ABSTRACT

Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates include topics such as cyber risks in mobile telephony, steganography, cybersecurity as an added value, ransomware defense, review of recent cyber laws, new types of cybercrime, plus new chapters on digital currencies and encryption key management.

chapter 1|22 pages

Vulnerabilities in Information Systems

chapter 2|37 pages

Vulnerabilities in the Organization

chapter 4|20 pages

Secure Information Systems

chapter 5|16 pages

Cybersecurity and the CIO

chapter 6|18 pages

Building a Secure Organization

chapter 7|26 pages

Cyberspace Intrusions

chapter 8|20 pages

Cyberspace Defense

chapter 9|32 pages

Cyberspace and the Law

chapter 10|30 pages

Cyber Warfare and Homeland Security

chapter 11|6 pages

Digital Currencies