• Security 2020: Reduce Security Risks This Decade See large image

    Security 2020: Reduce Security Risks This Decade (Paperback) By (author) Doug Howard, By (author) Kevin Prince, Foreword by Bruce Schneier

    $26.93 - Save $19.31 41% off - RRP $46.24 Free delivery worldwide Available
    Dispatched in 4 business days
    When will my order arrive?
    Add to basket | Add to wishlist |

    DescriptionIdentify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond. IT security needs are constantly evolving; this guide examines what history has taught us and predicts future concerns Points out the differences between artificial concerns and solutions and the very real threats to new technology, with startling real-world scenarios Provides knowledge needed to cope with emerging dangers and offers opinions and input from more than 20 noteworthy CIOs and business executives Gives you insight to not only what these industry experts believe, but also what over 20 of their peers believe and predict as well With a foreword by security expert Bruce Schneier, Security 2020: Reduce Security Risks This Decade supplies a roadmap to real IT security for the coming decade and beyond.


Other books

Other books in this category
Showing items 1 to 11 of 11

 

Reviews | Bibliographic data
  • Full bibliographic data for Security 2020

    Title
    Security 2020
    Subtitle
    Reduce Security Risks This Decade
    Authors and contributors
    By (author) Doug Howard, By (author) Kevin Prince, Foreword by Bruce Schneier
    Physical properties
    Format: Paperback
    Number of pages: 336
    Width: 189 mm
    Height: 233 mm
    Thickness: 18 mm
    Weight: 516 g
    Language
    English
    ISBN
    ISBN 13: 9780470639559
    ISBN 10: 0470639555
    Classifications

    BIC E4L: COM
    B&T Book Type: NF
    B&T Modifier: Region of Publication: 01
    B&T Modifier: Subject Development: 20
    B&T Modifier: Academic Level: 05
    Nielsen BookScan Product Class 3: S10.6
    B&T General Subject: 229
    B&T Modifier: Text Format: 01
    B&T Merchandise Category: COM
    LC subject heading:
    BIC subject category V2: UTN
    B&T Approval Code: A93663050
    Warengruppen-Systematik des deutschen Buchhandels: 16360
    BISAC V2.8: COM053000
    DC22: 005.8
    LC subject heading:
    Ingram Subject Code: XY
    Libri: I-XY
    LC classification: QA76.9.A25 H6976 2011
    LC subject heading: ,
    Thema V1.0: UTN
    Illustrations note
    Illustrations
    Publisher
    John Wiley and Sons Ltd
    Imprint name
    John Wiley & Sons Ltd
    Publication date
    21 December 2010
    Publication City/Country
    Chichester
    Author Information
    Doug Howard , a 20-year IT security veteran, is the CEO of VBrick Systems and previously held positions as CSO of Perimeter E-Security, COO of BT Counterpane, and VP of Security and Business Continuity at AT&T. Kevin Prince has spent over 20 years in IT, with the majority of that time focused on information security. Kevin has been everything from founder and CEO of his own information security company to Chief Technology Officer of Perimeter E-Security, one of the largest managed security service providers in the nation.
    Back cover copy
    Learn what's real, what's hype, and what you can do about itFor decades, security experts and their IT peers have battled the black hats. Yet the threats are as prolific as ever and more sophisticated. Compliance requirements are evolving rapidly and globalization is creating new technology pressures. Risk mitigation is paramount. What lies ahead?Doug Howard and Kevin Prince draw upon their vast experience of providing security services to many Fortune-ranked companies, as well as small and medium businesses. Along with their panel of security expert contributors, they offer real-world experience that provides a perspective on security past, present, and future. Some risk scenarios may surprise you. Some may embody fears you have already considered. But all will help you make tomorrow's IT world a little more secure than today's.Over 50 industry experts weigh in with their thoughtsReview the history of security breachesExplore likely future threats, including social networking concerns and doppelganger attacksUnderstand the threat to Unified Communication and Collaboration (UCC) technologiesConsider the impact of an attack on the global financial systemLook at the expected evolution of intrusion detection systems, network access control, and related safeguardsLearn to combat the risks inherent in mobile devices and cloud computingStudy 11 chilling and highly possible scenarios that might happen in the future
    Table of contents
    Foreword. Introduction. Chapter 1 What Has History Shown Us? The History of Data Breach Disclosure. The History of Vulnerability Exploits. The History of Viruses and Worms. The History of Edge-Based Security. The History of Patching. Hacker Methodologies. Inbound Attacks. The History of Malware. Automated Attacks. The History of Hacker Motivation. The History of Botnets. The History of Search Engine Hacking. The History of Data Loss. The History of Security Solutions. The Making of a Cyber-Super-Villain. The Botnet in Action. Hindsight is NOT 20/20. Chapter 2 External Infl uences on Security. Information Security Drivers. The Emotions. World Events. The Impact of Politics. The Impact on Journalism. The Social Engineer. GRC. Litigation. Breach Impact on Public Companies. The Security Culture. The Path to 2020. Chapter 3 Technology Infl uences on Security. The Movement Toward National Identity Management. Internet Protocol in 2020. 2020: Remote Access Continues to Be a Problem. The Search Engine Impact. The Web Services Impact. The Impact of Virtualization. The Malware Problem. The Web Browser. The Portable Media Debacle, A.K.A. Mobility. Advanced Persistent Threat in 2020. The Network Edge. The Security Software Vendor. Personal Information and Data Correlation. The Domain Name. Chapter 4 Where Security Threats Will Come from in the Future. Spam. Botnets. The Ph-enomenon: Why so many attack methods start with "Ph". Phishing, Pharming, SMSishing, Vishing. Vulnerability Exploits. Insider Threats. Mobility Threats. Infected Software. Peer-to-Peer (P2P) Software. Third-Party Threats. Social Networking Threats. Digitization. Star Wars. Infrastructure Attacks. Social and Financial Threats. Website Middleware Threats. Doppelganger Attacks. Chapter 5 Secure Communications and Collaboration. Email, Instant Messaging, and SMS. Online Webinars and Collaboration Tools. Voice over IP. Video over IP. Storage and Retention of User-Generated Content. Digital Rights Management and Content Protection. Digital Rights Management. Watermarking. UCC and UCC Compliance Requirements over the Next Decade. Chapter 6 2020 Revolution or Evolution? IT Security Revolution. The Missing Deterrent. Security in 20/20 Hindsight. Intrusion Detection Systems, Intrusion Protection Systems, and Data Loss Prevention in 20/20 Hindsight. Identity Management/Network Access Control/Single Sign-on. Mobility/Wireless/Ultra-Mobile. SaaS and Cloud Computing. Testing Your Information Protection: Penetration Test/Vulnerability Test/Risk Assessments. Chapter 7 Security as a Business Now and Then. The Purpose of IT. Evolving Purpose into Action. The Map to Success. The Relationship: Security and Luck. Security: An Industry or a Feature of IT? Consolidation of the IT Security Industry. Buying Security: Defi ning the Value. Budgets and Prioritizations. Venture Capital and Investment in IT Security. Chapter 8 Impact of the Economy over the Next 10 Years. Economic Recession. What If? Economic Booms. Hyperinfl ation. Skill Shortages. Another Terrorist Attack. The Outlook. Chapter 9 Eleven (Maybe Not So Crazy) Scenarios That Could Happen. Situation One: Which Way Do I Go? Situation Two: Is the Network Down? 60 Hudson Street, New York City, New York. 900 North Franklin Street, Chicago, IL 60610. 56 Marietta, Atlanta, Georgia. Situation Three: Snip the Wires. Situation Four: The Pandemic. Situation Five: Cyber-Hijacking, Blackmail, and Ransom. Situation Six: The Facebook Killer. Situation Seven: Is It Getting Hot? Situation Eight: Which Way Is Up. Situation Nine: Cyber-Hypothermia, Cyber-Heat-Stroke, Utility Terrorism. Situation Ten: The Pundit Hack. Situation Eleven: Stock Manipulation. Chapter 10 Conclusion. 2020. Information Asymmetry. Tipping Point #1: Compliance Overload. Tipping Point #2: Data Breach Laws. Tipping Point #3: Liability. Tipping Point #4: From Outsiders to Insiders. Tipping Point #5: From Network to Endpoint. Tipping Point #6: Cloud Computing. Beyond Tipping Points. Appendix Contributing Author Biographies. Index.