Book description
Designed for the non-security professional, this book is an overview of the field of cyber security. The new edition updates content and introduces topics such as business changes and outsourcing. It addresses new cyber security risks such as IoT and Distributed Networks (i.e., blockchain) and covers strategy based on the OODA loop in the cycle.
Table of contents
- Cover
- Half Title Page
- Series Page
- Title Page
- Copyright Page
- Table of Contents
- What Every Engineer Should Know: Series Statement
- Preface
- Acknowledgments
- Authors
- Chapter 1 Security Threats
-
Chapter 2 Cyber Security
- 2.1 Introduction
- 2.2 Information Security
- 2.3 Security Architecture
- 2.4 Access Controls
- 2.5 Cryptography
- 2.6 Network and Telecommunications Security
- 2.7 Operating System Security
- 2.8 Software Development Security
- 2.9 Database Security
- 2.10 Internet of Things Security
- 2.11 Business Continuity and Disaster Recovery
- 2.12 Physical Security
- 2.13 Legal, Regulations, Compliance, and Investigations
- 2.14 Operations Security
- 2.15 Information Security Governance and Risk Management
- References
- Chapter 3 Strategy to Outpace the Adversary
- Chapter 4 Preparing for an Incident
- Chapter 5 Incident Response and Digital Forensics
- Chapter 6 Development, Security, and Operations
-
Chapter 7 Mobile Device Forensic Tools
- 7.1 Introduction
-
7.2 Tools
- 7.2.1 Axiom and Axiom Cyber by Magnet Forensics
- 7.2.2 ALEAPP Android and iOS Analysis Tools
- 7.2.3 Belkasoft Evidence Center X
- 7.2.4 Cellebrite Universal Forensic Extraction Device (UFED) and Physical Analyzer
- 7.2.5 Oxygen Forensics
- 7.2.6 Graykey from Gray Shift
- 7.2.7 DataPilot from Susteen
- 7.2.8 XRY from Micro Systemation
- 7.3 Conclusion
- Note
-
Chapter 8 The Laws Most Likely to Affect IT and IT Security
- 8.1 Introduction
-
8.2 Managing Personal Data
- 8.2.1 Data Breach Laws
- 8.2.2 Cybersecurity Protection: Massachusetts/NY SHIELD Act
- 8.2.3 CCPA and CPRA
- 8.2.4 Virginia, Colorado, and Utah
- 8.2.5 PCI-DSS
- 8.2.6 HIPAA
- 8.2.7 FTC Act “Unfair or Deceptive Practices”
- 8.2.8 FERPA
- 8.2.9 GDPR and Personal Data Belonging to Non-US Residents
- 8.2.10 Contractual Agreements on Data Handling
- 8.3 Biometric Security
- 8.4 Collecting Digital Evidence and Electronic Discovery
- 8.5 Criminal Liability for Surveilling Employees
- 8.6 Organizational Security, Financial Institutions, and Critical Infrastructure
- Notes
- Chapter 9 Cyber Security and Digital Forensics Careers
-
Chapter 10 Theory to Practice
- 10.1 Introduction
- 10.2 Case Study 1: It is All Fun and Games until Something Gets Deleted
- 10.3 Case Study 2: How is This Working for You?
- 10.4 Case Study 3: The Weakest Link
- 10.5 Case Study 4: Dealing with Phishing Using the OODA Loop
- 10.6 Case Study 5: Dealing with Incident Response Using the OODA Loop
- 10.7 Case Study 6: The Colonial Pipeline: Three Assumptions You Should Never Make about Ransomware
- References
- Notes
- Index
Product information
- Title: What Every Engineer Should Know About Cyber Security and Digital Forensics, 2nd Edition
- Author(s):
- Release date: December 2022
- Publisher(s): CRC Press
- ISBN: 9781000797985
You might also like
book
Cyber Security and Digital Forensics
CYBER SECURITY AND DIGITAL FORENSICS Cyber security is an incredibly important issue that is constantly changing, …
book
The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks
This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual …
book
Hands-on Incident Response and Digital Forensics
In this practical guide, the relationship between incident response and digital forensics is explored and you …
book
Security, Privacy, and Digital Forensics in the Cloud
In a unique and systematic way, this book discusses the security and privacy aspects of the …