Cyber Attacks, Student Edition, offers a technical, architectural, and management approach to solving the problems of protecting national infrastructure. This approach includes controversial themes such as the deliberate use of deception to trap intruders. This volume thus serves as an attractive framework for a new national strategy for cyber security. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment.
In this edition, each principle is presented as a separate security strategy and illustrated with compelling examples. The book adds 50-75 pages of new material aimed specifically at enhancing the student experience and making it more attractive for instructors teaching courses such as cyber security, information security, digital security, national security, intelligence studies, technology and infrastructure protection. It now also features case studies illustrating actual implementation scenarios of the principles and requirements discussed in the text, along with a host of new pedagogical elements, including chapter outlines, chapter summaries, learning checklists, and a 2-color interior. Furthermore, a new and complete ancillary package includes test bank, lesson plans, PowerPoint slides, case study questions, and more.
This text is intended for security practitioners and military personnel as well as for students wishing to become security engineers, network operators, software designers, technology managers, application developers, etc.
Key Features
- Provides case studies focusing on cyber security challenges and solutions to display how theory, research, and methods, apply to real-life challenges
- Utilizes, end-of-chapter case problems that take chapter content and relate it to real security situations and issues
- Includes instructor slides for each chapter as well as an instructor’s manual with sample syllabi and test bank
Preface
Acknowledgments
1. Introduction
National Cyber Threats, Vulnerabilities, and Attacks
Botnet Threat
National Cyber Security Methodology Components
Deception
Separation
Diversity
Consistency
Depth
Discretion
Collection
Correlation
Awareness
Response
Implementing the Principles Nationally
Protecting the Critical National Infrastructure Against Cyber Attacks
Summary
Chapter Review Questions/Exercises
2. Deception
Scanning Stage
Deliberately Open Ports
Discovery Stage
Deceptive Documents
Exploitation Stage
Procurement Tricks
Exposing Stage
Interfaces Between Humans and Computers
National Deception Program
The Deception Planning Process Against Cyber Attacks
Summary
Chapter Review Questions/Exercises
3. Separation
What Is Separation?
Functional Separation
National Infrastructure Firewalls
DDOS Filtering
SCADA Separation Architecture
Physical Separation
Insider Separation
Asset Separation
Multilevel Security (MLS)
Protecting the Critical National Infrastructure Through Use of Separation
Summary
Chapter Review Questions/Exercises
4. Diversity
Diversity and Worm Propagation
Desktop Computer System Diversity
Diversity Paradox of Cloud Computing
Network Technology Diversity
Physical Diversity
National Diversity Program
Critical Infrastructure Resilience and Diversity Initiative
Summary
Chapter Review Questions/Exercises
5. Commonality
Meaningful Best Practices for Infrastructure Protection
Locally Relevant and Appropriate Security Policy
Culture of Security Protection
Infrastructure Simplification
Certification and Education
Career Path and Reward Structure
Responsible Past Security Practice
National Commonality Program
How Critical National Infrastructure Systems Demonstrate Commonality
Summary
Chapter Review Questions/Exercises
6. Depth
Effectiveness of Depth
Layered Authentication
Layered E-Mail Virus and Spam Protection
Layered Access Controls
Layered Encryption
Layered Intrusion Detection
National Program of Depth
Practical Ways for Achieving Information Assurance in Infrastructure Networked Environments
Summary
Chapter Review Questions/Exercises
7. Discretion
Trusted Computing Base
Security Through Obscurity
Information Sharing
Information Reconnaissance
Obscurity Layers
Organizational Compartments
National Discretion Program
Top-Down and Bottom-Up Sharing of Sensitive Information
Summary
Chapter Review Questions/Exercises
8. Collection
Collecting Network Data
Collecting System Data
Security Information and Event Management
Large-Scale Trending
Tracking a Worm
National Collection Program
Data Collection Efforts: Systems and Assets
Summary
Chapter Review Questions/Exercises
9. Correlation
Conventional Security Correlation Methods
Quality and Reliability Issues in Data Correlation
Correlating Data to Detect a Worm
Correlating Data to Detect a Botnet
Large-Scale Correlation Process
National Correlation Program
Correlation Rules for Critical National Infrastructure Cyber Security
Summary
Chapter Review Questions/Exercises
10. Awareness
Detecting Infrastructure Attacks
Managing Vulnerability Information
Cyber Security Intelligence Reports
Risk Management Process
Security Operations Centers
National Awareness Program
Connecting Current Cyber Security Operation Centers to Enhance Situational Awareness
Summary
Chapter Review Questions/Exercises
11. Response
Pre- Versus Post-Attack Response
Indications and Warning
Incident Response Teams
Forensic Analysis
Law Enforcement Issues
Disaster Recovery
National Response Program
The Critical National Infrastructure Incident Response Framework
Transitioning from NIPP Steady State to Incident Response Management
Summary
Chapter Review Questions/Exercises
APPENDIX A. National Infrastructure Protection Criteria
Deception Requirements
Separation Requirements
Commonality Requirements
Diversity Requirements
Depth Requirements
Response Requirements
Awareness Requirements
Discretion Requirements
Collection Requirements
Correlation Requirements
APPENDIX B. Case Studies
John R. Vacca
Case Study 1: Cyber Storm
Case Study 2: Cyber Attacks on Critical Infrastructures—A Risk to the Nation
Case Study 3: Department of Homeland Security Battle Insider Threats and Maintain National Cyber Security
Case Study 4: Cyber Security Development Life Cycle
Case Study 5
REVIEW. Answers to Review Questions/Exercises, Hands-On Projects, Case Projects, and Optional Team Case Projects by Chapter
Chapter 1: Introduction
Chapter 2: Deception
Chapter 3: Separation
Chapter 4: Diversity
Chapter 5: Commonality
Chapter 6: Depth
Chapter 7: Discretion
Chapter 8: Collection
Chapter 9: Correlation
Chapter 10: Awareness
Chapter 11: Response
Index
- Amoroso, Cyber Attacks: Protection National Infrastructure, 9780123849175, 248pp, Nov 2010, BH, $59.95
- Clarke, Cyber Warfare, 9780061962233, 304pp., Apr 2010, Harper-Collins, $26.00
- Default.aspx
- How_to_use_Respondus.doc
- How_to_use_Respondus_Elsevier_9780123918550.doc
- IM
- Chapter_01_Instructor_Manual.doc
- Chapter_02_Instructor_Manual.doc
- Chapter_03_Instructor_Manual.doc
- Chapter_04_Instructor_Manual.doc
- Chapter_05_Instructor_Manual.doc
- Chapter_06_Instructor_Manual.doc
- Chapter_07_Instructor_Manual.doc
- Chapter_08_Instructor_Manual.doc
- Chapter_09_Instructor_Manual.doc
- Chapter_10_Instructor_Manual.doc
- Chapter_11_Instructor_Manual.doc
- Instructor_Manual_Preface.doc
- LP
- CyberAttacks_1e_Chapter01_Lesson_Plan.doc
- CyberAttacks_1e_Chapter02_Lesson_Plan.doc
- CyberAttacks_1e_Chapter03_Lesson_Plan.doc
- CyberAttacks_1e_Chapter04_Lesson_Plan.doc
- CyberAttacks_1e_Chapter05_Lesson_Plan.doc
- CyberAttacks_1e_Chapter06_Lesson_Plan.doc
- CyberAttacks_1e_Chapter07_Lesson_Plan.doc
- CyberAttacks_1e_Chapter08_Lesson_Plan.doc
- CyberAttacks_1e_Chapter09_Lesson_Plan.doc
- CyberAttacks_1e_Chapter10_Lesson_Plan.doc
- CyberAttacks_1e_Chapter11_Lesson_Plan.doc
- PPT
- Cyber_Attacks_Chapter01_PowerPoint_Lecture_Slides.ppt
- Cyber_Attacks_Chapter02_PowerPoint_Lecture_Slides.ppt
- Cyber_Attacks_Chapter03_PowerPoint_Lecture_Slides.ppt
- Cyber_Attacks_Chapter04_PowerPoint_Lecture_Slides.ppt
- Cyber_Attacks_Chapter05_PowerPoint_Lecture_Slides.ppt
- Cyber_Attacks_Chapter06_PowerPoint_Lecture_Slides.ppt
- Cyber_Attacks_Chapter07_PowerPoint_Lecture_Slides.ppt
- Cyber_Attacks_Chapter08_PowerPoint_Lecture_Slides.ppt
- Cyber_Attacks_Chapter09_PowerPoint_Lecture_Slides.ppt
- Cyber_Attacks_Chapter10_PowerPoint_Lecture_Slides.ppt
- Cyber_Attacks_Chapter11_PowerPoint_Lecture_Slides.ppt
- TB
- default.asp
- intro.xml
- old_intro.xml
Security practitioners, military personnel