1 option
Essential cybersecurity science : build, test, and evaluate secure systems / Josiah Dykstra.
- Format:
- Book
- Author/Creator:
- Dykstra, Josiah, author.
- Language:
- English
- Subjects (All):
- Computer security.
- Cyberterrorism.
- Physical Description:
- 1 online resource (190 p.)
- Edition:
- First edition.
- Other Title:
- Build, test, and evaluate secure systems
- Place of Publication:
- 2015.
- Sebastopol, CA : O'Reilly, 2015.
- Language Note:
- English
- System Details:
- text file
- Summary:
- If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You’ll learn how to conduct scientific experiments on everyday tools and procedures, whether you’re evaluating corporate security systems, testing your own security product, or looking for bugs in a mobile game.
- Contents:
- Copyright; Table of Contents; Preface; Who This Book Is For; What This Book Contains; Conventions Used in This Book; Safari® Books Online; How to Contact Us; Disclaimer; Acknowledgments; Chapter 1. Introduction to Cybersecurity Science; What Is Cybersecurity Science?; The Importance of Cybersecurity Science; The Scientific Method; Cybersecurity Theory and Practice; Pseudoscience; Human Factors; Roles Humans Play in Cybersecurity Science; Human Cognitive Biases; The Role of Metrics; Conclusion; References; Chapter 2. Conducting Your Own Cybersecurity Experiments
- Asking Good Questions and Formulating HypothesesCreating a Hypothesis; Security and Testability; Designing a Fair Test; Analyzing Your Results; Putting Results to Work; A Checklist for Conducting Experimentation; Conclusion; References; Chapter 3. Cybersecurity Experimentation and Test Environments; Modeling and Simulation; Open Datasets for Testing; Desktop Testing; Cloud Computing; Cybersecurity Testbeds; A Checklist for Selecting an Experimentation and Test Environment; Conclusion; References; Chapter 4. Software Assurance; An Example Scientific Experiment in Software Assurance
- Fuzzing for Software AssuranceThe Scientific Method and the Software Development Life Cycle; Adversarial Models; Case Study: The Risk of Software Exploitability; A New Experiment; How to Find More Information; Conclusion; References; Chapter 5. Intrusion Detection and Incident Response; An Example Scientific Experiment in Intrusion Detection; False Positives and False Negatives; Performance, Scalability, and Stress Testing; Case Study: Measuring Snort Detection Performance; Building on Previous Work; A New Experiment; How to Find More Information; Conclusion; References
- Chapter 6. Situational Awareness and Data AnalyticsAn Example Scientific Experiment in Situational Awareness; Experimental Results to Assist Human Network Defenders; Machine Learning and Data Mining for Network Monitoring; Case Study: How Quickly Can You Find the Needle in the Haystack?; A New Experiment; How to Find More Information; Conclusion; References; Chapter 7. Cryptography; An Example Scientific Experiment in Cryptography; Experimental Evaluation of Cryptographic Designs and Implementation; Provably Secure Cryptography and Security Assumptions
- Cryptographic Security and the Internet of ThingsCase Study: Evaluating Composable Security; Background; A New Experiment; How to Find More Information; Conclusion; References; Chapter 8. Digital Forensics; An Example Scientific Experiment in Digital Forensics; Scientific Validity and the Law; Scientific Reproducibility and Repeatability; Case Study: Scientific Comparison of Forensic Tool Performance; How to Find More Information; Conclusion; References; Chapter 9. Malware Analysis; An Example Scientific Experiment in Malware Analysis
- Scientific Data Collection for Simulators and Sandboxes
- Notes:
- Includes bibliographic references and index.
- Includes index.
- Description based on online resource; title from PDF title page (ebrary, viewed January 20, 2016).
- ISBN:
- 9781491921067
- 1491921064
- 9781491921050
- 1491921056
- 9781491921074
- 1491921072
- OCLC:
- 933387960
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.