ECU Libraries Catalog
Librarian View
LEADER 03750cam 2200421 i 4500
001
on1368400610
003
OCoLC
005
20231106090711.0
008
230206t20232023maua b 001 0 eng d
020
a| 9780137929238
q| paperback
020
a| 0137929234
q| paperback
035
a| (Sirsi) o1368400610
035
a| (OCoLC)1368400610
040
a| IPL
b| eng
e| rda
c| IPL
d| NMW
d| OCLCF
d| YDX
d| JG0
d| FTB
d| VP@
d| UtOrBLW
049
a| EREE
050
4
a| QA76.9.A25
b| S73 2023
082
0
4
a| 005.8
2| 23
100
1
a| Spafford, Eugene H.,
e| author.
=| ^A1462238
245
1
0
a| Cybersecurity myths and misconceptions :
b| avoiding the hazards and pitfalls that derail us /
c| Eugene H. Spafford, Leigh Metcalf, and Josiah Dykstra ; illustrations by Pattie Spafford.
264
1
a| Boston :
b| Addison-Wesley,
c| [2023]
264
4
c| ©2023
300
a| xxxv, 380 pages :
b| illustrations ;
c| 24 cm
336
a| text
b| txt
2| rdacontent
337
a| unmediated
b| n
2| rdamedia
338
a| volume
b| nc
2| rdacarrier
504
a| Includes bibliographical references and index.
505
0
a| Foreword / by Vint Cerf -- Introduction -- Part I. General issues. What is cybersecurity? -- What is the internet? -- Part II. Human issues. Faulty assumptions and magical thinking -- Fallacies and misunderstandings -- Cognitive biases -- Perverse incentives and the cobra effect -- Problems and solutions -- Part III. Contextual issues. Pitfalls of analogies and abstractions -- Legal issues -- Tool myths and misconceptions -- Vulnerabilities -- Malware -- Digital forensics and incident response -- Part IV. Data issues. Lies, damn lies, and statistics -- Illustrations, visualizations and delusions -- Finding hope -- Appendix: Short background explanations -- Acronyms -- Index
520
a| "Cybersecurity is fraught with hidden and unsuspected dangers and difficulties. Despite our best intentions, there are common and avoidable mistakes that arise from folk wisdom, faulty assumptions about the world, and our own human biases. Cybersecurity implementations, investigations, and research all suffer as a result. Many of the bad practices sound logical, especially to people new to the field of cybersecurity, and that means they get adopted and repeated despite not being correct. For instance, why isn't the user the weakest link? In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom; they offer expert practical advice for avoiding or overcoming each myth. Whatever your cybersecurity role or experience, Eugene H. Spafford, Leigh Metcalf, and Josiah Dykstra will help you surface hidden dangers, prevent avoidable errors, eliminate faulty assumptions, and resist deeply human cognitive biases that compromise prevention, investigation, and research. Throughout the book, you'll find examples drawn from actual cybersecurity events, detailed techniques for recognizing and overcoming security fallacies, and recommended mitigations for building more secure products and businesses."--
c| Provided by publisher
650
0
a| Computer security.
=| ^A257308
650
7
a| Computer security.
2| fast
0| (OCoLC)fst00872484
700
1
a| Metcalf, Leigh
c| (Computer security researcher),
e| author.
=| ^A1461923
700
1
a| Dykstra, Josiah,
e| author.
=| ^A1461384
700
1
a| Spafford, Pattie,
e| illustrator.
=| ^A1461924
700
1
a| Cerf, Vinton G.,
d| 1943-
e| writer of foreword.
=| ^A114572
994
a| C0
b| ERE
596
a| 1
998
a| 6025201
999
a| QA76.9.A25 S73 2023
w| LC
c| 1
i| 30372017352250
d| 9/20/2023
e| 9/19/2023
l| JGES
m| JOYNER
q| 1
r| Y
s| Y
t| JGESBK
u| 4/20/2023
x| BOOK
z| JSTACKS
o| .STAFF. jjlm