Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises

by Carl Young
ISBN-10:
0128096438
ISBN-13:
9780128096437
Pub. Date:
06/21/2016
Publisher:
Elsevier Science
ISBN-10:
0128096438
ISBN-13:
9780128096437
Pub. Date:
06/21/2016
Publisher:
Elsevier Science
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises

by Carl Young
$69.95
Current price is , Original price is $69.95. You
$69.95 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Overview

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals.

In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation.

This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.


Product Details

ISBN-13: 9780128096437
Publisher: Elsevier Science
Publication date: 06/21/2016
Pages: 406
Product dimensions: 7.40(w) x 9.20(h) x 0.40(d)

About the Author

Carl S. Young is a recognized subject matter expert in information and physical security risk management. He is currently a Managing Director and the Chief Security Officer at Stroz Friedberg, an international security risk consulting firm. He is the former Global Head of Physical Security Technology at Goldman Sachs as well as a former Senior Executive and Supervisory Special Agent at the FBI. He was also a consultant to the JASON Defense Advisory Group. Mr. Young is the author of Metrics and Methods for Security Risk Management (Syngress, 2010), and The Science and Technology of Counterterrorism (Butterworth-Heinemann, 2014) as well as numerous journal publications. In 1997 he was awarded the President’s Foreign Intelligence Advisory Board (PFIAB) James R. Killian Award by the White House for significant individual contributions to U.S. national security. Mr. Young received undergraduate and graduate degrees in mathematics and physics from the Massachusetts Institute of Technology.

Table of Contents

Part I: Threats, risk and risk assessments

Chapter 1: Information Security Threats and Risk

Chapter 2: Modeling Information Security Risk

Part II: Scientific fundamentals

Chapter 3: Physics and Information Security

Chapter 4: Electromagnetic Waves

Chapter 5: Noise, Interference, and Emanations

Part III: The compromise of signals

Chapter 6: Signals and Information Security

Chapter 7: The Compromise of Electromagnetic Signals

Chapter 8: Countermeasures to Electromagnetic Signal Compromises

Chapter 9: Visual Information Security

Chapter 10: Audible Information Security

Part IV: Information technology risk

Chapter 11: Information Technology Risk Factors

Chapter 12: Information Technology Risk Measurements and Metrics

Chapter 13: Special Information Technology Risk Measurements and Metrics

Part V: The physical security of information assets

Chapter 14: Physical Security Controls

Chapter 15: Data Centers: A Concentration of Information Security Risk

What People are Saying About This

From the Publisher

Provides the scientific background, analytic methods, and quantitative metrics to allow scientists and engineers with no background in security to estimate vulnerability to a spectrum of information security threats

From the B&N Reads Blog

Customer Reviews