAILTY OVERCOMING HUMAN FRAILTY: PEOPLE AND THE POWER OF OBLIGATION OVERCOMING HUMAN FRAILTY BY DESIGN
11 THE FUTURE UNIFYING FORCES RELATIONSHIPS