000 03124cam a2200493Mi 4500
001 9781003144182
003 FlBoTFG
005 20240213122831.0
006 m o d
007 cr cnu---unuuu
008 210806s2022 xx o 0|| 0 eng d
040 _aOCoLC-P
_beng
_erda
_cOCoLC-P
020 _a9781000415100
_q(electronic bk.)
020 _a1000415104
_q(electronic bk.)
020 _a9781000415148
_q(electronic bk.)
020 _a1000415147
_q(electronic bk.)
020 _a9781003144182
_q(electronic bk.)
020 _a1003144187
_q(electronic bk.)
020 _z0367700018
020 _z9780367700010
035 _a(OCoLC)1262964916
035 _a(OCoLC-P)1262964916
050 4 _aQA76.9.A25
_bM45 2022
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x051240
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
072 7 _aUR
_2bicssc
082 0 4 _a005.8
_223
100 1 _aMelone, Michael,
_eauthor.
245 1 0 _aDesigning secure systems.
260 _a[S.l.] :
_bCRC Press,
_c2022.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
520 _aModern systems are an intertwined mesh of human process, physical security, and technology. Attackers are aware of this, commonly leveraging a weakness in one form of security to gain control over an otherwise protected operation. To expose these weaknesses, we need a single unified model that can be used to describe all aspects of the system on equal terms. Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems - from padlocks, to phishing, to enterprise software architecture. We discuss how weakness in one part of a system creates vulnerability in another, all the while applying standards and frameworks used in the cybersecurity world. Our goal: to analyze the security of the entire system - including people, processes, and technology -using a single model. We begin by describing the core concepts of access, authorization, authentication, and exploitation. We then break authorization down into five interrelated components and describe how these aspects apply to physical, human process, and cybersecurity. Lastly, we discuss how to operate a secure system based on the NIST Cybersecurity Framework (CSF) concepts of "identify, protect, detect, respond, and recover." Other topics covered in this book include the NIST National Vulnerability Database (NVD), MITRE Common Vulnerability Scoring System (CVSS), Microsoft's Security Development Lifecycle (SDL), and the MITRE ATT&CK Framework.
588 _aOCLC-licensed vendor bibliographic record.
650 0 _aComputer security.
650 7 _aCOMPUTERS / Networking / Security
_2bisacsh
650 7 _aCOMPUTERS / Programming / Systems Analysis & Design
_2bisacsh
650 7 _aCOMPUTERS / Security / General
_2bisacsh
856 4 0 _3Taylor & Francis
_uhttps://www.taylorfrancis.com/books/9781003144182
856 4 2 _3OCLC metadata license agreement
_uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
999 _c5893
_d5893