Invitation to Cybersecurity

Foreword XV
About this Text XVII
Chapter 1: Introduction 3
1.1 Distanceless 3
1.2 Digital 4
1.3 Dynamic 5
1.4 Conclusion 6
Chapter 2: The Context of Cybersecurity 7
2.1 How Computers Work 7
2.2 Computer Hardware 20
2.3 Computer Sotware 22
2,4 How the Internet Works 32
2.5 The Frontier of Computing 41
2.6 Conclusion 43
Chapter 3: The Adversary of Cypbersecurity 45
3.1 Hackers 45
3.2 Hacking Culture 60
3.3 Conclusion 67
Chapter 4: The Need for Cybersecurity 69
4.1 Cyber Attacks 69
4.2 Cybersecurity Goals 90
4.3 Conclusion 92
Chapter 5: The Approach to Cybersecurity 95
5.1 Cybersecurity Governance 95
5.2 Security Tradeoffs 99
5.3 The Cyber Risk Management Process 102
5.4 Planning for Failures 119
5.5 Conclusion 123
Chapter 6: The Skill of Cybersecurity 125
6.1 Adversarial Thinking Defined 127
6.2 Game Theory 129
6.3 Behavioral Game Theory 139
6.4 Conclusion 145
Chapter 7: The Bedrock of Cybersecurity 147
7.1 Classic Cryptography 148
7.2 Computer Cryptography 159
7.3 Steganography 179
7.4 Principles of Cryptography 183
7.5 Conclusion 186
Chpater 8: The Means of Cybersecurity 187
8.1 Authentication 187
8.2 Authorization 204
8.3 Accounting 212
8.4 Conclusion 217
Chapter 9: The Application of Cybersecurity 219
9.1 Cybersecurity Principles 219
9.2 Practices 236
9.3 Conclusion 256
Chapter 10: The Boundaries of Cybersecurity 257
10.1 Ethics 258
10.2 Rights 267
10.3 Laws 274
10.4 Civil Disobedience 286
10.5 Conclusion 289
Chapter 11: Conclusion 291
Acknowledgments 293
Glossary 295
Bibliography 331
Figure Sources 335
About the Author 337

RkJQdWJsaXNoZXIy MTM4ODY=