• Complain

Young - Information security science: measuring the vulnerability to data compromises

Here you can read online Young - Information security science: measuring the vulnerability to data compromises full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Cambridge;MA, year: 2016, publisher: Elsevier Science & Technology Books;Syngress is an imprint of Elsevier, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Information security science: measuring the vulnerability to data compromises
  • Author:
  • Publisher:
    Elsevier Science & Technology Books;Syngress is an imprint of Elsevier
  • Genre:
  • Year:
    2016
  • City:
    Cambridge;MA
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Information security science: measuring the vulnerability to data compromises: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Information security science: measuring the vulnerability to data compromises" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Provides the scientific background, analytic methods, and quantitative metrics to allow scientists and engineers with no background in security to estimate vulnerability to a spectrum of information security threats. Explores the physical nature of information security risk, and in so doing exposes connections between information security, physical security, information technology, and information theory--OCLC.

Young: author's other books


Who wrote Information security science: measuring the vulnerability to data compromises? Find out the surname, the name of the author of the book and a list of all author's works by series.

Information security science: measuring the vulnerability to data compromises — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Information security science: measuring the vulnerability to data compromises" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Information Security Science Measuring the Vulnerability to Data Compromises - photo 1
Information Security Science
Measuring the Vulnerability to Data Compromises
Carl S. Young
Managing Director and Chief Security Officer, Stroz Friedberg LLC
Table of Contents Copyright Syngress is an imprint of Elsevier 50 Hampshire - photo 2
Table of Contents
Copyright

Syngress is an imprint of Elsevier

50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States

Copyright 2016 Elsevier Inc. All rights reserved.

No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publishers permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.

This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).

Notices

Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.

Library of Congress Cataloging-in-Publication Data

A catalog record for this book is available from the Library of Congress

British Library Cataloguing-in-Publication Data

A catalogue record for this book is available from the British Library

ISBN: 978-0-12-809643-7

For information on all Syngress publications visit our website at https://www.elsevier.com/

Publisher Joe Hayton Acquisition Editor Brian Romer Editorial Project - photo 3

Publisher: Joe Hayton

Acquisition Editor: Brian Romer

Editorial Project Manager: Anna Valutkevich

Production Project Manager: Mohana Natarajan

Designer: Mark Rogers

Typeset by Thomson Digital

Dedication

To my remarkable sisters, Diane Uniman and Nancy Young

Biography

Carl S. Young is an expert in information and physical security risk management. He is currently a Managing Director and the Chief Security Officer at Stroz Friedberg, an international security risk consulting firm. He is the former Global Head of Physical Security Technology at Goldman Sachs as well as a former Senior Executive and Supervisory Special Agent at the FBI. He was also a consultant to the JASON Defense Advisory Group. Mr. Young is the author of Metrics and Methods for Security Risk Management (Syngress, 2010), and The Science and Technology of Counterterrorism (Butterworth-Heinemann, 2014) as well as numerous journal publications. In 1997 he was awarded the Presidents Foreign Intelligence Advisory Board (PFIAB) James R. Killian Award by the White House for significant individual contributions to US national security. Mr. Young received undergraduate and graduate degrees in mathematics and physics from the Massachusetts Institute of Technology.

Foreword

All new innovations bring positive and negative consequences for users and society at large. This has been true of the development and broad deployment of alternating current a century ago, and mass vehicular and air transportation, right through to the nuclear age. We enjoy the benefits of these platforms for economic productivity and advancement as well as social interaction, but at the same time in the hands of bad actors, all these represent existential threats to society.

The Internet and electronic communication have come into the public consciousness only over the past 20 years. And perhaps they represent a new frontier in providing benefits to society, by reducing what economists call search and transaction costs. They also bring about the ability to reach and improve the lives of many people in developing economies.

At the same time the extreme networking and electronic interconnection that underpins our day-to-day lives has provided for an extraordinary amount of vulnerability; whether it be through data breaches of corporate networks or the compromise of wireless communication means, cyber threats seem potentially limitless when the tools are put in malicious hands. These threats are also limitless because they are very scalable and rely on the weak underbelly of our basic market economy, which competes on the basis of convenience and speed, often sacrificing security.

This book examines in the most comprehensive fashion how to think about vulnerabilities in a scientific way, the only approach that fully and objectively can determine how to go about identifying, understanding, and rooting out vulnerabilities. It is both wide ranging and looks at each potential vulnerability with a strict scientific mindset to help all readers determine how best to maximize the benefits of interconnection in the Internet age, while at the same time minimizing the downside so as to gain the benefits all societies have come to expect.

Michael Patsalos-Fox

CEO, Stroz Friedberg, Former Chairman of the Americas, McKinsey & Co.

Preface

Despite its name, the commercial success of the computer derives from its effectiveness as a communications tool rather than as a machine that computes . Humans are arguably obsessed with communication so any device that enables the exchange of information is likely to be popular.

To be sure, information technologies such as the telephone, the television, and the computer cum Internet have had transformational effects on society. People who were previously isolated suddenly had unprecedented access to individuals outside their immediate surroundings. In addition, they were now almost immediately aware of events that occurred beyond their immediate environment. Notwithstanding possible correlations between social media and bad grammar, the positive effects of communication technologies cannot be disputed.

Yet not all communications are meant for public consumption. Unauthorized access to information is a problem when the whole point of these technologies is to facilitate the seamless exchange of data. To complicate matters, we are a species that also craves convenience, and convenience and security are often incompatible. In fact, the need for convenience drives much of the information security risk within organizations today.

Although attacks on networks are the focus of typical security strategies, other modes of attack on information assets deserve attention. For example, unauthorized access to visual and audible information is commonplace in many business settings with the potential for significant losses. In addition, electronic devices radiate compromising energy that can be remotely detected under the right conditions. State-sponsored adversaries have both the incentive and the resources to conduct such attacks thereby obviating the need to intrude on the network and largely eliminating a concern for detection.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Information security science: measuring the vulnerability to data compromises»

Look at similar books to Information security science: measuring the vulnerability to data compromises. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Information security science: measuring the vulnerability to data compromises»

Discussion, reviews of the book Information security science: measuring the vulnerability to data compromises and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.