This groundbreaking new work discusses the growing vulnerabilities and the importance of protecting digital information. It explains how and why attacks occur and shows you how to prevent and detect future attacks.

Secure your network against cyber spies

Protect your systems and assets against the everything from computer viruses to the directed threats of hackers, criminals, competitors and infoterroristas. In Defending Your Digital Assets, expert authors Randall K. Nichols, Daniel J. Ryan, and Julie J. C. H. Ryan give you the latest information on handling identification, authentication, and authorization, from cryptography to access control with passwords, tokens, and biometrics. You're shown how to develop frameworks for secure e-commerce and implement virtual private networks. You learn:

  • How to evaluate your network for vulnerabilities and holes, and how to plug them
  • What to do once the network has been attacked, and how to react, establishing security emergency response teams, network triage, and backup capability
  • How to protect against future attacks
  • And much, much more

Part I: Digital Espionage, Warfare and Information Security (INFOSEC)
Chapter 1: Introduction to Digital Espionage
Chapter 2: Foundations of Information Security (INFOSEC)
Part II: Infosec Concepts
Chapter 3: Risk Management and Architecture of Information Security (INFOSEC)
Chapter 4: Information Security Policy
Chapter 5: Privacy in a Knowledge-Based Economy
Chapter 6: Security Verification of Systems and Networks
Part III: Practical Countermeasures
Chapter 7: Cryptography
Chapter 8: Access Controls--Two Views
Chapter 9: Digital Signatures and Certification Authorities--Technology, Policy, and Legal Issues
Chapter 10: Permissions Management: Identification, Authentication, and Authorization (PMIAA)
Chapter 11: Virtual Private Networks
Chapter 12: Biometric Countermeasures
Part IV: Enterprise Continuity Planning
Chapter 13: Before the Attack: Protect and Detect
Chapter 14: During and After the Attack--Special Consideration--The Web Server
Part V: Order of Battle
Chapter 15: The Big Picture
Chapter 16: Information Warfare
Chapter 17: Information Warfare Weapons, Intelligence, and the Cyberspace Environment
Chapter 18: Methods of Employment
Chapter 19: Public Key Infrastructure: Building Trust Online
Chapter 20: Cryptography Politics: Encryption Export Law and Its Impact on US Industry