My Account Log in

1 option

Essential cybersecurity science : build, test, and evaluate secure systems / Josiah Dykstra.

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Dykstra, Josiah, author.
Language:
English
Subjects (All):
Computer security.
Cyberterrorism.
Physical Description:
1 online resource (190 p.)
Edition:
First edition.
Other Title:
Build, test, and evaluate secure systems
Place of Publication:
2015.
Sebastopol, CA : O'Reilly, 2015.
Language Note:
English
System Details:
text file
Summary:
If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You’ll learn how to conduct scientific experiments on everyday tools and procedures, whether you’re evaluating corporate security systems, testing your own security product, or looking for bugs in a mobile game.
Contents:
Copyright; Table of Contents; Preface; Who This Book Is For; What This Book Contains; Conventions Used in This Book; Safari® Books Online; How to Contact Us; Disclaimer; Acknowledgments; Chapter 1. Introduction to Cybersecurity Science; What Is Cybersecurity Science?; The Importance of Cybersecurity Science; The Scientific Method; Cybersecurity Theory and Practice; Pseudoscience; Human Factors; Roles Humans Play in Cybersecurity Science; Human Cognitive Biases; The Role of Metrics; Conclusion; References; Chapter 2. Conducting Your Own Cybersecurity Experiments
Asking Good Questions and Formulating HypothesesCreating a Hypothesis; Security and Testability; Designing a Fair Test; Analyzing Your Results; Putting Results to Work; A Checklist for Conducting Experimentation; Conclusion; References; Chapter 3. Cybersecurity Experimentation and Test Environments; Modeling and Simulation; Open Datasets for Testing; Desktop Testing; Cloud Computing; Cybersecurity Testbeds; A Checklist for Selecting an Experimentation and Test Environment; Conclusion; References; Chapter 4. Software Assurance; An Example Scientific Experiment in Software Assurance
Fuzzing for Software AssuranceThe Scientific Method and the Software Development Life Cycle; Adversarial Models; Case Study: The Risk of Software Exploitability; A New Experiment; How to Find More Information; Conclusion; References; Chapter 5. Intrusion Detection and Incident Response; An Example Scientific Experiment in Intrusion Detection; False Positives and False Negatives; Performance, Scalability, and Stress Testing; Case Study: Measuring Snort Detection Performance; Building on Previous Work; A New Experiment; How to Find More Information; Conclusion; References
Chapter 6. Situational Awareness and Data AnalyticsAn Example Scientific Experiment in Situational Awareness; Experimental Results to Assist Human Network Defenders; Machine Learning and Data Mining for Network Monitoring; Case Study: How Quickly Can You Find the Needle in the Haystack?; A New Experiment; How to Find More Information; Conclusion; References; Chapter 7. Cryptography; An Example Scientific Experiment in Cryptography; Experimental Evaluation of Cryptographic Designs and Implementation; Provably Secure Cryptography and Security Assumptions
Cryptographic Security and the Internet of ThingsCase Study: Evaluating Composable Security; Background; A New Experiment; How to Find More Information; Conclusion; References; Chapter 8. Digital Forensics; An Example Scientific Experiment in Digital Forensics; Scientific Validity and the Law; Scientific Reproducibility and Repeatability; Case Study: Scientific Comparison of Forensic Tool Performance; How to Find More Information; Conclusion; References; Chapter 9. Malware Analysis; An Example Scientific Experiment in Malware Analysis
Scientific Data Collection for Simulators and Sandboxes
Notes:
Includes bibliographic references and index.
Includes index.
Description based on online resource; title from PDF title page (ebrary, viewed January 20, 2016).
ISBN:
9781491921067
1491921064
9781491921050
1491921056
9781491921074
1491921072
OCLC:
933387960

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account