ABSTRACT

This handbook covers the ten domains of the Information Security Common Body of Knowledge. It is designed to empower the security professional and the chief information officer with information such that they can do their duty, protect the information assets of their organizations.

part I|2 pages

Access Control Systems and Methodology

chapter 2|8 pages

Biometrics: What is New?

chapter 4|14 pages

Privacy in the Healthcare Industry

chapter 5|8 pages

The Case for Privacy

chapter 6|24 pages

Biometric Identification

chapter 7|29 pages

Single Sign-On for the Enterprise

chapter 10|19 pages

Hacker Tools and Techniques

chapter 11|16 pages

A New Breed of Hacker Tools and Defenses

chapter 14|19 pages

Counter-Economic Espionage

chapter 15|17 pages

Penetration Testing

chapter 16|7 pages

Penetration Testing

part II|3 pages

TELECOMMUNICATIONS, NETWORK, AND INTERNET SECURITY

chapter 17|18 pages

Understanding SSL

chapter 18|25 pages

Packet Sniffers and Network Monitors

chapter 20|26 pages

Security and Network Technologies

chapter 22|13 pages

Network Router Security

chapter 23|12 pages

What's Not So Simple About SNMP?

chapter 25|10 pages

Security and the Physical Network Layer

chapter 26|14 pages

Security of Wireless Local Area Networks

chapter 27|14 pages

Securing Wireless Networks

chapter 29|19 pages

Wireless LAN Security Challenge

chapter 32|33 pages

IPSec Virtual Private Networks

chapter 35|15 pages

Extranet Access Control Issues

chapter 39|11 pages

An Introduction to IPSec

chapter 42|13 pages

Comparing Firewall Technologies

chapter 43|22 pages

The (In)Security of Virtual Private Networks

chapter 45|17 pages

Leveraging Virtual Private Networks

chapter 46|7 pages

Wireless LAN Security

chapter 48|9 pages

New Perspectives on VPNs

chapter 49|26 pages

An Examination of Firewall Architectures

chapter 51|14 pages

Voice Security

chapter 52|17 pages

Secure Voice Communications (VoI)

chapter 53|14 pages

Packet Sniffers: Use and Misuse

part III|2 pages

INFORMATION SECURITY MANAGEMENT

chapter 55|20 pages

The Human Side of Information Security

chapter 56|11 pages

Security Management

chapter 57|6 pages

Measuring ROI on Security

chapter 58|11 pages

Security Patch Management

chapter 61|19 pages

A Matter of Trust

chapter 62|13 pages

Trust Governance in a Web Services World

chapter 63|11 pages

Risk-Management and Analysis

chapter 67|36 pages

Risk Analysis and Assessment

chapter 68|11 pages

Security Assessment

chapter 70|28 pages

A Progress Report on the CVE Initiative

chapter 74|11 pages

Ownership and Custody of Data

chapter 75|15 pages

Hiring Ex-Criminal Hackers

chapter 77|29 pages

Policy Development

chapter 80|12 pages

A Look at the Common Criteria

chapter 83|17 pages

Making Security Awareness Happen

chapter 89|17 pages

Outsourcing Security

part IV|1 pages

APPLICATION PROGRAM SECURITY

chapter 91|15 pages

Web Application Security

chapter 93|11 pages

XML and Information Security

chapter 94|8 pages

Application Security

chapter 95|10 pages

Covert Channels

chapter 97|28 pages

Open Source Versus Closed Source

chapter 102|22 pages

Certification and Accreditation Methodology

chapter 105|9 pages

A Look at Java Security

chapter 106|45 pages

Malware and Computer Viruses

part V|2 pages

Cryptography

chapter 110|19 pages

Message Authentication

chapter 111|8 pages

Stegnography: The Art of Hiding Messages

chapter 112|23 pages

An Introduction to Cryptography

chapter 117|16 pages

PKI Registration

chapter 118|73 pages

Implementing Kerberos in Distributed Systems

part VI|3 pages

Enterprise Security Architecture

part IX|1 pages

LAW, INVESTIGATION, AND ETHICS

chapter 141|11 pages

Jurisdiction Issues in Global Transmissions

chapter 147|8 pages

Operational Forensics

chapter 148|5 pages

What Happened?

chapter 149|25 pages

The International Dimensions of Cyber-Crime

chapter 150|8 pages

Honeypot Essentials

chapter 151|19 pages

CIRT: Responding to Attack

chapter 152|15 pages

Incident Response Management

chapter 155|13 pages

Incident Response Exercises

chapter 156|20 pages

Software Forensics

chapter 157|14 pages

Ethics and the Internet