Atjaunināt sīkdatņu piekrišanu

Security 2020: Reduce Security Risks This Decade [Mīkstie vāki]

3.85/5 (21 ratings by Goodreads)
  • Formāts: Paperback / softback, 336 pages, height x width x depth: 233x189x18 mm, weight: 516 g, Illustrations
  • Izdošanas datums: 17-Dec-2010
  • Izdevniecība: John Wiley & Sons Ltd
  • ISBN-10: 0470639555
  • ISBN-13: 9780470639559
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 44,74 €*
  • * Šī grāmata vairs netiek publicēta. Jums tiks paziņota lietotas grāmatas cena
  • Šī grāmata vairs netiek publicēta. Jums tiks paziņota lietotas grāmatas cena.
  • Daudzums:
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Bibliotēkām
  • Formāts: Paperback / softback, 336 pages, height x width x depth: 233x189x18 mm, weight: 516 g, Illustrations
  • Izdošanas datums: 17-Dec-2010
  • Izdevniecība: John Wiley & Sons Ltd
  • ISBN-10: 0470639555
  • ISBN-13: 9780470639559
Citas grāmatas par šo tēmu:
Provides a history of computer security breaches, explores current and future threats, and offers information on how to combat security risks.

For decades, security experts and their IT peers have battled the black hats. Yet the threats are as prolific as ever and more sophisticated. Compliance requirements are evolving rapidly and globalization is creating new technology pressures. Risk mitigation is paramount. What lies ahead?

Doug Howard and Kevin Prince draw upon their vast experience of providing security services to many Fortune-ranked companies, as well as small and medium businesses. Along with their panel of security expert contributors, they offer real-world experience that provides a perspective on security past, present, and future. Some risk scenarios may surpise you. Some may embody fears you have already considered. But all will help you make tomorrow's IT world a little more secure than today's.

Identify real security risks and skip the hype

After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today’s IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.

  • IT security needs are constantly evolving; this guide examines what history has taught us and predicts future concerns
  • Points out the differences between artificial concerns and solutions and the very real threats to new technology, with startling real-world scenarios
  • Provides knowledge needed to cope with emerging dangers and offers opinions and input from more than 20 noteworthy CIOs and business executives
  • Gives you insight to not only what these industry experts believe, but also what over 20 of their peers believe and predict as well

With a foreword by security expert Bruce Schneier, Security 2020: Reduce Security Risks This Decade supplies a roadmap to real IT security for the coming decade and beyond.

Foreword xix
Introduction xxiii
Chapter 1 What Has History Shown Us?
1(22)
The History of Data Breach Disclosure
2(1)
The History of Vulnerability Exploits
3(1)
The History of Viruses and Worms
4(1)
The History of Edge-Based Security
5(2)
The History of Patching
7(1)
Hacker Methodologies
8(8)
Inbound Attacks
9(1)
The History of Malware
10(2)
Automated Attacks
12(1)
The History of Hacker Motivation
12(1)
The History of Botnets
13(1)
The History of Search Engine Hacking
14(1)
The History of Data Loss
14(2)
The History of Security Solutions
16(2)
The Making of a Cyber-Super-Villain
18(2)
The Botnet in Action
20(1)
Hindsight iS NOT 20/20
20(3)
Chapter 2 External Influences on Security
23(38)
Information Security Drivers
23(3)
The Emotions
26(10)
World Events
28(3)
The Impact of Politics
31(1)
The Impact on Journalism
32(4)
The Social Engineer
36(6)
GRC
42(5)
Litigation
47(2)
Breach Impact on Public Companies
49(4)
The Security Culture
53(2)
The Path to 2020
55(6)
Chapter 3 Technology Influences on Security
61(34)
The Movement Toward National Identity Management
61(6)
Internet Protocol in 2020
67(2)
2020: Remote Access Continues to Be a Problem
69(2)
The Search Engine Impact
71(1)
The Web Services Impact
72(1)
The Impact of Virtualization
73(2)
The Malware Problem
75(1)
The Web Browser
76(1)
The Portable Media Debacle, A.K.A. Mobility
77(4)
Advanced Persistent Threat in 2020
81(4)
The Network Edge
85(3)
The Security Software Vendor
88(2)
Personal Information and Data Correlation
90(2)
The Domain Name
92(3)
Chapter 4 Where Security Threats Will Come from in the Future
95(36)
Spam
97(3)
Botnets
100(4)
The Ph-enomenon: Why so many attack methods start with "Ph"
104(1)
Phishing, Pharming, SMSishing, Vishing
104(3)
Vulnerability Exploits
107(5)
Insider Threats
112(4)
Mobility Threats
116(2)
Infected Software
118(1)
Peer-to-Peer (P2P) Software
118(1)
Third-Party Threats
118(1)
Social Networking Threats
119(4)
Digitization
123(1)
Star Wars
123(2)
Infrastructure Attacks
125(1)
Social and Financial Threats
125(1)
Website Middleware Threats
126(2)
Doppelganger Attacks
128(3)
Chapter 5 Secure Communications and Collaboration
131(28)
Email, Instant Messaging, and SMS
138(2)
Online Webinars and Collaboration Tools
140(5)
Voice over IP
145(4)
Video over IP
149(3)
Storage and Retention of User-Generated Content
152(3)
Digital Rights Management and Content Protection
155(2)
Digital Rights Management
156(1)
Watermarking
157(1)
UCC and UCC Compliance Requirements over the Next Decade
157(2)
Chapter 6 2020 Revolution or Evolution?
159(30)
IT Security Revolution
160(6)
The Missing Deterrent
166(4)
Security in 20/20 Hindsight
170(19)
Intrusion Detection Systems, Intrusion Protection Systems, and Data Loss Prevention in 20/20 Hindsight
170(5)
Identity Management/Network Access Control/Single Sign-on
175(1)
Mobility/Wireless./Ultra-Mobile
176(1)
SaaS and Cloud Computing
176(5)
Testing Your Information Protection: Penetration Test/Vulnerability Test/Risk Assessments
181(8)
Chapter 7 Security as a Business Now and Then
189(22)
The Purpose of IT
190(4)
Evolving Purpose into Action
191(2)
The Map to Success
193(1)
The Relationship: Security and Luck
194(1)
Security: An Industry or a Feature of IT?
195(3)
Consolidation of the IT Security Industry
198(3)
Buying Security: Defining the Value
201(2)
Budgets and Prioritizations
203(2)
Venture Capital and Investment in IT Security
205(6)
Chapter 8 Impact of the Economy over the Next 10 Years
211(10)
Economic Recession
213(1)
What If?
214(1)
Economic Booms
215(1)
Hyperinflation
216(1)
Skill Shortages
217(1)
Another Terrorist Attack
217(1)
The Outlook
218(3)
Chapter 9 Eleven (Maybe Not So Crazy) Scenarios That Could Happen
221(34)
Situation One Which Way Do I Go?
221(3)
Situation Two Is the Network Down?
224(7)
60 Hudson Street, New York City, New York
229(1)
900 North Franklin Street, Chicago, IL 60610
230(1)
56 Marietta, Atlanta, Georgia
230(1)
Situation Three Snip the Wires
231(2)
Situation Four The Pandemic
233(3)
Situation Five Cyber-Hijacking, Blackmail, and Ransom
236(2)
Situation Six The Facebook Killer
238(2)
Situation Seven Is It Getting Hot?
240(3)
Situation Eight Which Way is Up
243(1)
Situation Nine Cyber-Hypothermia, Cyber-Heat-Stroke, Utility Terrorism
244(4)
Situation Ten The Pundit Hack
248(3)
Situation Eleven Stock Manipulation
251(4)
Chapter 10 Conclusion
255(10)
2020
256(1)
Information Asymmetry
256(2)
Tipping Point #1 Compliance Overload
258(1)
Tipping Point #2 Data Breach Laws
259(1)
Tipping Point #3 Liability
260(1)
Tipping Point #4 From Outsiders to Insiders
261(1)
Tipping Point #5 From Network to Endpoint
262(1)
Tipping Point #6 Cloud Computing
263(1)
Beyond Tipping Points
264(1)
Appendix Contributing Author Biographies 265(28)
Index 293
Doug Howard , a 20-year IT security veteran, is the CEO of VBrick Systems and previously held positions as CSO of Perimeter E-Security, COO of BT Counterpane, and VP of Security and Business Continuity at AT&T. Kevin Prince has spent over 20 years in IT, with the majority of that time focused on information security. Kevin has been everything from founder and CEO of his own information security company to Chief Technology Officer of Perimeter E-Security, one of the largest managed security service providers in the nation.