No products
M00002159
New product
In stock
Most organizations place a high priority on keeping data secure, but not every organization invests in training its engineers or employees in understanding the security risks involved when using or developing technology. Designed for the non-security professional, What Every Engineer Should Know About Cyber Security and Digital Forensics is an overview of the field of cyber security.
Exploring the cyber security topics that every engineer should understand, the book discusses:
Network security
Personal data security
Cloud computing
Mobile computing
Preparing for an incident
Incident response
Evidence handling
Internet usage
Law and compliance
Security and forensic certifications
Application of the concepts is demonstrated through short case studies of real-world incidents chronologically delineating related events. The book also discusses certifications and reference manuals in the area of cyber security and digital forensics.
By mastering the principles in this volume, engineering professionals will not only better understand how to mitigate the risk of security incidents and keep their data secure, but also understand how to break into this expanding profession.
Security Threats
Social Engineering
Travel
Mobile Devices
Internet
The Cloud
Cyber Physical Systems
Theft
Cyber Security and Digital Forensics Careers
Career Opportunities
Certifications
Cyber Security
Information Security
Security Architecture
Access Controls
Cryptography
Network and Telecommunications Security
Operating System Security
Software Development Security
Database Security
Business Continuity and Disaster Recovery
Physical Security
Legal, Regulations, Compliance, and Investigations
Operations Security
Information Security Governance and Risk Management
Preparing for an Incident
Risk Identification
Host Preparation
Network Preparation
Establishing Appropriate Policies and Procedures
Establishing an Incident Response Team
Preparing a Response Toolkit
Training
Incident Response and Digital Forensics
Incident Response
Incident Response for Cloud Computing
Digital Forensics
Mobile Phone Forensics
The Law
Compliance
Laws for Acquiring Evidence
Evidence Rules
E-discovery
Case Law
Theory to Practice
Case Study 1: It Is All Fun and Games until Something
Gets Deleted
Case Study 2: How Is This Working for You?
Case Study 3: The Weakest Link
Joanna DeFranco is an assistant professor of software engineering and a member of the graduate faculty at Penn State University. She has also held academic positions at New Jersey Institute of Technology and Cabrini College. Prior to her academic career, she spent many years as a software engineer for government and industry. Notable experiences during this period included traveling the world on naval scientific ships that collected ocean floor map data and worked on the development of cable head-end devices for Motorola. She has written many journal articles and contributed to conference proceedings on effective software and systems engineering problem solving, as well as digital forensics. She has also coauthored a project management book.
Dr. DeFranco is a certified computer forensics examiner (CCFE) and teaches computer and cyber forensics at Penn State. She also teaches courses on software engineering, project management, and problem solving, which have all had an influence on her perspective of cyber security and digital forensics. She is on the curriculum advisory board for computer forensics at Middle Bucks Institute of Technology and is a member of the American Society for Engineering Education (ASEE). She earned a BS in electrical engineering from Penn State, an MS in computer engineering from Villanova University, and a PhD in computer and information science from New Jersey Institute of Technology.
"Professor DeFranco has taken a very complex subject and distilled the knowledge into a very effective guide … [and] has chosen a series of topics that connect to the real world of cyber security, incident response, and investigation. I think the book will make a valuable resource tool for anyone looking to get involved in the field, as well as those with years of experience."
—Robert L. Maley, Founder, Strategic CISO