Advances in Cyber Security
Technology, Operation, and Experiences
Publication Year: 2013
Published by: Fordham University Press
Title Page, Copyright
Download PDF (79.7 KB)
Download PDF (80.2 KB)
Download PDF (88.0 KB)
Download PDF (103.8 KB)
The advent of network and digital information technologies has ushered in a myriad of new and diverse opportunities in our lives and at our jobs. Cutting-edge technologies have transformed the information society into a vibrant cyber- physical- natural ecosystem. However, these same technologies are being used by adversaries in a variety of attacks and exploitations ...
Building a Secure and Sustainable Cyberspace Ecosystem:An Overview
Download PDF (818.8 KB)
This overview provides a historical and contemporary perspective on various issues pertaining to the security and sustainability of the emerging cyberspace, which is embedded with intelligent networking sensors and systems, as well as information technology appliances and services. In particular, it explores how to build a secure and sustainable cyberspace...
Part I: Technology
Improving Cyber Security
Download PDF (666.1 KB)
Cyber security is essential given our growing dependence on cyberspace for all aspects of modern societies. However, today, attackers have the up-per hand. In this chapter, I discuss the security properties needed, and some key strategies that may have the potential to level the playing field between attackers and defenders. These research strategies were developed ...
Practical Vulnerabilities of the Tor Anonymity Network
Download PDF (1.2 MB)
Onion routing is a technology designed at the U.S. Naval Research Laboratory to protect the security and privacy of network communications. In particular, Tor, the current widely- used onion routing system, was originally designed to protect intelligence gathering from open sources and to otherwise protect military communications over insecure or public ...
Defending Software Systems against Cyber Attacksthroughout Their Lifecycle
Download PDF (892.2 KB)
Malware usually enters a distributed software system along three avenues. First, it may be hidden surreptitiously within application code by a malicious developer. Examples of malicious code include Trojan horses, back-doors, and logic bombs. This code can be triggered by the developer or his accomplices—after the application has been deployed in the field— using ...
Improve Availability of Networks: Internet Exchange Pointsand Their Role in Cyberspace
Download PDF (436.5 KB)
The Internet could not exist without Internet exchange points (IXPs). The concept of IXPs was developed in the early 1990s, and IXPs have continued to grow in quantity, location, and size (traffic volume) as the Internet has grown. There are, however, very few books or papers written about IXPs. Knowledge of IXPs has long been confined to industry experts. In this ...
Part II: Operations
Tor: Uses and Limitations of Online Anonymity
Download PDF (132.4 KB)
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built- in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks ...
Authoritative Data Sources:Cyber Security Intelligence Perspectives
Download PDF (204.6 KB)
Many reports indicate that the United States currently faces a multifaceted, technologically based vulnerability. Our information systems are being exploited on an unprece dented scale by state and non- state actors, resulting in a dangerous combination of known and unknown vulnerabilities, strong adversary capabilities, and weak situational awareness. Many cyber security ...
The Evolving Consumer Online Threat Landscape:Creating an Effective Response
Download PDF (106.8 KB)
The proliferation of Internet- connected devices in the consumer market has created a dramatic shift from a single point PC- based threat risk to an expanded threat perimeter that includes tablet devices, smartphones, and Internet- connected televisions. Consumer home network growth now re-quires security for a consumer’s entire digital lifestyle and not just a ...
Partners in Cybercrime
Download PDF (437.5 KB)
Hijacked online banking sessions, theft of credit card data, virus infections, spam . . . living in the age of the world wide web implies that we are all vulnerable to cybercrime— crime committed using mainly computerized means . In the 1990s, cybercrime primarily seemed to be the do-main of computer savvy youngsters motivated by recognition for their ...
Part III: Experiences
Securing IT Networks Incorporating Medical Devices:Risk Management and Compliance inHealth Care Cyber Security
Download PDF (224.5 KB)
The U.S. health care sector continues to grow, even in a difficult economic climate. In 2009, health care accounted for 17.3 percent of the gross domes-tic product . The medical technology industry in the United States ac-counted for 6 percent of the total health care industry revenue in 2008 . The U.S. Department of Homeland Security has identified the Healthcare ...
Computer Forensics from a Law Enforcement Perspective
Download PDF (134.9 KB)
Computerized information has become an integral part of our everyday lives as it has created a new perspective, almost a parallel virtual world that reflects our own physical world. This cyber world is abundant with evidence, especially when it comes to combating, investigating, and solving almost any crime, not just crimes committed with the assistance of com-...
Computer Crime Incidents and Responses in the Private Sector
Download PDF (103.6 KB)
Companies can fall victim to various types of computer crime and accidental incidents. One type of incident is a data breach in which information a company has in its possession is stolen or in some way improperly released. An obvious example we have all read about is the theft of individual social security account numbers (SSANs) or credit card numbers. There are other ...
Information Technology for aSafe and Secure Society in Japan:Toward a Cyber- Physical Solution
Download PDF (648.5 KB)
This chapter introduces the topic of information technology for a safe and secure society in Japan, showing an emerging trend toward a cyber-physical solution. Notable security incidents in the United States and Japan, and the Japanese national strategy for information security, are discussed first, fol-lowed by a discussion of emerging security technologies in Japan (such as a ...
Part IV: Partnership, Policy, and Sustainability
Public- Private Partnerships Changing the World
Download PDF (95.6 KB)
In 1961, United States President John F. Kennedy captivated the imagination of our nation when he announced before a joint session of Congress that “this nation should commit itself to achieving the goal, before the decade is out, of landing a man on the moon and returning him safely to the earth” . NASA had yet to send a man into orbit to travel around the ...
Cyber Security: Protecting Our Cyber Citizens
Download PDF (116.3 KB)
We all recognize the importance of using every law enforcement tool at our disposal to combat threats to our cyber security. Computer networks— including the biggest one of all, the Internet— are crucial infrastructures We in the Southern District of New York are critically aware of this. You need look no further than Wall Street, the nation’s vital financial in-...
Cyber Security: Safeguarding Our Cyberspace
Download PDF (99.4 KB)
We live in a wired world. Our networks help us to stay in touch with family and friends, collaborate with colleagues worldwide, and shop for every-thing from books to houses. They help us manage our finances and make businesses and government more efficient. But our reliance on these net-works also makes us vulnerable. Criminals can use the Internet to commit ...
Cyber Security: Securing Our Cyber Ecosystem
Download PDF (88.2 KB)
More than a decade ago, cyber crime was seen as a high school “hacker” trying to break into a system to prove his or her computer savvy. What were once regarded as the simple pranks of clever minds have evolved into well- organized criminal activity threatening both world commerce and the In 2010, the Internet served as a trading platform for $10 trillion in ...
Download PDF (80.1 KB)
H.scira Agrawal, PhD is a se nior scientist at Applied Communication Sciences (formerly Telcordia Technologies). He has over twenty years of research experience in software engineering techniques and tools. He is currently leading a U.S. Army CERDEC project on software quality assurance. He Preet B.scharara, J.scD is the United States attorney for the Southern District ...
Download PDF (99.2 KB)
Page Count: 272
Publication Year: 2013