Get full access to Elementary Information Security and 60K+ other titles, with a free 10-day trial of O'Reilly.
There are also live events, courses curated by job role, and more.
Chapter 1 Security from the Ground Up
1.1 The Security Landscape
1.1.1 Making Security Decisions
1.1.2 The Security Process
1.1.3 Continuous Improvement: A Basic Principle
1.2 Process Example: Bob’s Computer
1.3 Assets and Risk Assessment
1.3.1 What Are We Protecting?
1.3.2 Security Boundaries
1.3.3 Security Architecture
1.3.4 Risk Assessment Overview
1.4 Identifying Risks
1.4.1 Threat Agents
1.4.2 Security Properties, Services, and Attacks
1.5 Prioritizing Risks
1.5.1 Example: Risks to Alice’s Laptop
1.5.2 Other Risk-Assessment Processes
1.6 Ethical Issues in Security Analysis
1.6.1 Searching for Vulnerabilities
1.6.2 Sharing or Publishing Vulnerabilities
1.7 Security Example: Aircraft Hijacking ...
Get Elementary Information Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.
Get Mark Richards’s Software Architecture Patterns ebook to better understand how to design components—and how they should interact.
Dive in for free with a 10-day trial of the O’Reilly learning platform—then explore all the other resources our members count on to build skills and solve problems every day.