Search
Search Results
-
Security and Privacy
Computer security or cybersecurity is concerned with the proper functioning of computer systems despite the actions of adversaries. Privacy is about... -
Planning for Alternative Networks: Cloud Security and Zero Trust
This chapter discusses alternative network configurations: cloud computing and the advanced network configuration: zero trust. The vast majority of... -
Preparing for Forensic Analysis
This chapter is intimately linked with Incident Response. First you respond to an incident to contain it, then you must analyze it. It is important... -
Complying with HIPAA and HITECH
The Health Insurance Portability & Accountability Act (HIPAA) of 1996 was a bipartisan bill implemented as part of United States law. HIPAA addressed... -
Complying with the European Union General Data Protection Regulation (GDPR)
Europe has a common overarching regulation that focuses on data privacy and is exemplary in the rights it affords its constituents. This chapter... -
Planning for Secure Software Requirements and Design with UML
It is not possible to build an excellent software product quickly without understanding the requirements. It is known in the security world (and... -
Security Awareness: Brave New World
Computer security is a challenge. An attacker only needs to find one hole…but a defender needs to close all holes. Since it is impossible to close... -
Complying with the PCI DSS Standard
It is hard to be in business without making money, so one of the first standards that must be adhered to internationally, is the Payment Card... -
Designing Information Security
Criminals and spies concentrate on stealing, modifying or destroying financial account information, trade secrets, and internal organization data.... -
AI Instruments for Risk of Recidivism Prediction and the Possibility of Criminal Adjudication Deprived of Personal Moral Recognition Standards: Sparse Notes from a Layman
In what follows lies a recount of a concerned criminal lawyer, a layman, as he observes the change foreshadowed by AI in the field of individual risk... -
Liability for AI Driven Systems
This article tries to assess if the current civil liability regimes provide a sound framework to tackle damages when AI systems—especially those... -
Microsoft Azure Lab
The chapter instructs how to develop and manage cloud resources using the Microsoft Azure cloud platform. You will follow step-by-step instructions... -
Numbering Systems and Subnetting
Machines communicate using digital bits or “ones” and “zeros.” Of course, people do not naturally communicate that way. Therefore, to more easily... -
Amazon Web Services (AWS) Lab
This chapter contains step-by-step instructions with snapshots of an AWS three-tier web architecture lab utilizing the Free Tier service provided by... -
Cloud Platform
The Google Cloud Platform (GCP) global infrastructure is presented in this chapter. Google’s global infrastructure presently includes 35 regions that... -
Amazon Web Services (AWS)
This chapter first examines the AWS global infrastructure, which includes availability zones, regions, edge locations, and regional edge caches. It... -
Cloud Computing Concepts
This chapter examines the fundamentals of cloud computing and its applications. Beginning with the National Institute of Standards and Technology... -
Challenges of Usable Privacy
A thorough understanding of usable privacy research challenges is essential for ensuring high-quality research, improving methods and avoiding... -
Complying with U.S. Security Regulations
What security regulation(s) must your organization adhere to? What must you implement as part of that regulation? How important is it to adhere to... -
Maturing Ethical Risk
The pervasive and accepted thought when dealing with cybersecurity is to evaluate risk from the organization’s perspective: the organization protects...