書籍詳細

書籍詳細




洋書

情報セキュリティの科学

Information Security Science : Measuring the Vulnerability to Data Compromises

Young, Carl

Syngress Media Inc 2016/06
406 p. illustrations ; 24 cm   
装丁: Pap   
版表示など: pap.    装丁について
テキストの言語: ENG    出版国: US
ISBN: 9780128096437
KCN: 1025101774
紀伊國屋書店 選定タイトル
標準価格:¥10,310(本体 ¥9,373)   
Web販売価格あり    Web販売価格について

為替レートの変動や出版社の都合によって、価格が変動する場合がございます。

この商品は提携先の海外出版社在庫からの取り寄せとなります。品切れの場合、恐れ入りますがご了承下さい。

納期について
DDC: 005.8
KDC: F891 セキュリティ一般
ご購入を希望される方は、
下のリンクをクリックしてください。

Annotation

Provides the scientific background, analytic methods, and quantitative metrics to allow scientists and engineers with no background in security to estimate vulnerability to a spectrum of information security threats.

Full Description

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals. In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation. This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.

Table of Contents

Part I: Threats, risk and risk assessments Chapter 1: Information Security Threats and Risk Chapter 2: Modeling Information Security Risk Part II: Scientific fundamentals Chapter 3: Physics and Information Security Chapter 4: Electromagnetic Waves Chapter 5: Noise, Interference, and Emanations Part III: The compromise of signals Chapter 6: Signals and Information Security Chapter 7: The Compromise of Electromagnetic Signals Chapter 8: Countermeasures to Electromagnetic Signal Compromises Chapter 9: Visual Information Security Chapter 10: Audible Information Security Part IV: Information technology risk Chapter 11: Information Technology Risk Factors Chapter 12: Information Technology Risk Measurements and Metrics Chapter 13: Special Information Technology Risk Measurements and Metrics Part V: The physical security of information assets Chapter 14: Physical Security Controls Chapter 15: Data Centers: A Concentration of Information Security Risk