Cyber Infrastructure Protection
- Length: 324 pages
- Edition: 1
- Language: English
- Publisher: Strategic Studies Institute
- Publication Date: 2011-05-01
- ISBN-10: 1584874686
- ISBN-13: 9781584874683
- Sales Rank: #7819487 (See Top 100 Books)
Provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development, a roadmap for cyber security, and an analysis of technology challenges that impede cyber infrastructure protection. The book is divided into three main parts. Part I deals with strategy and policy issues related to cyber security. It provides a theory of cyber power, a discussion of Internet survivability as well as large scale data breaches and the role of cyber power in humanitarian assistance. Part II covers social and legal aspects of cyber infrastructure protection and it provides discussions concerning the attack dynamics of politically and religiously motivated hackers. Part III discusses the technical aspects of cyber infrastructure protection including the resilience of data centers, intrusion detection, and a strong focus on IP-networks.
Table of Contents
CHAP 1 – INTRODUCTION by Tarek Saadawi and Louis Jordan
PART I – STRATEGY AND POLICY ASPECTS
CHAP 2 – DEVELOPING A THEORY OF CYBERPOWER
CHAP 3 – SURVIVABILITY OF THE INTERNET
CHAP 4 – ARE LARGE-SCALE DATA BREACHES INEVITABLE?
CHAP 5 – THE ROLE OF CYBERPOWER INHUMANITARIAN ASSISTANCE/DISASTER RELIEF (HA/DR) AND STABILITY AND RECONSTRUCTIONOPERATIONS
PART II: SOCIAL AND LEGAL ASPECTS
CHAP 6 – THE INFORMATION POLITY: SOCIAL AND LEGAL FRAMEWORKS FOR CRITICAL CYBER INFRASTRUCTURE PROTECTION
CHAP 7 – THE ATTACK DYNAMICS OF POLITICA LAND RELIGIOUSLY MOTIVATED HACKERS
PART III: TECHNICAL ASPECTS
CHAP 8 – RESILIENCE OF DATA CENTERS
CHAP 9 – DEVELOPING HIGH FIDELITY SENSORS FOR INTRUSION ACTIVITY ON ENTERPRISE NETWORKS
CHAP 10 – VOICE OVER IP: RISKS, THREATS, AND VULNERABILITIES
CHAP 11 – TOWARD FOOLPROOF IP NETWORK CONFIGURATION ASSESSMENTS
CHAP 12 – ON THE NEW BREED OF DENIAL OF SERVICE (DOS) ATTACKS IN THE INTERNET