BN.com Gift Guide

Security 2020: Reduce Security Risks This Decade [NOOK Book]

Overview

Identify real security risks and skip the hype

After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today’s IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while ...

See more details below
Security 2020: Reduce Security Risks This Decade

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$22.99
BN.com price
(Save 42%)$39.99 List Price
Note: This NOOK Book can be purchased in bulk. Please email us for more information.

Overview

Identify real security risks and skip the hype

After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today’s IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.

  • IT security needs are constantly evolving; this guide examines what history has taught us and predicts future concerns
  • Points out the differences between artificial concerns and solutions and the very real threats to new technology, with startling real-world scenarios
  • Provides knowledge needed to cope with emerging dangers and offers opinions and input from more than 20 noteworthy CIOs and business executives
  • Gives you insight to not only what these industry experts believe, but also what over 20 of their peers believe and predict as well

With a foreword by security expert Bruce Schneier, Security 2020: Reduce Security Risks This Decade supplies a roadmap to real IT security for the coming decade and beyond.

Read More Show Less

Product Details

  • ISBN-13: 9781118008317
  • Publisher: Wiley
  • Publication date: 12/7/2010
  • Sold by: Barnes & Noble
  • Format: eBook
  • Edition number: 1
  • Pages: 336
  • Sales rank: 862,281
  • File size: 5 MB

Meet the Author

Doug Howard, a 20-year IT security veteran, is the CEO of VBrick Systems and previously held positions as CSO of Perimeter E-Security, COO of BT Counterpane, and VP of Security and Business Continuity at AT&T.

Kevin Prince has spent over 20 years in IT, with the majority of that time focused on information security. Kevin has been everything from founder and CEO of his own information security company to Chief Technology Officer of Perimeter E-Security, one of the largest managed security service providers in the nation.

Read More Show Less

Read an Excerpt

catalogimages.wiley.com/images/db/pdf/9780470639559.excerpt.pdf
Read More Show Less

Table of Contents

Foreword.

Introduction.

Chapter 1 What Has History Shown Us?

The History of Data Breach Disclosure.

The History of Vulnerability Exploits.

The History of Viruses and Worms.

The History of Edge-Based Security.

The History of Patching.

Hacker Methodologies.

Inbound Attacks.

The History of Malware.

Automated Attacks.

The History of Hacker Motivation.

The History of Botnets.

The History of Search Engine Hacking.

The History of Data Loss.

The History of Security Solutions.

The Making of a Cyber-Super-Villain.

The Botnet in Action.

Hindsight is NOT 20/20.

Chapter 2 External Infl uences on Security.

Information Security Drivers.

The Emotions.

World Events.

The Impact of Politics.

The Impact on Journalism.

The Social Engineer.

GRC.

Litigation.

Breach Impact on Public Companies.

The Security Culture.

The Path to 2020.

Chapter 3 Technology Infl uences on Security.

The Movement Toward National Identity Management.

Internet Protocol in 2020.

2020: Remote Access Continues to Be a Problem.

The Search Engine Impact.

The Web Services Impact.

The Impact of Virtualization.

The Malware Problem.

The Web Browser.

The Portable Media Debacle, A.K.A. Mobility.

Advanced Persistent Threat in 2020.

The Network Edge.

The Security Software Vendor.

Personal Information and Data Correlation.

The Domain Name.

Chapter 4 Where Security Threats Will Come from in the Future.

Spam.

Botnets.

The Ph-enomenon: Why so many attack methods start with "Ph".

Phishing, Pharming, SMSishing, Vishing.

Vulnerability Exploits.

Insider Threats.

Mobility Threats.

Infected Software.

Peer-to-Peer (P2P) Software.

Third-Party Threats.

Social Networking Threats.

Digitization.

Star Wars.

Infrastructure Attacks.

Social and Financial Threats.

Website Middleware Threats.

Doppelganger Attacks.

Chapter 5 Secure Communications and Collaboration.

Email, Instant Messaging, and SMS.

Online Webinars and Collaboration Tools.

Voice over IP.

Video over IP.

Storage and Retention of User-Generated Content.

Digital Rights Management and Content Protection.

Digital Rights Management.

Watermarking.

UCC and UCC Compliance Requirements over the Next Decade.

Chapter 6 2020 Revolution or Evolution?

IT Security Revolution.

The Missing Deterrent.

Security in 20/20 Hindsight.

Intrusion Detection Systems, Intrusion Protection Systems, and Data Loss Prevention in 20/20 Hindsight.

Identity Management/Network Access Control/Single Sign-on.

Mobility/Wireless/Ultra-Mobile.

SaaS and Cloud Computing.

Testing Your Information Protection: Penetration Test/Vulnerability Test/Risk Assessments.

Chapter 7 Security as a Business Now and Then.

The Purpose of IT.

Evolving Purpose into Action.

The Map to Success.

The Relationship: Security and Luck.

Security: An Industry or a Feature of IT?

Consolidation of the IT Security Industry.

Buying Security: Defi ning the Value.

Budgets and Prioritizations.

Venture Capital and Investment in IT Security.

Chapter 8 Impact of the Economy over the Next 10 Years.

Economic Recession.

What If?

Economic Booms.

Hyperinfl ation.

Skill Shortages.

Another Terrorist Attack.

The Outlook.

Chapter 9 Eleven (Maybe Not So Crazy) Scenarios That Could Happen.

Situation One: Which Way Do I Go?

Situation Two: Is the Network Down?

60 Hudson Street, New York City, New York.

900 North Franklin Street, Chicago, IL 60610.

56 Marietta, Atlanta, Georgia.

Situation Three: Snip the Wires.

Situation Four: The Pandemic.

Situation Five: Cyber-Hijacking, Blackmail, and Ransom.

Situation Six: The Facebook Killer.

Situation Seven: Is It Getting Hot?

Situation Eight: Which Way Is Up.

Situation Nine: Cyber-Hypothermia, Cyber-Heat-Stroke, Utility Terrorism.

Situation Ten: The Pundit Hack.

Situation Eleven: Stock Manipulation.

Chapter 10 Conclusion.

2020.

Information Asymmetry.

Tipping Point #1: Compliance Overload.

Tipping Point #2: Data Breach Laws.

Tipping Point #3: Liability.

Tipping Point #4: From Outsiders to Insiders.

Tipping Point #5: From Network to Endpoint.

Tipping Point #6: Cloud Computing.

Beyond Tipping Points.

Appendix Contributing Author Biographies.

Index.

Read More Show Less

Customer Reviews

Average Rating 4.5
( 4 )
Rating Distribution

5 Star

(3)

4 Star

(0)

3 Star

(0)

2 Star

(1)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 4 Customer Reviews
  • Anonymous

    Posted September 2, 2013

    Adam

    Walked over and smiled. "Hi. Im adam" held out a hand.

    0 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted September 4, 2013

    Matt

    He nodded, "I'm from London, yeah."

    0 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted September 5, 2013

    Guinevere

    (Sorry I'm not so active. School just started in Sweden) Guinevere looked at the documents, through a careful glance. "And what do you work for?"

    0 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted February 4, 2012

    No text was provided for this review.

Sort by: Showing all of 4 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)