“Cyber Security Essentials”
by James Graham (Editor), Ryan Olson (Editor), Rick Howard (Editor)
Review by E.R. "Mike" Anders
“Cyber Security Essentials” is aptly titled. Anyone seeking a clear explanation of the fundamental concepts associated with “Cyber Security” will find what they are looking for here. In fact, the very first chapter focuses on the fundamentals of Information Assurance. What follows are chapters that build on this body knowledge and fundamental concepts to finish the book with a concise treatment of cyber defense and analysis techniques.
There is a lot between the covers of this book. And the executive editors are well aware. Consequently, they have presented the essays in the book so the book can be read from start to finish, or as a “desktop reference” as the say in their own words:
“We don’t want you to read this from cover to cover. Go to the table of contents, pick a topic you are interested in, and understand it.”
Once you “understand it” you can then jump around, if you want to. I like that! And, the way the content is internally organized supports such an approach. Perhaps one of the best examples is the section on Basic Cryptography. The section contains the clearest and easiest to understand description of symmetric and asymmetric encryption as one would want. I suspect that may be one reason why “Cyber Security Essentials” can be found among the require course material at colleges and universities around the country where cyber security is being taught. For those who might think their dissection of Public Key Encryption is too basic, the editors dive, headfirst, without hesitation, into the RSA system, but with this caveat:
“. . . the math involved is somewhat cumbersome for the confines of this text . . .”
The math is then well explained, if indeed simplified, and adequately cited as well. If you like, you can check for yourself the relevant iDefense Weekly Threat Report articles, or even seek out Rivest, Shamir, and Adleman’s own published work. I champion such an approach. For those who want more, they can use chapter and sections of this book as launch points for further research and learning on their own. Still, even after putting "Essentials . . ." down, I suspect many will come back to both reference and review the material covered, that includes, but is not limited to, the chapters on the Domain Name System (DNS), Fraud Techniques, Exploitation Techniques, and Malicious Code. I already mentioned the Chapter on Defense and Analysis Techniques. But, also of value is the chapter listing iDefense Special File Investigation Tools for those of us who are cyber tool junkies!
I am looking forward to follow-on editions of “Cyber Security Essentials.” The very nature of the subject begs for it. Not a lecture, just an observation.
- Mike Anders, Cyber Intelligence Professional, CEH, C|HFI, Security+