Read more
"Ten basic principles that will reduce the risk of cyber attack to national infrastructure in a substantive manner"--
List of contents
Chapter One: Introduction
Chapter Two: Deception
Chapter Three: Separation
Chapter Four: Diversity
Chapter Five: Commonality
Chapter Six: Depth
Chapter Seven: Discretion
Chapter Eight: Collection
Chapter Nine: Correlation
Chapter Ten: Awareness
Chapter Eleven: Response
Appendix A: Case Studies
Appendix B: National Requirements
Report
"Dr. Amoroso must be commended for his effort in trying to build a national strategy document...The material is worthy of being debated in public policy circles." --Security Management, June 2013
"The book puts forward a good set of high-level principles for protecting enterprise scale assets against cyber-attack, which provide the necessary formal, rigorous approach for anyone holding ultimate responsibility in this area. The treatment of these topics is conceptual rather than technical with minimal discussion of implementation, although this is understandable enough as there will be considerable variation between different enterprises and systems in practice...[T]his is an excellent introduction or high-level guide for anyone involved in the management of infrastructure security or learning the basic principles of enterprise information security." --BCS.org
"Cyber Attacks Protecting National Infrastructure is a very readable and engaging book on one of the most important topics the US is currently facing. While Amoroso lays out the technical issues, he also notes that the only way to remediate them is via a commitment to infrastructure protection; based on a top-down approach from management. If management is supportive of information security, and understands its significant, the security teams ability to secure the infrastructure will be inordinately easier. For those looking for a reference that provides both the breadth and depth on the topic, Cyber Attacks Protecting National Infrastructure is an invaluable resource written by one of the smartest minds in the industry" --RSA Conference's Security Reading Room