Foreword |
|
xix | |
Introduction |
|
xxiii | |
|
Chapter 1 What Has History Shown Us? |
|
|
1 | (22) |
|
The History of Data Breach Disclosure |
|
|
2 | (1) |
|
The History of Vulnerability Exploits |
|
|
3 | (1) |
|
The History of Viruses and Worms |
|
|
4 | (1) |
|
The History of Edge-Based Security |
|
|
5 | (2) |
|
|
7 | (1) |
|
|
8 | (8) |
|
|
9 | (1) |
|
|
10 | (2) |
|
|
12 | (1) |
|
The History of Hacker Motivation |
|
|
12 | (1) |
|
|
13 | (1) |
|
The History of Search Engine Hacking |
|
|
14 | (1) |
|
|
14 | (2) |
|
The History of Security Solutions |
|
|
16 | (2) |
|
The Making of a Cyber-Super-Villain |
|
|
18 | (2) |
|
|
20 | (1) |
|
|
20 | (3) |
|
Chapter 2 External Influences on Security |
|
|
23 | (38) |
|
Information Security Drivers |
|
|
23 | (3) |
|
|
26 | (10) |
|
|
28 | (3) |
|
|
31 | (1) |
|
|
32 | (4) |
|
|
36 | (6) |
|
|
42 | (5) |
|
|
47 | (2) |
|
Breach Impact on Public Companies |
|
|
49 | (4) |
|
|
53 | (2) |
|
|
55 | (6) |
|
Chapter 3 Technology Influences on Security |
|
|
61 | (34) |
|
The Movement Toward National Identity Management |
|
|
61 | (6) |
|
Internet Protocol in 2020 |
|
|
67 | (2) |
|
2020: Remote Access Continues to Be a Problem |
|
|
69 | (2) |
|
|
71 | (1) |
|
|
72 | (1) |
|
The Impact of Virtualization |
|
|
73 | (2) |
|
|
75 | (1) |
|
|
76 | (1) |
|
The Portable Media Debacle, A.K.A. Mobility |
|
|
77 | (4) |
|
Advanced Persistent Threat in 2020 |
|
|
81 | (4) |
|
|
85 | (3) |
|
The Security Software Vendor |
|
|
88 | (2) |
|
Personal Information and Data Correlation |
|
|
90 | (2) |
|
|
92 | (3) |
|
Chapter 4 Where Security Threats Will Come from in the Future |
|
|
95 | (36) |
|
|
97 | (3) |
|
|
100 | (4) |
|
The Ph-enomenon: Why so many attack methods start with "Ph" |
|
|
104 | (1) |
|
Phishing, Pharming, SMSishing, Vishing |
|
|
104 | (3) |
|
|
107 | (5) |
|
|
112 | (4) |
|
|
116 | (2) |
|
|
118 | (1) |
|
Peer-to-Peer (P2P) Software |
|
|
118 | (1) |
|
|
118 | (1) |
|
Social Networking Threats |
|
|
119 | (4) |
|
|
123 | (1) |
|
|
123 | (2) |
|
|
125 | (1) |
|
Social and Financial Threats |
|
|
125 | (1) |
|
Website Middleware Threats |
|
|
126 | (2) |
|
|
128 | (3) |
|
Chapter 5 Secure Communications and Collaboration |
|
|
131 | (28) |
|
Email, Instant Messaging, and SMS |
|
|
138 | (2) |
|
Online Webinars and Collaboration Tools |
|
|
140 | (5) |
|
|
145 | (4) |
|
|
149 | (3) |
|
Storage and Retention of User-Generated Content |
|
|
152 | (3) |
|
Digital Rights Management and Content Protection |
|
|
155 | (2) |
|
Digital Rights Management |
|
|
156 | (1) |
|
|
157 | (1) |
|
UCC and UCC Compliance Requirements over the Next Decade |
|
|
157 | (2) |
|
Chapter 6 2020 Revolution or Evolution? |
|
|
159 | (30) |
|
|
160 | (6) |
|
|
166 | (4) |
|
Security in 20/20 Hindsight |
|
|
170 | (19) |
|
Intrusion Detection Systems, Intrusion Protection Systems, and Data Loss Prevention in 20/20 Hindsight |
|
|
170 | (5) |
|
Identity Management/Network Access Control/Single Sign-on |
|
|
175 | (1) |
|
Mobility/Wireless./Ultra-Mobile |
|
|
176 | (1) |
|
|
176 | (5) |
|
Testing Your Information Protection: Penetration Test/Vulnerability Test/Risk Assessments |
|
|
181 | (8) |
|
Chapter 7 Security as a Business Now and Then |
|
|
189 | (22) |
|
|
190 | (4) |
|
Evolving Purpose into Action |
|
|
191 | (2) |
|
|
193 | (1) |
|
The Relationship: Security and Luck |
|
|
194 | (1) |
|
Security: An Industry or a Feature of IT? |
|
|
195 | (3) |
|
Consolidation of the IT Security Industry |
|
|
198 | (3) |
|
Buying Security: Defining the Value |
|
|
201 | (2) |
|
Budgets and Prioritizations |
|
|
203 | (2) |
|
Venture Capital and Investment in IT Security |
|
|
205 | (6) |
|
Chapter 8 Impact of the Economy over the Next 10 Years |
|
|
211 | (10) |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
217 | (1) |
|
|
218 | (3) |
|
Chapter 9 Eleven (Maybe Not So Crazy) Scenarios That Could Happen |
|
|
221 | (34) |
|
Situation One Which Way Do I Go? |
|
|
221 | (3) |
|
Situation Two Is the Network Down? |
|
|
224 | (7) |
|
60 Hudson Street, New York City, New York |
|
|
229 | (1) |
|
900 North Franklin Street, Chicago, IL 60610 |
|
|
230 | (1) |
|
56 Marietta, Atlanta, Georgia |
|
|
230 | (1) |
|
Situation Three Snip the Wires |
|
|
231 | (2) |
|
Situation Four The Pandemic |
|
|
233 | (3) |
|
Situation Five Cyber-Hijacking, Blackmail, and Ransom |
|
|
236 | (2) |
|
Situation Six The Facebook Killer |
|
|
238 | (2) |
|
Situation Seven Is It Getting Hot? |
|
|
240 | (3) |
|
Situation Eight Which Way is Up |
|
|
243 | (1) |
|
Situation Nine Cyber-Hypothermia, Cyber-Heat-Stroke, Utility Terrorism |
|
|
244 | (4) |
|
Situation Ten The Pundit Hack |
|
|
248 | (3) |
|
Situation Eleven Stock Manipulation |
|
|
251 | (4) |
|
|
255 | (10) |
|
|
256 | (1) |
|
|
256 | (2) |
|
Tipping Point #1 Compliance Overload |
|
|
258 | (1) |
|
Tipping Point #2 Data Breach Laws |
|
|
259 | (1) |
|
Tipping Point #3 Liability |
|
|
260 | (1) |
|
Tipping Point #4 From Outsiders to Insiders |
|
|
261 | (1) |
|
Tipping Point #5 From Network to Endpoint |
|
|
262 | (1) |
|
Tipping Point #6 Cloud Computing |
|
|
263 | (1) |
|
|
264 | (1) |
Appendix Contributing Author Biographies |
|
265 | (28) |
Index |
|
293 | |