Essential cybersecurity science build, test, and evaluate secure systems

If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You’ll learn how to conduct scientific experiments on eve...

Descripción completa

Detalles Bibliográficos
Otros Autores: Dykstra, Josiah, author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly 2015.
2015.
Edición:First edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629668706719
Tabla de Contenidos:
  • Copyright; Table of Contents; Preface; Who This Book Is For; What This Book Contains; Conventions Used in This Book; Safari® Books Online; How to Contact Us; Disclaimer; Acknowledgments; Chapter 1. Introduction to Cybersecurity Science; What Is Cybersecurity Science?; The Importance of Cybersecurity Science; The Scientific Method; Cybersecurity Theory and Practice; Pseudoscience; Human Factors; Roles Humans Play in Cybersecurity Science; Human Cognitive Biases; The Role of Metrics; Conclusion; References; Chapter 2. Conducting Your Own Cybersecurity Experiments
  • Asking Good Questions and Formulating HypothesesCreating a Hypothesis; Security and Testability; Designing a Fair Test; Analyzing Your Results; Putting Results to Work; A Checklist for Conducting Experimentation; Conclusion; References; Chapter 3. Cybersecurity Experimentation and Test Environments; Modeling and Simulation; Open Datasets for Testing; Desktop Testing; Cloud Computing; Cybersecurity Testbeds; A Checklist for Selecting an Experimentation and Test Environment; Conclusion; References; Chapter 4. Software Assurance; An Example Scientific Experiment in Software Assurance
  • Fuzzing for Software AssuranceThe Scientific Method and the Software Development Life Cycle; Adversarial Models; Case Study: The Risk of Software Exploitability; A New Experiment; How to Find More Information; Conclusion; References; Chapter 5. Intrusion Detection and Incident Response; An Example Scientific Experiment in Intrusion Detection; False Positives and False Negatives; Performance, Scalability, and Stress Testing; Case Study: Measuring Snort Detection Performance; Building on Previous Work; A New Experiment; How to Find More Information; Conclusion; References
  • Chapter 6. Situational Awareness and Data AnalyticsAn Example Scientific Experiment in Situational Awareness; Experimental Results to Assist Human Network Defenders; Machine Learning and Data Mining for Network Monitoring; Case Study: How Quickly Can You Find the Needle in the Haystack?; A New Experiment; How to Find More Information; Conclusion; References; Chapter 7. Cryptography; An Example Scientific Experiment in Cryptography; Experimental Evaluation of Cryptographic Designs and Implementation; Provably Secure Cryptography and Security Assumptions
  • Cryptographic Security and the Internet of ThingsCase Study: Evaluating Composable Security; Background; A New Experiment; How to Find More Information; Conclusion; References; Chapter 8. Digital Forensics; An Example Scientific Experiment in Digital Forensics; Scientific Validity and the Law; Scientific Reproducibility and Repeatability; Case Study: Scientific Comparison of Forensic Tool Performance; How to Find More Information; Conclusion; References; Chapter 9. Malware Analysis; An Example Scientific Experiment in Malware Analysis
  • Scientific Data Collection for Simulators and Sandboxes