Skip to main content

and
  1. Chapter

    Erratum

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)

  2. No Access

    Chapter

    Mobile Forensics

    This chapter covers the forensic process with mobile devices. The forensics will explore the call history, mobile browser, and types of devices. The exercises will focus on the operating systems, device states...

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)

  3. No Access

    Chapter

    Web and Database Security

    Security in web applications is the most important concern when it comes to processing transactions in the web. One of the major issues is the security and privacy of data and information transferred, stored a...

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)

  4. No Access

    Chapter

    Web Forensics-Chapter Competencies

    This chapter covers web forensic procedures commonly used by digital forensics professionals. The focus of the is on email communications, web browsing, and archived transmissions. The chapter explores the p...

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)

  5. No Access

    Chapter

    Network Security

    Providing appropriate protection techniques is significant to combat cyber-threats and preserve the integrity, confidentiality and availability of computer networks. The increasing volume of malicious cyber-at...

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)

  6. No Access

    Chapter

    Network Forensics: Lesson Plans

    A forensic investigator who is analyzing computer equipment for possible evidences, will search different locations for possible traces. We described in other chapters the types of evidences that can be found ...

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)

  7. No Access

    Chapter

    Introduction to Information Security

    Nowadays, security is becoming number one priority for governments, organization, companies, and individuals. Security is all about protecting critical and valuable assets. Protecting valuable and critical ass...

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)

  8. No Access

    Chapter

    Security and Access Controls: Lesson Plans

    Access controls are considered as important security mechanisms. They usually target (authenticated users: Those users who can legally access subject information system or resource). This indicates that they t...

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)

  9. No Access

    Chapter

    Encryption and Information Protection/Integrity and Concealment Methods: Lesson Plans

    Information protection is a key goal to most of information security controls. Without information hiding and protection mechanisms the whole e-commerce and remote communication mechanisms will not be possible...

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)

  10. No Access

    Chapter

    Software Code Security: Lesson Plans

    In information systems, software programs are major components that exist to implement services/functions. They integrate hardware, network and environment to provide services for users that can vary based on ...

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)

  11. No Access

    Chapter

    Disk and Computer Forensics: Lesson Plans

    In , many software and hardware components can be searched for possible relevant evidences. Digital forensic investigators should not only have knowledge on the subject case, but also on technical skills rela...

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)

  12. No Access

    Chapter

    The Ontology of Malwares

    Absolute security is almost impossible. On a daily basis the security of many systems is compromised. Attackers utilize different techniques to threaten systems’ security. Among different threats to systems’ s...

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)

  13. No Access

    Chapter

    Security and Risk Management and Planning: Lesson Plans

    This chapter covers risk management and planning associated with information security. The focus is on incident responses, disaster recovery, and business continuity. The chapter explains risks, strategies, co...

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)

  14. No Access

    Chapter

    Mobile and Wireless Security: Lesson Plans

    Mobile and wireless by humans continue to grow rapidly in the last few years. Number of subscribers to mobile service provides exceed the number of human population (As in many cases, users carry more tha...

    Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud in Practical Information Security (2018)