<p>Preface</p> <p><strong>Chapter 1:</strong> Why Study Information Security?</p> <p>Introduction</p> <p>The Growing Importance of IT Security and New Career Opportunities</p> <p> An Increase in Demand by Government and Private Industry</p> <p>Becoming an Information Security Specialist</p> <p> Schools Are Responding to Demands</p> <p> The Importance of a Multidisciplinary Approach</p> <p>Contextualizing Information Security</p> <p> Information Security Careers Meet the Needs of Business</p> <p>Summary</p> <p><strong>Chapter 2:</strong> Information Security Principles of Success</p> <p>Introduction</p> <p>Principle 1: There Is No Such Thing As Absolute Security</p> <p>Principle 2: The Three Security Goals Are Confidentiality, Integrity, and Availability</p> <p> Integrity Models</p> <p> Availability Models</p> <p>Principle 3: Defense in Depth as Strategy</p> <p>Principle 4: When Left on Their Own, People Tend to Make the Worst Security Decisions</p> <p>Principle 5: Computer Security Depends on Two Types of Requirements: Functional and Assurance</p> <p>Principle 6: Security Through Obscurity Is Not an Answer</p> <p>Principle 7: Security = Risk Management</p> <p>Principle 8: The Three Types of Security Controls Are Preventative, Detective, and Responsive</p> <p>Principle 9: Complexity Is the Enemy of Security</p> <p>Principle 10: Fear, Uncertainty, and Doubt Do Not Work in Selling Security</p> <p>Principle 11: People, Process, and Technology Are All Needed to Adequately Secure a System or Facility</p> <p>Principle 12: Open Disclosure of Vulnerabilities Is Good for Security!</p> <p>Summary</p> <p><strong>Chapter 3:</strong> Certification Programs and the Common Body of Knowledge</p> <p>Introduction</p> <p>Certification and Information Security</p> <p>International Information Systems Security Certifications Consortium (ISC)2</p> <p>The Information Security Common Body of Knowledge</p> <p> Information Security Governance and Risk Management</p> <p> Security Architecture and Design</p> <p> Business Continuity and Disaster Recovery Planning</p> <p> Legal Regulations, Investigations, and Compliance</p> <p> Physical (Environmental) Security</p> <p> Operations Security</p> <p> Access Control</p> <p> Cryptography</p> <p> Telecommunications and Network Security</p> <p> Software Development Security</p> <p>Other Certificate Programs in the IT Security Industry</p> <p> Certified Information Systems Auditor</p> <p> Certified Information Security Manager</p> <p> Certified in Risk and Information Systems Control</p> <p> Global Information Assurance Certifications</p> <p> (ISC)2 Specialization Certificates</p> <p> CCFP: Certified Cyber Forensics Professional</p> <p> HCISPP: HealthCare Information Security and Privacy Practitioner</p> <p> Vendor-Specific and Other Certification Programs</p> <p>Summary</p> <p><strong>Chapter 4:</strong> Governance and Risk Management</p> <p>Introduction</p> <p>Security Policies Set the Stage for Success</p> <p>Understanding the Four Types of Policies</p> <p> Programme-Level Policies</p> <p> Programme-Framework Policies</p> <p> Issue-Specific Policies</p> <p> System-Specific Policies</p> <p>Developing and Managing Security Policies</p> <p> Security Objectives</p> <p> Operational Security</p> <p> Policy Implementation</p> <p>Providing Policy Support Documents</p> <p> Regulations</p> <p> Standards and Baselines</p> <p> Guidelines</p> <p> Procedures</p> <p>Suggested Standards Taxonomy</p> <p> Asset and Data Classification</p> <p> Separation of Duties</p> <p> Employment Hiring Practices</p> <p> Risk Analysis and Management</p> <p> Education, Training, and Awareness</p> <p>Who Is Responsible for Security?</p> <p>Summary</p> <p><strong>Chapter 5:</strong> Security Architecture and Design</p> <p>Introduction</p> <p>Defining the Trusted Computing Base</p> <p> Rings of Trust</p> <p>Protection Mechanisms in a TCB</p> <p>System Security Assurance Concepts</p> <p> Goals of Security Testing</p> <p> Formal Security Testing Models</p> <p>The Trusted Computer Security Evaluation Criteria</p> <p> Division D: Minimal Protection</p> <p> Division C: Discretionary Protection</p> <p> Division B: Mandatory Protection</p> <p> Division A: Verified Protection</p> <p> The Trusted Network Interpretation of the TCSEC</p> <p> The Information Technology Security Evaluation Criteria</p> <p> Comparing ITSEC to TCSEC</p> <p> ITSEC Assurance Classes</p> <p>The Canadian Trusted Computer Product Evaluation Criteria</p> <p>The Federal Criteria for Information Technology Security</p> <p>The Common Criteria</p> <p> Protection Profile Organization</p> <p> Security Functional Requirements</p> <p> Evaluation Assurance Levels</p> <p>The Common Evaluation Methodology</p> <p>Confidentiality and Integrity Models</p> <p> Bell-LaPadula Model</p> <p> Biba Integrity Model</p> <p> Advanced Models</p> <p>Summary</p> <p><strong>Chapter 6:</strong> Business Continuity Planning and Disaster Recovery Planning</p> <p>Introduction</p> <p>Overview of the Business Continuity Plan and Disaster Recovery Plan</p> <p> Why the BCP Is So Important</p> <p> Types of Disruptive Events</p> <p> Defining the Scope of the BCP</p> <p> Creating the Business Impact Analysis</p> <p>Disaster Recovery Planning</p> <p> Identifying Recovery Strategies</p> <p> Understanding Shared-Site Agreements</p> <p> Using Alternate Sites</p> <p> Making Additional Arrangements</p> <p> Testing the DRP</p> <p>Summary</p> <p><strong>Chapter 7:</strong> Law, Investigations, and Ethics</p> <p>Introduction</p> <p>Types of Computer Crime</p> <p>How Cybercriminals Commit Crimes</p> <p>The Computer and the Law</p> <p> Legislative Branch of the Legal System</p> <p> Administrative Branch of the Legal System</p> <p> Judicial Branch of the Legal System</p> <p>Intellectual Property Law</p> <p> Patent Law</p> <p> Trademarks</p> <p> Trade Secrets</p> <p>Privacy and the Law</p> <p> International Privacy Issues</p> <p> Privacy Laws in the United States</p> <p>Computer Forensics</p> <p>The Information Security Professional’s Code of Ethics</p> <p>Other Ethics Standards</p> <p> Computer Ethics Institute</p> <p> Internet Activities Board: Ethics and the Internet</p> <p> Code of Fair Information Practices</p> <p>Summary</p> <p><strong>Chapter 8:</strong> Physical Security Control</p> <p>Introduction</p> <p>Understanding the Physical Security Domain</p> <p> Physical Security Threats</p> <p> Providing Physical Security</p> <p>Summary</p> <p><strong>Chapter 9:</strong> Operations Security</p> <p>Introduction</p> <p>Operations Security Principles</p> <p>Operations Security Process Controls</p> <p>Operations Security Controls in Action</p> <p> Software Support</p> <p> Configuration and Change Management</p> <p> Backups</p> <p> Media Controls</p> <p> Documentation</p> <p> Maintenance</p> <p> Interdependencies</p> <p>Summary</p> <p><strong>Chapter 10:</strong> Access Control Systems and Methodology</p> <p>Introduction</p> <p>Terms and Concepts</p> <p> Identification</p> <p> Authentication</p> <p> Least Privilege (Need to Know)</p> <p> Information Owner</p> <p> Discretionary Access Control</p> <p> Access Control Lists</p> <p> Mandatory Access Control</p> <p> Role-Based Access Control</p> <p>Principles of Authentication</p> <p> The Problems with Passwords</p> <p> Multifactor Authentication</p> <p>Biometrics</p> <p>Single Sign-On</p> <p> Kerberos</p> <p> Federated Identities</p> <p>Remote User Access and Authentication</p> <p> Remote Access Dial-In User Service</p> <p> Virtual Private Networks</p> <p>Summary</p> <p><strong>Chapter 11:</strong> Cryptography</p> <p>Introduction</p> <p>Applying Cryptography to Information Systems</p> <p>Basic Terms and Concepts</p> <p>Strength of Cryptosystems</p> <p> Cryptosystems Answer the Needs of Today’s E-Commerce</p> <p> The Role of Keys in Cryptosystems</p> <p>Putting the Pieces to Work</p> <p> Digesting Data</p> <p> Digital Certificates</p> <p>Examining Digital Cryptography</p> <p> Hashing Functions</p> <p> Block Ciphers</p> <p> Implementations of PPK Cryptography</p> <p>Summary</p> <p><strong>Chapter 12:</strong> Telecommunications, Network, and Internet Security</p> <p>Introduction</p> <p>An Overview of Network and Telecommunications Security</p> <p>Network Security in Context</p> <p>The Open Systems Interconnection Reference Model</p> <p> The Protocol Stack</p> <p> The OSI Reference Model and TCP/IP</p> <p> The OSI Model and Security</p> <p>Data Network Types</p> <p> Local Area Networks</p> <p> Wide Area Networks</p> <p> Internet</p> <p> Intranet</p> <p> Extranet</p> <p>Protecting TCP/IP Networks</p> <p> Basic Security Infrastructures</p> <p> Routers</p> <p> Firewalls</p> <p> Intrusion Detection Systems</p> <p> Intrusion Prevention Systems</p> <p>Virtual Private Networks</p> <p>IPSec</p> <p> Encapsulating Security Protocol</p> <p> Security Association</p> <p> Internet Security Association and Key Management Protocol</p> <p> Security Policies</p> <p> IPSec Key Management</p> <p> Applied VPNs</p> <p>Cloud Computing</p> <p>Summary</p> <p><strong>Chapter 13:</strong> Software Development Security</p> <p>Introduction</p> <p>The Practice of Software Engineering</p> <p>Software Development Life Cycles</p> <p>Don’t Bolt Security On–Build It In</p> <p> Catch Problems Sooner Rather Than Later</p> <p> Requirements Gathering and Analysis</p> <p> Systems Design and Detailed Design</p> <p>Design Reviews</p> <p> Development (Coding) Phase</p> <p> Testing</p> <p> Deployment</p> <p> Security Training</p> <p>Measuring the Secure Development Program</p> <p> Open Software Assurance Maturity Model (OpenSAMM)</p> <p> Building Security in Maturity Model (BSIMM)</p> <p>Summary</p> <p><strong>Chapter 14:</strong> Securing the Future</p> <p>Introduction</p> <p>Operation Eligible Receiver</p> <p>Carders, Account Takeover, and Identity Theft</p> <p> Some Definitions</p> <p> ZeuS Banking Trojan</p> <p> Phishing and Spear Phishing</p> <p> Other Trends in Internet (In)Security</p> <p> The Year (Decade?) of the Breach</p> <p>The Rosy Future for InfoSec Specialists</p> <p>Summary</p> <p><strong>Appendix A:</strong> Common Body of Knowledge</p> <p>Access Control</p> <p>Telecommunications and Network Security</p> <p>Information Security Governance and Risk Management</p> <p>Software Development Security</p> <p>Cryptography</p> <p>Security Architecture and Design</p> <p>Operations Security</p> <p>Business Continuity and Disaster Recovery Planning</p> <p>Legal Regulations, Investigations, and Compliance</p> <p>Physical (Environmental) Security</p> <p><strong>Appendix B:</strong> Security Policy and Standards Taxonomy</p> <p><strong>Appendix C:</strong> Sample Policies</p> <p>Sample Computer Acceptable Use Policy</p> <p> 1.0.0 Acceptable Use Policy</p> <p>Sample Email Use Policy</p> <p> 1.0.0 Email Use Policy</p> <p>Sample Password Policy</p> <p> 1.0.0 Password Policy</p> <p>Sample Wireless (WiFi) Use Policy</p> <p> 1.0.0 Wireless Communication Policy</p> <p><strong>Appendix D:</strong> HIPAA Security Rule Standards</p> <p>HIPAA Security Standards</p> <p>Administrative Procedures</p> <p>Physical Safeguards</p> <p>Technical Security Services</p> <p>Technical Security Mechanisms</p> <p>9780789753250 TOC 5/7/2014</p>