We cannot verify your location
Browse Book and Journal Content on Project MUSE
OR
title

Advances in Cyber Security

Technology, Operation, and Experiences

D. Frank Hsu

Publication Year: 2013

As you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect yourselves from this threat.The world's foremost cyber security experts, from Ruby Lee, Ph.D., the Forrest G. Hamrick professor of engineering and Director of the Princeton Architecture Laboratory for Multimedia and Security (PALMS) at Princeton University; to Nick Mankovich, Chief Information Security Officer of Royal Philips Electronics; to FBI Director Robert S. Mueller III; to Special Assistant to the President Howard A. Schmidt, share critical practical knowledge on how the cyberspace ecosystem is structured, how it functions, and what we can do to protect it and ourselves fromattack and exploitation.The proliferation of social networking and advancement of information technology provide endless benefits in our living and working environments. However, these benefits also bring horrors in various forms of cyber threats andexploitations. Advances in Cyber Security collects the wisdom of cyber security professionals and practitioners from government, academia, and industry across national and international boundaries to provide ways and means to secure and sustain the cyberspace ecosystem. Readers are given a first-hand look at critical intelligence on cybercrime and security--including details of real-life operations. The vast, useful knowledge and experience shared in this essential new volume enables cyber citizens and cyber professionals alike to conceive novel ideasand construct feasible and practical solutions for defending against all kinds of adversaries and attacks.Among the many important topics covered in this collection are building a secure cyberspace ecosystem; public-private partnership to secure cyberspace; operation and law enforcement to protect our cyber citizens and to safeguard our cyber infrastructure; and strategy and policy issues to secure and sustain our cyber ecosystem.

Published by: Fordham University Press

Title Page, Copyright

pdf iconDownload PDF (79.7 KB)
pp. i-iv

Contents

pdf iconDownload PDF (80.2 KB)
pp. v-vi

Figures

pdf iconDownload PDF (88.0 KB)
pp. vii-viii

read more

Preface

pdf iconDownload PDF (103.8 KB)
pp. ix-xiv

The advent of network and digital information technologies has ushered in a myriad of new and diverse opportunities in our lives and at our jobs. Cutting-edge technologies have transformed the information society into a vibrant cyber- physical- natural ecosystem. However, these same technologies are being used by adversaries in a variety of attacks and exploitations ...

read more

Building a Secure and Sustainable Cyberspace Ecosystem:An Overview

pdf iconDownload PDF (818.8 KB)
pp. 1-34

This overview provides a historical and contemporary perspective on various issues pertaining to the security and sustainability of the emerging cyberspace, which is embedded with intelligent networking sensors and systems, as well as information technology appliances and services. In particular, it explores how to build a secure and sustainable cyberspace...

Part I: Technology

read more

Improving Cyber Security

pdf iconDownload PDF (666.1 KB)
pp. 37-59

Cyber security is essential given our growing dependence on cyberspace for all aspects of modern societies. However, today, attackers have the up-per hand. In this chapter, I discuss the security properties needed, and some key strategies that may have the potential to level the playing field between attackers and defenders. These research strategies were developed ...

read more

Practical Vulnerabilities of the Tor Anonymity Network

pdf iconDownload PDF (1.2 MB)
pp. 60-73

Onion routing is a technology designed at the U.S. Naval Research Laboratory to protect the security and privacy of network communications. In particular, Tor, the current widely- used onion routing system, was originally designed to protect intelligence gathering from open sources and to otherwise protect military communications over insecure or public ...

read more

Defending Software Systems against Cyber Attacksthroughout Their Lifecycle

pdf iconDownload PDF (892.2 KB)
pp. 74-89

Malware usually enters a distributed software system along three avenues. First, it may be hidden surreptitiously within application code by a malicious developer. Examples of malicious code include Trojan horses, back-doors, and logic bombs. This code can be triggered by the developer or his accomplices—after the application has been deployed in the field— using ...

read more

Improve Availability of Networks: Internet Exchange Pointsand Their Role in Cyberspace

pdf iconDownload PDF (436.5 KB)
pp. 90-106

The Internet could not exist without Internet exchange points (IXPs). The concept of IXPs was developed in the early 1990s, and IXPs have continued to grow in quantity, location, and size (traffic volume) as the Internet has grown. There are, however, very few books or papers written about IXPs. Knowledge of IXPs has long been confined to industry experts. In this ...

Part II: Operations

read more

Tor: Uses and Limitations of Online Anonymity

pdf iconDownload PDF (132.4 KB)
pp. 109-120

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built- in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks ...

read more

Authoritative Data Sources:Cyber Security Intelligence Perspectives

pdf iconDownload PDF (204.6 KB)
pp. 121-138

Many reports indicate that the United States currently faces a multifaceted, technologically based vulnerability. Our information systems are being exploited on an unprece dented scale by state and non- state actors, resulting in a dangerous combination of known and unknown vulnerabilities, strong adversary capabilities, and weak situational awareness. Many cyber security ...

read more

The Evolving Consumer Online Threat Landscape:Creating an Effective Response

pdf iconDownload PDF (106.8 KB)
pp. 139-145

The proliferation of Internet- connected devices in the consumer market has created a dramatic shift from a single point PC- based threat risk to an expanded threat perimeter that includes tablet devices, smartphones, and Internet- connected televisions. Consumer home network growth now re-quires security for a consumer’s entire digital lifestyle and not just a ...

read more

Partners in Cybercrime

pdf iconDownload PDF (437.5 KB)
pp. 146-170

Hijacked online banking sessions, theft of credit card data, virus infections, spam . . . living in the age of the world wide web implies that we are all vulnerable to cybercrime— crime committed using mainly computerized means [21]. In the 1990s, cybercrime primarily seemed to be the do-main of computer savvy youngsters motivated by recognition for their ...

Part III: Experiences

read more

Securing IT Networks Incorporating Medical Devices:Risk Management and Compliance inHealth Care Cyber Security

pdf iconDownload PDF (224.5 KB)
pp. 173-187

The U.S. health care sector continues to grow, even in a difficult economic climate. In 2009, health care accounted for 17.3 percent of the gross domes-tic product [2]. The medical technology industry in the United States ac-counted for 6 percent of the total health care industry revenue in 2008 [22]. The U.S. Department of Homeland Security has identified the Healthcare ...

read more

Computer Forensics from a Law Enforcement Perspective

pdf iconDownload PDF (134.9 KB)
pp. 188-199

Computerized information has become an integral part of our everyday lives as it has created a new perspective, almost a parallel virtual world that reflects our own physical world. This cyber world is abundant with evidence, especially when it comes to combating, investigating, and solving almost any crime, not just crimes committed with the assistance of com-...

read more

Computer Crime Incidents and Responses in the Private Sector

pdf iconDownload PDF (103.6 KB)
pp. 200-206

Companies can fall victim to various types of computer crime and accidental incidents. One type of incident is a data breach in which information a company has in its possession is stolen or in some way improperly released. An obvious example we have all read about is the theft of individual social security account numbers (SSANs) or credit card numbers. There are other ...

read more

Information Technology for aSafe and Secure Society in Japan:Toward a Cyber- Physical Solution

pdf iconDownload PDF (648.5 KB)
pp. 207-218

This chapter introduces the topic of information technology for a safe and secure society in Japan, showing an emerging trend toward a cyber-physical solution. Notable security incidents in the United States and Japan, and the Japanese national strategy for information security, are discussed first, fol-lowed by a discussion of emerging security technologies in Japan (such as a ...

Part IV: Partnership, Policy, and Sustainability

read more

Public- Private Partnerships Changing the World

pdf iconDownload PDF (95.6 KB)
pp. 221-225

In 1961, United States President John F. Kennedy captivated the imagination of our nation when he announced before a joint session of Congress that “this nation should commit itself to achieving the goal, before the decade is out, of landing a man on the moon and returning him safely to the earth” [1]. NASA had yet to send a man into orbit to travel around the ...

read more

Cyber Security: Protecting Our Cyber Citizens

pdf iconDownload PDF (116.3 KB)
pp. 226-234

We all recognize the importance of using every law enforcement tool at our disposal to combat threats to our cyber security. Computer networks— including the biggest one of all, the Internet— are crucial infrastructures We in the Southern District of New York are critically aware of this. You need look no further than Wall Street, the nation’s vital financial in-...

read more

Cyber Security: Safeguarding Our Cyberspace

pdf iconDownload PDF (99.4 KB)
pp. 235-240

We live in a wired world. Our networks help us to stay in touch with family and friends, collaborate with colleagues worldwide, and shop for every-thing from books to houses. They help us manage our finances and make businesses and government more efficient. But our reliance on these net-works also makes us vulnerable. Criminals can use the Internet to commit ...

read more

Cyber Security: Securing Our Cyber Ecosystem

pdf iconDownload PDF (88.2 KB)
pp. 241-244

More than a decade ago, cyber crime was seen as a high school “hacker” trying to break into a system to prove his or her computer savvy. What were once regarded as the simple pranks of clever minds have evolved into well- organized criminal activity threatening both world commerce and the In 2010, the Internet served as a trading platform for $10 trillion in ...

read more

Contributors

pdf iconDownload PDF (80.1 KB)
pp. 245-250

H.scira Agrawal, PhD is a se nior scientist at Applied Communication Sciences (formerly Telcordia Technologies). He has over twenty years of research experience in software engineering techniques and tools. He is currently leading a U.S. Army CERDEC project on software quality assurance. He Preet B.scharara, J.scD is the United States attorney for the Southern District ...

Index

pdf iconDownload PDF (99.2 KB)
pp. 251-258


E-ISBN-13: 9780823250325
Print-ISBN-13: 9780823244560
Print-ISBN-10: 0823244563

Page Count: 272
Publication Year: 2013

Edition: Text