Custom cover image
Custom cover image

Security 2020 : reduce security risks this decade / Doug Howard; Kevin Prince

By: Contributor(s): Resource type: Ressourcentyp: Buch (Online)Book (Online)Language: English Publisher: Indianapolis, IN : Wiley Pub, c2011Edition: Online-AusgDescription: Online-Ressource (1 online resource (xxvi, 305 p.)) : ill., mapISBN:
  • 9781282944138
  • 1282944134
  • 9781118008331
Subject(s): Additional physical formats: 9780470639559 | 0470639555 | 9781118008331 | Erscheint auch als: Security 2020. Druck-Ausgabe Hoboken, NJ [u.a.] : Wiley, 2011. XXVI. 305 S.DDC classification:
  • 005.8
RVK: RVK: ST 277LOC classification:
  • QA76.9.A25
Online resources: Summary: Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond. IT security needs are constantly evolving; this guide examines what history has taught us and predicts future concerns Points out the differences between artificial concerns and solutions and the very real threats to new technology, with startling real-world scenarios Provides knowledge needed to cope with emerging dangers and offers opinions and input from more than 20 noteworthy CIOs and business executives Gives you insight to not only what these industry experts believe, but also what over 20 of their peers believe and predict as well With a foreword by security expert Bruce Schneier, Security 2020: Reduce Security Risks This Decade supplies a roadmap to real IT security for the coming decade and beyond.Summary: Intro -- Security 2020 -- Contents -- Foreword -- Introduction -- Chapter 1 What Has History Shown Us? -- The History of Data Breach Disclosure -- The History of Vulnerability Exploits -- The History of Viruses and Worms -- The History of Edge-Based Security -- The History of Patching -- Hacker Methodologies -- Inbound Attacks -- The History of Malware -- Automated Attacks -- The History of Hacker Motivation -- The History of Botnets -- The History of Search Engine Hacking -- The History of Data Loss -- The History of Security Solutions -- The Making of a Cyber-Super-Villain -- The Botnet in Action -- Hindsight is NOT 20/20 -- Chapter 2 External Influences on Security -- Information Security Drivers -- The Emotions -- World Events -- The Impact of Politics -- The Impact on Journalism -- The Social Engineer -- GRC -- Litigation -- Breach Impact on Public Companies -- The Security Culture -- The Path to 2020 -- Chapter 3 Technology Influences on Security -- The Movement Toward National Identity Management -- Internet Protocol in 2020 -- 2020: Remote Access Continues to Be a Problem -- The Search Engine Impact -- The Web Services Impact -- The Impact of Virtualization -- The Malware Problem -- The Web Browser -- The Portable Media Debacle, A.K.A. Mobility -- Advanced Persistent Threat in 2020 -- The Network Edge -- The Security Software Vendor -- Personal Information and Data Correlation -- The Domain Name -- Chapter 4 Where Security Threats Will Come from in the Future -- Spam -- Botnets -- The Ph-enomenon: Why so many attack methods start with "Ph" -- Phishing, Pharming, SMSishing, Vishing -- Vulnerability Exploits -- Insider Threats -- Mobility Threats -- Infected Software -- Peer-to-Peer (P2P) Software -- Third-Party Threats -- Social Networking Threats -- Digitization -- Star Wars -- Infrastructure Attacks -- Social and Financial Threats.PPN: PPN: 807325074Package identifier: Produktsigel: ZDB-26-MYL | ZDB-30-PAD | ZDB-30-PQE
No physical items for this record