I
340
Invitation to Cybersecurity
Foreword
XV
About this Text
XVII
Chapter 1: Introduction
3
1.1 Distanceless
3
1.2 Digital
4
1.3 Dynamic
5
1.4 Conclusion
6
Chapter 2: The Context of Cybersecurity
7
2.1 How Computers Work
7
2.2 Computer Hardware
20
2.3 Computer Sotware
22
2,4 How the Internet Works
32
2.5 The Frontier of Computing
41
2.6 Conclusion
43
Chapter 3: The Adversary of Cypbersecurity
45
3.1 Hackers
45
3.2 Hacking Culture
60
3.3 Conclusion
67
Chapter 4: The Need for Cybersecurity
69
4.1 Cyber Attacks
69
4.2 Cybersecurity Goals
90
4.3 Conclusion
92
Chapter 5: The Approach to Cybersecurity
95
5.1 Cybersecurity Governance
95
5.2 Security Tradeoffs
99
5.3 The Cyber Risk Management Process
102
5.4 Planning for Failures
119
5.5 Conclusion
123
Chapter 6: The Skill of Cybersecurity
125
6.1 Adversarial Thinking Defined
127
6.2 Game Theory
129
6.3 Behavioral Game Theory
139
6.4 Conclusion
145
Chapter 7: The Bedrock of Cybersecurity
147
7.1 Classic Cryptography
148
7.2 Computer Cryptography
159
7.3 Steganography
179
7.4 Principles of Cryptography
183
7.5 Conclusion
186
Chpater 8: The Means of Cybersecurity
187
8.1 Authentication
187
8.2 Authorization
204
8.3 Accounting
212
8.4 Conclusion
217
Chapter 9: The Application of Cybersecurity
219
9.1 Cybersecurity Principles
219
9.2 Practices
236
9.3 Conclusion
256
Chapter 10: The Boundaries of Cybersecurity
257
10.1 Ethics
258
10.2 Rights
267
10.3 Laws
274
10.4 Civil Disobedience
286
10.5 Conclusion
289
Chapter 11: Conclusion
291
Acknowledgments
293
Glossary
295
Bibliography
331
Figure Sources
335
About the Author
337
Made with FlippingBook
RkJQdWJsaXNoZXIy MTM4ODY=