LET'S CONNECT!
Enter for a chance to win an eBook of your choice from InformIT. Fill out the form.
Register your product to gain access to bonus material or receive a coupon.
• Understand the cybersecurity discipline and the role of standards and best practices
• Define security governance, assess risks, and manage strategy and tactics
• Safeguard information and privacy, and ensure GDPR compliance
• Harden systems across the system development life cycle (SDLC)
• Protect servers, virtualized systems, and storage
• Secure networks and electronic communications, from email to VoIP
• Apply the most appropriate methods for user authentication
• Mitigate security risks in supply chains and cloud environments
William Stallings’ Effective Cybersecurity offers a comprehensive and unified explanation of the best practices and standards that represent proven, consensus techniques for implementing cybersecurity. Stallings draws on the immense work that has been collected in multiple key security documents, making this knowledge far more accessible than it has ever been before. Effective Cybersecurity is organized to align with the comprehensive Information Security Forum document The Standard of Good Practice for Information Security, but deepens, extends, and complements ISF’s work with extensive insights from the ISO 27002 Code of Practice for Information Security Controls, the NIST Framework for Improving Critical Infrastructure Cybersecurity, COBIT 5 for Information Security, and a wide spectrum of standards and guidelines documents from ISO, ITU-T, NIST, Internet RFCs, other official sources, and the professional, academic, and industry literature.
In a single expert source, current and aspiring cybersecurity practitioners will find comprehensive and usable practices for successfully implementing cybersecurity within any organization. Stallings covers:
Beyond requiring a basic understanding of cryptographic terminology and applications, this book is self-contained: all technology areas are explained without requiring other reference material. Each chapter contains a clear technical overview, as well as a detailed discussion of action items and appropriate policies. Stallings, author of 13 TAA Computer Science Textbooks of the Year, offers many pedagogical features designed to help readers master the material. These include: clear learning objectives, keyword lists, and glossaries to QR codes linking to relevant standards documents and web resources.
Understanding Information Security Governance
Download the sample pages (includes Chapter 2)
Preface xxvii
Chapter 1: Best Practices, Standards, and a Plan of Action 2
1.1 Defining Cyberspace and Cybersecurity 3
1.2 The Value of Standards and Best Practices Documents 6
1.3 The Standard of Good Practice for Information Security 7
1.4 The ISO/IEC 27000 Suite of Information Security Standards 12
ISO 27001 15
ISO 27002 17
1.5 Mapping the ISO 27000 Series to the ISF SGP 18
1.6 NIST Cybersecurity Framework and Security Documents 21
NIST Cybersecurity Framework 22
NIST Security Documents 25
1.7 The CIS Critical Security Controls for Effective Cyber Defense 27
1.8 COBIT 5 for Information Security 29
1.9 Payment Card Industry Data Security Standard (PCI DSS) 30
1.10 ITU-T Security Documents 32
1.11 Effective Cybersecurity 34
The Cybersecurity Management Process 34
Using Best Practices and Standards Documents 36
1.12 Key Terms and Review Questions 38
Key Terms 38
Review Questions 38
1.13 References 39
PART I: PLANNING FOR CYBERSECURITY 41
Chapter 2: Security Governance 42
2.1 Security Governance and Security Management 43
2.2 Security Governance Principles and Desired Outcomes 45
Principles 45
Desired Outcomes 46
2.3 Security Governance Components 47
Strategic Planning 47
Organizational Structure 51
Roles and Responsibilities 55
Integration with Enterprise Architecture 58
Policies and Guidance 63
2.4 Security Governance Approach 63
Security Governance Framework 63
Security Direction 64
Responsible, Accountable, Consulted, and Informed (RACI) Charts 66
2.5 Security Governance Evaluation 68
2.6 Security Governance Best Practices 69
2.7 Key Terms and Review Questions 70
Key Terms 70
Review Questions 71
2.8 References 71
Chapter 3: Information Risk Assessment 74
3.1 Risk Assessment Concepts 75
Risk Assessment Challenges 78
Risk Management 80
Structure of This 84
3.2 Asset Identification 85
Hardware Assets 85
Software Assets 85
Information Assets 86
Business Assets 87
Asset Register 87
3.3 Threat Identification 89
The STRIDE Threat Model 89
Threat Types 90
Sources of Information 92
3.4 Control Identification 98
3.5 Vulnerability Identification 102
Vulnerability Categories 103
National Vulnerability Database and Common Vulnerability Scoring System 103
3.6 Risk Assessment Approaches 107
Quantitative Versus Qualitative Risk Assessment 107
Simple Risk Analysis Worksheet 113
Factor Analysis of Information Risk 114
3.7 Likelihood Assessment 116
Estimating Threat Event Frequency 118
Estimating Vulnerability 119
Loss Event Frequency 121
3.8 Impact Assessment 122
Estimating the Primary Loss 124
Estimating the Secondary Loss 125
Business Impact Reference Table 126
3.9 Risk Determination 128
3.10 Risk Evaluation 128
3.11 Risk Treatment 129
Risk Reduction 130
Risk Retention 130
Risk Avoidance 130
Risk Transfer 131
3.12 Risk Assessment Best Practices 131
3.13 Key Terms and Review Questions 132
Key Terms 132
Review Questions 133
3.14 References 134
Chapter 4: Security Management 136
4.1 The Security Management Function 137
Security Planning 140
Capital Planning 142
4.2 Security Policy 145
Security Policy Categories 146
Security Policy Document Content 147
Management Guidelines for Security Policies 151
Monitoring the Policy 151
4.3 Acceptable Use Policy 152
4.4 Security Management Best Practices 154
4.5 Key Terms and Review Questions 154
Key Terms 154
Review Questions 155
4.6 References 155
PART II: MANAGING THE CYBERSECURITY FUNCTION 157
Chapter 5: People Management 160
5.1 Human Resource Security 161
Security in the Hiring Process 162
During Employment 164
Termination of Employment 165
5.2 Security Awareness and Education 166
Security Awareness 168
Cybersecurity Essentials Program 173
Role-Based Training 173
Education and Certification 174
5.3 People Management Best Practices 175
5.4 Key Terms and Review Questions 176
Key Terms 176
Review Questions 176
5.5 References 177
Chapter 6: Information Management 178
6.1 Information Classification and Handling 179
Information Classification 179
Information Labeling 185
Information Handling 186
6.2 Privacy 186
Privacy Threats 189
Privacy Principles and Policies 191
Privacy Controls 196
6.3 Document and Records Management 198
Document Management 200
Records Management 202
6.4 Sensitive Physical Information 204
6.5 Information Management Best Practices 205
6.6 Key Terms and Review Questions 206
Key Terms 206
Review Questions 207
6.7 References 208
Chapter 7: Physical Asset Management 210
7.1 Hardware Life Cycle Management 211
Planning 213
Acquisition 214
Deployment 214
Management 215
Disposition 216
7.2 Office Equipment 217
Threats and Vulnerabilities 217
Security Controls 219
Equipment Disposal 222
7.3 Industrial Control Systems 223
Differences Between IT Systems and Industrial Control Systems 225
ICS Security 227
7.4 Mobile Device Security 231
Mobile Device Technology 233
Mobile Ecosystem 234
Vulnerabilities 236
Mobile Device Security Strategy 238
Resources for Mobile Device Security 243
7.5 Physical Asset Management Best Practices 244
7.6 Key Terms and Review Questions 245
Key Terms 245
Review Questions 245
7.7 References 246
Chapter 8: System Development 248
8.1 System Development Life Cycle 248
NIST SDLC Model 249
The SGP’s SDLC Model 252
DevOps 254
8.2 Incorporating Security into the SDLC 259
Initiation Phase 260
Development/Acquisition Phase 264
Implementation/Assessment Phase 266
Operations and Maintenance Phase 270
Disposal Phase 272
8.3 System Development Management 273
System Development Methodology 274
System Development Environments 275
Quality Assurance 277
8.4 System Development Best Practices 278
8.5 Key Terms and Review Questions 278
Key Terms 278
Review Questions 279
8.6 References 279
Chapter 9: Business Application Management 280
9.1 Application Management Concepts 281
Application Life Cycle Management 281
Application Portfolio Management 283
Application Performance Management 285
9.2 Corporate Business Application Security 287
Business Application Register 287
Business Application Protection 288
Browser-Based Application Protection 289
9.3 End User-Developed Applications (EUDAs) 295
Benefits of EUDAs 296
Risks of EUDAs 296
EUDA Security Framework 297
9.4 Business Application Management Best Practices 300
9.5 Key Terms and Review Questions 301
Key Terms 301
Review Questions 302
9.6 References 302
Chapter 10: System Access 304
10.1 System Access Concepts 304
Authorization 306
10.2 User Authentication 307
A Model for Electronic User Authentication 307
Means of Authentication 310
Multifactor Authentication 311
10.3 Password-Based Authentication 312
The Vulnerability of Passwords 313
The Use of Hashed Passwords 315
Password Cracking of User-Chosen Passwords 317
Password File Access Control 319
Password Selection 320
10.4 Possession-Based Authentication 322
Memory Cards 322
Smart Cards 323
Electronic Identity Cards 325
One-Time Password Device 328
Threats to Possession-Based Authentication 329
Security Controls for Possession-Based Authentication 330
10.5 Biometric Authentication 330
Criteria for Biometric Characteristics 331
Physical Characteristics Used in Biometric Applications 332
Operation of a Biometric Authentication System 333
Biometric Accuracy 335
Threats to Biometric Authentication 337
Security Controls for Biometric Authentication 339
10.6 Risk Assessment for User Authentication 341
Authenticator Assurance Levels 341
Selecting an AAL 342
Choosing an Authentication Method 345
10.7 Access Control 347
Subjects, Objects, and Access Rights 348
Access Control Policies 349
Discretionary Access Control 350
Role-Based Access Control 351
Attribute-Based Access Control 353
Access Control Metrics 358
10.8 Customer Access 360
Customer Access Arrangements 360
Customer Contracts 361
Customer Connections 361
Protecting Customer Data 361
10.9 System Access Best Practices 362
10.10 Key Terms and Review Questions 363
Key Terms 363
Review Questions 363
10.11 References 364
Chapter 11: System Management 366
11.1 Server Configuration 368
Threats to Servers 368
Requirements for Server Security 368
11.2 Virtual Servers 370
Virtualization Alternatives 371
Virtualization Security Issues 374
Securing Virtualization Systems 376
11.3 Network Storage Systems 377
11.4 Service Level Agreements 379
Network Providers 379
Computer Security Incident Response Team 381
Cloud Service Providers 382
11.5 Performance and Capacity Management 383
11.6 Backup 384
11.7 Change Management 386
11.8 System Management Best Practices 389
11.9 Key Terms and Review Questions 390
Key Terms 390
Review Questions 390
11.10 References 391
Chapter 12: Networks and Communications 392
12.1 Network Management Concepts 393
Network Management Functions 393
Network Management Systems 399
Network Management Architecture 402
12.2 Firewalls 404
Firewall Characteristics 404
Types of Firewalls 406
Next-Generation Firewalls 414
DMZ Networks 414
The Modern IT Perimeter 416
12.3 Virtual Private Networks and IP Security 417
Virtual Private Networks 417
IPsec 418
Firewall-Based VPNs 420
12.4 Security Considerations for Network Management 421
Network Device Configuration 421
Physical Network Management 423
Wireless Access 426
External Network Connections 427
Firewalls 428
Remote Maintenance 429
12.5 Electronic Communications 430
Email 430
Instant Messaging 436
Voice over IP (VoIP) Networks 438
Telephony and Conferencing 444
12.6 Networks and Communications Best Practices 444
12.7 Key Terms and Review Questions 445
Key Terms 445
Review Questions 445
12.8 References 446
Chapter 13: Supply Chain Management and Cloud Security 448
13.1 Supply Chain Management Concepts 449
The Supply Chain 449
Supply Chain Management 451
13.2 Supply Chain Risk Management 453
Supply Chain Threats 456
Supply Chain Vulnerabilities 459
Supply Chain Security Controls 460
SCRM Best Practices 463
13.3 Cloud Computing 466
Cloud Computing Elements 466
Cloud Computing Reference Architecture 470
13.4 Cloud Security 473
Security Considerations for Cloud Computing 473
Threats for Cloud Service Users 474
Risk Evaluation 475
Best Practices 476
Cloud Service Agreement 477
13.5 Supply Chain Best Practices 478
13.6 Key Terms and Review Questions 479
Key Terms 479
Review Questions 479
13.7 References 480
Chapter 14: Technical Security Management 482
14.1 Security Architecture 483
14.2 Malware Protection Activities 487
Types of Malware 487
The Nature of the Malware Threat 490
Practical Malware Protection 490
14.3 Malware Protection Software 494
Capabilities of Malware Protection Software 494
Managing Malware Protection Software 495
14.4 Identity and Access Management 496
IAM Architecture 497
Federated Identity Management 498
IAM Planning 500
IAM Best Practices 501
14.5 Intrusion Detection 502
Basic Principles 503
Approaches to Intrusion Detection 504
Host-Based Intrusion Detection Techniques 505
Network-Based Intrusion Detection Systems 506
IDS Best Practices 508
14.6 Data Loss Prevention 509
Data Classification and Identification 509
Data States 510
14.7 Digital Rights Management 512
DRM Structure and Components 513
DRM Best Practices 515
14.8 Cryptographic Solutions 517
Uses of Cryptography 517
Cryptographic Algorithms 518
Selection of Cryptographic Algorithms and Lengths 525
Cryptography Implementation Considerations 526
14.9 Cryptographic Key Management 528
Key Types 530
Cryptoperiod 532
Key Life Cycle 534
14.10 Public Key Infrastructure 536
Public Key Certificates 536
PKI Architecture 538
Management Issues 540
14.11 Technical Security Management Best Practices 541
14.12 Key Terms and Review Questions 543
Key Terms 543
Review Questions 543
14.13 References 544
Chapter 15: Threat and Incident Management 546
15.1 Technical Vulnerability Management 547
Plan Vulnerability Management 547
Discover Known Vulnerabilities 548
Scan for Vulnerabilities 549
Log and Report 551
Remediate Vulnerabilities 551
15.2 Security Event Logging 554
Security Event Logging Objective 556
Potential Security Log Sources 556
What to Log 557
Protection of Log Data 557
Log Management Policy 558
15.3 Security Event Management 559
SEM Functions 560
SEM Best Practices 561
15.4 Threat Intelligence 563
Threat Taxonomy 564
The Importance of Threat Intelligence 566
Gathering Threat Intelligence 568
Threat Analysis 569
15.5 Cyber Attack Protection 570
Cyber Attack Kill Chain 570
Protection and Response Measures 573
Non-Malware Attacks 576
15.6 Security Incident Management Framework 577
Objectives of Incident Management 579
Relationship to Information Security Management System 579
Incident Management Policy 580
Roles and Responsibilities 581
Incident Management Information 583
Incident Management Tools 583
15.7 Security Incident Management Process 584
Preparing for Incident Response 585
Detection and Analysis 586
Containment, Eradication, and Recovery 587
Post-Incident Activity 588
15.8 Emergency Fixes 590
15.9 Forensic Investigations 592
Prepare 593
Identify 594
Collect 594
Preserve 595
Analyze 595
Report 596
15.10 Threat and Incident Management Best Practices 597
15.11 Key Terms and Review Questions 598
Key Terms 598
Review Questions 599
15.12 References 599
Chapter 16: Local Environment Management 602
16.1 Local Environment Security 602
Local Environment Profile 603
Local Security Coordination 604
16.2 Physical Security 606
Physical Security Threats 606
Physical Security Officer 609
Defense in Depth 610
Physical Security: Prevention and Mitigation Measures 612
Physical Security Controls 615
16.3 Local Environment Management Best Practices 619
16.4 Key Terms and Review Questions 620
Key Terms 620
Review Questions 620
16.5 References 621
Chapter 17: Business Continuity 622
17.1 Business Continuity Concepts 625
Threats 626
Business Continuity in Operation 628
Business Continuity Objectives 629
Essential Components for Maintaining Business Continuity 630
17.2 Business Continuity Program 630
Governance 631
Business Impact Analysis 631
Risk Assessment 632
Business Continuity Strategy 634
17.3 Business Continuity Readiness 637
Awareness 637
Training 638
Resilience 639
Control Selection 640
Business Continuity Plan 642
Exercising and Testing 647
Performance Evaluation 650
17.4 Business Continuity Operations 655
Emergency Response 655
Crisis Management 656
Business Recovery/Restoration 657
17.5 Business Continuity Best Practices 660
17.6 Key Terms and Review Questions 661
Key Terms 661
Review Questions 661
17.7 References 662
PART III: SECURITY ASSESSMENT 665
Chapter 18: Security Monitoring and Improvement 666
18.1 Security Audit 666
Security Audit and Alarms Model 667
Data to Collect for Auditing 668
Internal and External Audit 672
Security Audit Controls 673
18.2 Security Performance 678
Security Performance Measurement 678
Security Monitoring and Reporting 686
Information Risk Reporting 688
Information Security Compliance Monitoring 690
18.3 Security Monitoring and Improvement Best Practices 691
18.4 Key Terms and Review Questions 692
Key Terms 692
Review Questions 692
18.5 References 693
Appendix A: References and Standards 694
Appendix B: Glossary 708
Index 726
Appendix C: Answers to Review Questions (Online Only)
This eBook includes the following formats, accessible from your Account page after purchase:
EPUB
The open industry format known for its reflowable content and usability on supported mobile devices.
PDF
The popular standard, used most often with the free Acrobat® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
This eBook includes the following formats, accessible from your Account page after purchase:
EPUB
The open industry format known for its reflowable content and usability on supported mobile devices.
PDF
The popular standard, used most often with the free Acrobat® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.
This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.
To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:
For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.
For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.
Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.
Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.
If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.
On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.
We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.
Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.
Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.
This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.
This site currently does not respond to Do Not Track signals.
Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.
This site is not directed to children under the age of 13.
Pearson may send or direct marketing communications to users, provided that
Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.
If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.
Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.
Pearson does not rent or sell personal information in exchange for any payment of money.
While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.
California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.
Pearson may disclose personal information, as follows:
This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.
Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.
We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.
Last Update: November 17, 2020