UNITED24 - Make a charitable donation in support of Ukraine!

Homeland Security

Cyber Infrastructure Protection

Cyber Infrastructure Protection - Cover

Edited by Dr. Tarek N. Saadawi, COL Louis H. Jordan Jr.

May 2011

324 Pages

Brief Synopsis

This book provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development, a roadmap for cyber security, and an analysis of technology challenges that impede cyber infrastructure protection. The book is divided into three main parts. Part I deals with strategy and policy issues related to cyber security. It provides a theory of cyberpower, a discussion of Internet survivability as well as large scale data breaches and the role of cyberpower in humanitarian assistance. Part II covers social and legal aspects of cyber infrastructure protection and it provides discussions concernsing the attack dynamics of politically and religiously motivated hackers. Part III discusses the technical aspects of cyber infrastructure protection including the resilience of data centers, intrusion detection, and a strong focus on IP-networks.

Contents

Preface

Chapter 1. Introduction
Tarek Saadawi and Louis Jordan

PART I: STRATEGY AND POLICY ASPECTS

Chapter 2. Developing a Theory of Cyberpower
Stuart H. Starr

Chapter 3. Survivability of the Internet
Michael J. Chumer

Chapter 4. Are L arge Scale Data Breaches Inevitable?
Douglas E. Salane

Chapter 5. The Role of Cyberpower in Humanitarian Assistance/Disaster Relief (HA/DR) and Stability and Reconstruction Operations
Larry Wentz

PART II: SOCIAL AND LEGAL ASPECTS

Chapter 6. The Information Polity: Social and Legal Frameworks for Critical Cyber Infrastructure Protection
Michael M. Losavio, J. Eagle Shutt, and Deborah Wilson Keeling

Chapter 7. The Attack Dynamics of Political and Religiously Motivated Hackers
Thomas J. Holt

PART III: TECHNICAL ASPECTS

Chapter 8. Resilience of Data Centers
Yehia H. Khalil and Adel S. Elmaghraby

Chapter 9. Developing High Fidelity Sensors for Intrusion Activity on Enterprise Networks
Edward Wagner and Anup K. Ghosh

Chapter 10. Voice over IP: Risks, Threats, and Vulnerabilities
Angelos D. Keromytis

Chapter 11. Toward Foolproof IP Network Configuration Assessments
Rajesh Talpade

Chapter 12. On the New Breed of Denial of Service (DoS) Attacks in the Internet
Nirwan Ansari and Amey Shevtekar

About the Contributors


Access Full Report [PDF]: Cyber Infrastructure Protection



NEWSLETTER
Join the GlobalSecurity.org mailing list