Information Security Science
Measuring the Vulnerability to Data Compromises
- 1st Edition - June 21, 2016
- Author: Carl Young
- Language: English
- Paperback ISBN:9 7 8 - 0 - 1 2 - 8 0 9 6 4 3 - 7
- eBook ISBN:9 7 8 - 0 - 1 2 - 8 0 9 6 4 6 - 8
Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk asso… Read more
Purchase options
Institutional subscription on ScienceDirect
Request a sales quoteInformation Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals.
In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation.
This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.
- Specifies the analytic and scientific methods necessary to estimate the vulnerability to information loss for a spectrum of threats and attack vectors
- Represents a unique treatment of the nexus between physical and information security that includes risk analyses of IT device emanations, visible information, audible information, physical information assets, and virtualized IT environments
- Identifies metrics that point to the root cause of information technology risk and thereby assist security professionals in developing risk management strategies
- Analyzes numerous threat scenarios and specifies countermeasures based on derived quantitative metrics
- Provides chapter introductions and end-of-chapter summaries to enhance the reader’s experience and facilitate an appreciation for key concepts
Information Security professionals and students, Physical Security professionals and students
- Dedication
- Biography
- Foreword
- Preface
- Acknowledgments
- Part I: Threats, risk and risk assessments
- Chapter 1: Information Security Threats and Risk
- Abstract
- Introduction
- Information security risk
- Information security risk assessments
- Organizing information security risk assessments
- General risk factors for the compromise of signals
- Estimating the likelihood component of risk
- Summary
- Chapter 2: Modeling Information Security Risk
- Abstract
- Introduction
- Basic functions and units of measurement
- Linearity and nonlinearity
- Linear, areal, and volumetric density
- Geometry and parametric scaling
- Exponential and logistic growth
- Summary
- Chapter 1: Information Security Threats and Risk
- Part II: Scientific fundamentals
- Chapter 3: Physics and Information Security
- Abstract
- Introduction
- Waves
- Wave energy and power
- Constructive and destructive interference
- Resonance
- Diffraction and lenses
- Antennae and gain
- Point sources of radiating energy
- Summary
- Chapter 4: Electromagnetic Waves
- Abstract
- Introduction
- Electromagnetic fields and flux
- Vectors
- Maxwell’s equations
- Maxwell’s equations and information security
- Summary
- Chapter 5: Noise, Interference, and Emanations
- Abstract
- Introduction
- Thermal noise
- Shot noise
- Emanations and electromagnetic interference
- Radiating circuits
- Circuit element models and electric fields
- Summary
- Chapter 3: Physics and Information Security
- Part III: The compromise of signals
- Chapter 6: Signals and Information Security
- Abstract
- Introduction
- Modulation
- Signal averaging
- Risk factors for signal compromise
- Introduction to information theory
- Information theory and information security
- Summary
- Chapter 7: The Compromise of Electromagnetic Signals
- Abstract
- Introduction
- A naïve attack
- Assumptions on attackers and attack parameters
- Broadband signal detection
- A security limit on emanations
- Anatomy of a remote attack 1: the computer video display interface
- Anatomy of a remote attack 2: keyboard emanations
- Summary
- Chapter 8: Countermeasures to Electromagnetic Signal Compromises
- Abstract
- Introduction
- Electromagnetic shielding
- Magnetic shielding
- Grounding to reduce emanations
- Signal attenuation
- Summary
- Chapter 9: Visual Information Security
- Abstract
- Introduction
- Fundamentals of optics and optical equipment
- The resolution limit
- Optical attacks
- Telescopes
- Summary
- Chapter 10: Audible Information Security
- Abstract
- Introduction
- Audible noise and interference
- The effects of noise and distance
- Audible signal propagation
- Audible signal detection devices
- Audible signal shielding
- Summary
- Chapter 6: Signals and Information Security
- Part IV: Information technology risk
- Chapter 11: Information Technology Risk Factors
- Abstract
- Introduction
- Business practices and organizational culture
- Security governance
- User behavior
- The physical security of information assets
- Information technology implementation
- Information security policies and information technology standards
- Summary
- Chapter 12: Information Technology Risk Measurements and Metrics
- Abstract
- Introduction
- Information security risk measurement and metrics criteria
- Security risk dimensions
- Introduction to spatiotemporal risk measurements
- Spatiotemporal risk measurements and metrics
- Correlation measurements and metrics
- The NIST Cybersecurity Framework
- Summary
- Chapter 13: Special Information Technology Risk Measurements and Metrics
- Abstract
- Introduction
- Metrics for password resilience
- Metrics for network infections: a scale-free model
- Metrics in frequency and time: the Fourier transform
- Metrics to determine the probability of protection
- Metrics for intrusion detection: the Markov process
- Summary
- Chapter 11: Information Technology Risk Factors
- Part V: The physical security of information assets
- Chapter 14: Physical Security Controls
- Abstract
- Introduction
- Authenticating identity
- Verifying authorization
- Assessing affiliation
- Technical surveillance countermeasures
- Summary
- Chapter 15: Data Centers: A Concentration of Information Security Risk
- Abstract
- Introduction
- A (high-level) data center physical security strategy
- The security of virtualization
- An electromagnetic threat to data centers
- Summary
- Chapter 14: Physical Security Controls
- Epilogue
- Appendix A: The Divergence and Curl Operators
- Appendix B: Common Units of Electricity and Magnetism
- Appendix C: Capacitive and Inductive Coupling in Circuits
- Appendix D: Intermediate Frequency (IF) Filtering of Signals
- Appendix E: An Indicative Table of Contents for an Information Security Policy
- Index
- No. of pages: 406
- Language: English
- Edition: 1
- Published: June 21, 2016
- Imprint: Syngress
- Paperback ISBN: 9780128096437
- eBook ISBN: 9780128096468
CY