河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第12章 新兴问题 Emerging Topics

SECURITY IN COMPUTING FIETH EDITION Chapter 12: Emerging Topics 授课教师:高海波 可南中医药大学 信息管理与信息系统教研室 From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
SECURITY IN COMPUTING, FIFTH EDITION Chapter 12: Emerging Topics From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. 1 授课教师:高海波 河南中医药大学 信息管理与信息系统教研室

2 Chapter 12 Objectives Define the Internet of Things and discuss associated emerging security issues Discuss nascent efforts to financially measure cybersecurity to make sound investment decisions Explore the evolving field of electronic voting, which has been an important and open security research problem for over a decade Study potential examples of cyber warfare and their policy implications From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. Chapter 12 Objectives • Define the Internet of Things and discuss associated emerging security issues • Discuss nascent efforts to financially measure cybersecurity to make sound investment decisions • Explore the evolving field of electronic voting, which has been an important and open security research problem for over a decade • Study potential examples of cyber warfare and their policy implications 2

3 The Internet of Things(loT lo T refers to the connection of everyday devices to the Internet, making a world of so-called smart devices Examples Smart appliances, such as refrigerators and dishwashers Smart home such as thermostats and alarm systems Smart health such as fitness monitors and insulin pumps Smart transportation such as driverless cars Smart entertainment. such as video recorders Potential downsides Loss of privacy Loss of control of data Potential for subversion Mistaken identification Uncontrolled access From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. The Internet of Things (IoT) • IoT refers to the connection of everyday devices to the Internet, making a world of so-called smart devices • Examples: • Smart appliances, such as refrigerators and dishwashers • Smart home, such as thermostats and alarm systems • Smart health, such as fitness monitors and insulin pumps • Smart transportation, such as driverless cars • Smart entertainment, such as video recorders • Potential downsides: • Loss of privacy • Loss of control of data • Potential for subversion • Mistaken identification • Uncontrolled access 3

Smartphones Smartphones are the control hub of the lot In 2013, Kaspersky Labs identified 143, 211 distinct new forms of malware against mobile devices 98% targeted Android devices, far in excess of its market share Android, unlike its competitors does not limit the software users are allowed to install and is thus an easier target Apple, in contrast, only allows apps from its app store to be installed on its smartphones All apps go through an approval process, which includes some security review Once approved, apps are signed, using a certificate approach similar to that described in Chapter 2 From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. Smartphones • Smartphones are the control hub of the IoT • In 2013, Kaspersky Labs identified 143,211 distinct new forms of malware against mobile devices • 98% targeted Android devices, far in excess of its market share • Android, unlike its competitors, does not limit the software users are allowed to install and is thus an easier target • Apple, in contrast, only allows apps from its app store to be installed on its smartphones • All apps go through an approval process, which includes some security review • Once approved, apps are signed, using a certificate approach similar to that described in Chapter 2 4

5 Economics Cybersecurity planning includes deciding how to allocate scarce resources for investing in security controls Making a business case a description of the problem or need to be addressed A list of possible solutions A list of constraints on solving the problem A list of underlying assumptions An analysis of the risks, costs, and benefits of each alternative A summary of why the proposed investment is a good idea From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. Economics • Cybersecurity planning includes deciding how to allocate scarce resources for investing in security controls • Making a business case: • A description of the problem or need to be addressed • A list of possible solutions • A list of constraints on solving the problem • A list of underlying assumptions • An analysis of the risks, costs, and benefits of each alternative • A summary of why the proposed investment is a good idea 5

6 Influences on Cybersecurity Investment Categories of Influence Average Percentage Across Organizations Regulatory requirement 30.1 Network history or information technolo 18.9 staff knowledge Client requirement or request 16.2 Result of internal or external audit 12.4 Response to current events, such as media 8.2 attention Response to compromised internal security 7.3 Reaction to external mandate or request 5.0 Other 1.7 From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. Influences on Cybersecurity Investment 6

7 Quantifying Security Cybersecurity threats are impossible to accurately quantify and estimate How do you predict the likelihood that a hacker will attack a network, and how do you know the precise value of the assets the hacker will compromise? While many industrial surveys collect cybersecurity incident data, they are inconsistent on key issues No standards for defining or categorizing security incidents Disagreements about sources of attack Selection bias among respondents Useful data for decision making, such as rates and severity of attacks, cost of damage and recovery, and cost of security measures, are not yet known with any accuracy From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. Quantifying Security • Cybersecurity threats are impossible to accurately quantify and estimate • How do you predict the likelihood that a hacker will attack a network, and how do you know the precise value of the assets the hacker will compromise? • While many industrial surveys collect cybersecurity incident data, they are inconsistent on key issues: • No standards for defining or categorizing security incidents • Disagreements about sources of attack • Selection bias among respondents • Useful data for decision making, such as rates and severity of attacks, cost of damage and recovery, and cost of security measures, are not yet known with any accuracy 7

8 Electronic Voting Confidentiality We want to be able to cast a ballot without revealing our votes to others Integrity We want votes to represent our actual choices and not be changed between the time we mark the ballot and the time our vote is counted We also want every counted ballot to reflect one single vote of an authorized person That is, we want to be able to ensure that our votes are authentic and that the reported totals accurately reflect the votes cast Availability Usually, votes are cast during an approved pre-election period or on a designated election day, so we must be able to vote when voting is allowed. If we miss the chance to vote or if voting is suspended during the designated period, we lose the opportunity to cast a vote in the gIven election. From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. Electronic Voting • Confidentiality • We want to be able to cast a ballot without revealing our votes to others. • Integrity • We want votes to represent our actual choices and not be changed between the time we mark the ballot and the time our vote is counted. We also want every counted ballot to reflect one single vote of an authorized person. That is, we want to be able to ensure that our votes are authentic and that the reported totals accurately reflect the votes cast. • Availability • Usually, votes are cast during an approved pre-election period or on a designated election day, so we must be able to vote when voting is allowed. If we miss the chance to vote or if voting is suspended during the designated period, we lose the opportunity to cast a vote in the given election. 8

9 What is a fair election? Each voters choices must be kept secret Each voter may vote only once and only for allowed offices The voting system must be tamperproof, and the election officials must be prevented from allowing it to be tampered with All votes must be reported accurately The voting system must be available for use throughout the election period An audit trail must be kept to detect irregularities in voting but without disclosing how any individual voted From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. What Is a Fair Election? • Each voter’s choices must be kept secret. • Each voter may vote only once and only for allowed offices. • The voting system must be tamperproof, and the election officials must be prevented from allowing it to be tampered with. • All votes must be reported accurately. • The voting system must be available for use throughout the election period. • An audit trail must be kept to detect irregularities in voting but without disclosing how any individual voted. 9

Cyber Warfare Open questions: When is an attack on cyber infrastructure considered an act of warfare? Is cyberspace different enough to be considered a separate domain for war, or is it much like any other domain( e.g., land, sea, or air) What are the diferent ways of thinking about cyber war offense and defense? What are the benefits and risks of strategic cyber warfare and tactical cyber warfare? From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. Cyber Warfare • Open questions: • When is an attack on cyber infrastructure considered an act of warfare? • Is cyberspace different enough to be considered a separate domain for war, or is it much like any other domain (e.g., land, sea, or air)? • What are the different ways of thinking about cyber war offense and defense? • What are the benefits and risks of strategic cyber warfare and tactical cyber warfare? 10
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第10章 浏览器 The Web—User Side.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第09章 隐私 Privacy.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第08章 密码学精讲 Details of Cryptography.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第07章 安全管理与事件 Management and Incidents.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第06章 网络 Networks.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第03章 程序与编程 Programs and Programming.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第05章 数据库 Databases.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第04章 操作系统 Operating Systems.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第02章 工具箱:鉴别、访问控制与加密 Toolbox:Authentication, Access Control, and Cryptography.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第01章 概论 Introduction.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第三章 网络分析实验——端口扫描与嗅探实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第三章 网络分析实验——网络监视实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第三章 网络分析实验——数据包捕获实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第八讲 主机探测及端口扫描实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第七讲 WEB漏洞渗透实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第六讲 入侵检测实验——基于虚拟蜜网的网络攻防实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第六讲 入侵检测实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第五讲 防火墙实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第四讲 协议与内容安全实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第十一章 网络服务扫描实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第11章 云计算 Cloud Computing.pdf
- 河南中医药大学:《云计算与虚拟化技术 Cloud and virtualization technology》课程教学资源(实验课程教学大纲).pdf
- 河南中医药大学:《云计算与虚拟化技术 Cloud and virtualization technology》课程教学资源(理论课程教学大纲).pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:The Complete VMware vSphere Guide:Design a Virtualized Data Center with VMware vSphere 6.7.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:4 Reasons to Embrace Multi-Cloud with Network Virtualization.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:IDC:The Business Value of VMware NSX Advanced Load Balancer.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:Mastering VMware vSphere 6.7, 2nd Edition.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:Mastering VMware vSphere 6.7.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》教学资源(参考资料)Mastering VMware vSphere 6.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:Network Virtualization for Dummies.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:Optimizing Remote Worker Connectivity to Cloud Applications Using SD-WAN Gateways.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:VMware NSX Data Center.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:VMware vSphere 功能特性比较.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:WHAT'S NEW IN VMWARE vSPHERE 6.7.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:Worldwide Cloud System and Service Management Software Market Shares, 2019:SaaS and ITOM Drive Growth.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:VMware vRealize Log Insight 4.7 CHS 1.入门-vRealize-Log-Insight-4.7-getting-started-guide.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:VMware vRealize Log Insight 4.7 CHS 2.管理 vRealize Log Insight-vRealize-Log-Insight-4.7-administration-guide.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:VMware vRealize Log Insight 4.7 CHS 3.使用 vRealize Log Insight-vRealize-Log-Insight-4.7-users-guide.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:VMware vRealize Log Insight 4.7 CHS 4.使用 vRealize Log Insight 代理-vRealize-Log-Insight-4.7-agent-administration-guide.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:VMware vRealize Log Insight 4.7 CHS 5.使用 vRealize Log Insight 导入程序-vRealize-Log-Insight-4.7-importer-guide.pdf