The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.
To accomplish this, the team of security professionals from VeriSign’s iDefense® Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the This book is not about the latest attack trends or botnets. It’s about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.
Rick is the President of the Cybersecurity Canon Project, a volunteer nonprofit seeking to be the Infosec Community’s first source for curated and timeless cybersecurity content. His prior jobs include Chief Security Officer, Chief Analyst, Senior Fellow, and podcast host at The Cyberwire (a cybersecurity podcasting network), CSO for Palo Alto Networks (a security vendor), CISO for TASC (government contractor), GM for iDefense (A commercial cyber threat intelligence service at Verisign), Global SOC Director for Counterpane (one of the original MSSPs), and Commander for the U.S. Army’s Computer Emergency Response Team where he coordinated network defense, network intelligence and network attack operations for the Army's global network. He was one of the founding organizers of the Cyber Threat Alliance (an ISAC for security vendors) and he is the co-founder of the Cybersecurity Canon Project; a Rock & Roll Hall of Fame for cybersecurity books. Rick holds a Master of Computer Science degree from the Naval Postgraduate School and an engineering degree from the US Military Academy. He also taught computer science at the Academy from 1993 to 1999. He has published one book on cybersecurity and has been the executive editor for two others.
So far this book is very informative to all aspects of Cyber Security and how to defend and protect all your desktops, laptops, tablets and mobile phones against all types of viruses, malware, trojans, phishing attacks and scams and the online tools and utilities needed to prevent these things from happening to you.
“Cyber Security Essentials” by James Graham (Editor), Ryan Olson (Editor), Rick Howard (Editor) Review by E.R. "Mike" Anders
“Cyber Security Essentials” is aptly titled. Anyone seeking a clear explanation of the fundamental concepts associated with “Cyber Security” will find what they are looking for here. In fact, the very first chapter focuses on the fundamentals of Information Assurance. What follows are chapters that build on this body knowledge and fundamental concepts to finish the book with a concise treatment of cyber defense and analysis techniques.
There is a lot between the covers of this book. And the executive editors are well aware. Consequently, they have presented the essays in the book so the book can be read from start to finish, or as a “desktop reference” as the say in their own words:
“We don’t want you to read this from cover to cover. Go to the table of contents, pick a topic you are interested in, and understand it.”
Once you “understand it” you can then jump around, if you want to. I like that! And, the way the content is internally organized supports such an approach. Perhaps one of the best examples is the section on Basic Cryptography. The section contains the clearest and easiest to understand description of symmetric and asymmetric encryption as one would want. I suspect that may be one reason why “Cyber Security Essentials” can be found among the require course material at colleges and universities around the country where cyber security is being taught. For those who might think their dissection of Public Key Encryption is too basic, the editors dive, headfirst, without hesitation, into the RSA system, but with this caveat:
“. . . the math involved is somewhat cumbersome for the confines of this text . . .”
The math is then well explained, if indeed simplified, and adequately cited as well. If you like, you can check for yourself the relevant iDefense Weekly Threat Report articles, or even seek out Rivest, Shamir, and Adleman’s own published work. I champion such an approach. For those who want more, they can use chapter and sections of this book as launch points for further research and learning on their own. Still, even after putting "Essentials . . ." down, I suspect many will come back to both reference and review the material covered, that includes, but is not limited to, the chapters on the Domain Name System (DNS), Fraud Techniques, Exploitation Techniques, and Malicious Code. I already mentioned the Chapter on Defense and Analysis Techniques. But, also of value is the chapter listing iDefense Special File Investigation Tools for those of us who are cyber tool junkies!
I am looking forward to follow-on editions of “Cyber Security Essentials.” The very nature of the subject begs for it. Not a lecture, just an observation.
- Mike Anders, Cyber Intelligence Professional, CEH, C|HFI, Security+