Cyber Infrastructure Protection

Edited by Dr. Tarek N. Saadawi, COL Louis H. Jordan Jr.
May 2011
324 Pages
Brief Synopsis
This book provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development, a roadmap for cyber security, and an analysis of technology challenges that impede cyber infrastructure protection. The book is divided into three main parts. Part I deals with strategy and policy issues related to cyber security. It provides a theory of cyberpower, a discussion of Internet survivability as well as large scale data breaches and the role of cyberpower in humanitarian assistance. Part II covers social and legal aspects of cyber infrastructure protection and it provides discussions concernsing the attack dynamics of politically and religiously motivated hackers. Part III discusses the technical aspects of cyber infrastructure protection including the resilience of data centers, intrusion detection, and a strong focus on IP-networks.
Contents
Preface
Chapter 1. Introduction
Tarek Saadawi and Louis Jordan
PART I: STRATEGY AND POLICY ASPECTS
Chapter 2. Developing a Theory of Cyberpower
Stuart H. Starr
Chapter 3. Survivability of the Internet
Michael J. Chumer
Chapter 4. Are L arge Scale Data Breaches Inevitable?
Douglas E. Salane
Chapter 5. The Role of Cyberpower in Humanitarian Assistance/Disaster Relief (HA/DR) and Stability and Reconstruction Operations
Larry Wentz
PART II: SOCIAL AND LEGAL ASPECTS
Chapter 6. The Information Polity: Social and Legal Frameworks for Critical Cyber Infrastructure Protection
Michael M. Losavio, J. Eagle Shutt, and Deborah Wilson Keeling
Chapter 7. The Attack Dynamics of Political and Religiously Motivated Hackers
Thomas J. Holt
PART III: TECHNICAL ASPECTS
Chapter 8. Resilience of Data Centers
Yehia H. Khalil and Adel S. Elmaghraby
Chapter 9. Developing High Fidelity Sensors for Intrusion Activity on Enterprise Networks
Edward Wagner and Anup K. Ghosh
Chapter 10. Voice over IP: Risks, Threats, and Vulnerabilities
Angelos D. Keromytis
Chapter 11. Toward Foolproof IP Network Configuration Assessments
Rajesh Talpade
Chapter 12. On the New Breed of Denial of Service (DoS) Attacks in the Internet
Nirwan Ansari and Amey Shevtekar
About the Contributors
Access Full Report [PDF]: Cyber Infrastructure Protection
NEWSLETTER
|
Join the GlobalSecurity.org mailing list |
|
|