Home Page Icon
Home Page
Table of Contents for
Cover
Close
Cover
by Josiah Dykstra
Essential Cybersecurity Science
Preface
Who This Book Is For
What This Book Contains
Conventions Used in This Book
SafariĀ® Books Online
How to Contact Us
Disclaimer
Acknowledgments
1. Introduction to Cybersecurity Science
What Is Cybersecurity Science?
The Importance of Cybersecurity Science
The Scientific Method
Cybersecurity Theory and Practice
Pseudoscience
Human Factors
Roles Humans Play in Cybersecurity Science
Human Cognitive Biases
The Role of Metrics
Conclusion
References
2. Conducting Your Own Cybersecurity Experiments
Asking Good Questions and Formulating Hypotheses
Creating a Hypothesis
Security and Testability
Designing a Fair Test
Analyzing Your Results
Putting Results to Work
A Checklist for Conducting Experimentation
Conclusion
References
3. Cybersecurity Experimentation and Test Environments
Modeling and Simulation
Open Datasets for Testing
Desktop Testing
Cloud Computing
Cybersecurity Testbeds
A Checklist for Selecting an Experimentation and Test Environment
Conclusion
References
4. Software Assurance
An Example Scientific Experiment in Software Assurance
Fuzzing for Software Assurance
The Scientific Method and the Software Development Life Cycle
Adversarial Models
Case Study: The Risk of Software Exploitability
A New Experiment
How to Find More Information
Conclusion
References
5. Intrusion Detection and Incident Response
An Example Scientific Experiment in Intrusion Detection
False Positives and False Negatives
Performance, Scalability, and Stress Testing
Case Study: Measuring Snort Detection Performance
Building on Previous Work
A New Experiment
How to Find More Information
Conclusion
References
6. Situational Awareness and Data Analytics
An Example Scientific Experiment in Situational Awareness
Experimental Results to Assist Human Network Defenders
Machine Learning and Data Mining for Network Monitoring
Case Study: How Quickly Can You Find the Needle in the Haystack?
A New Experiment
How to Find More Information
Conclusion
References
7. Cryptography
An Example Scientific Experiment in Cryptography
Experimental Evaluation of Cryptographic Designs and Implementation
Provably Secure Cryptography and Security Assumptions
Cryptographic Security and the Internet of Things
Case Study: Evaluating Composable Security
Background
A New Experiment
How to Find More Information
Conclusion
References
9. Malware Analysis
An Example Scientific Experiment in Malware Analysis
Scientific Data Collection for Simulators and Sandboxes
Game Theory for Malware Analysis
Case Study: Identifying Malware Families with Science
Building on Previous Work
A New Experiment
How to Find More Information
Conclusion
References
10. System Security Engineering
An Example Scientific Experiment in System Security Engineering
Regression Analysis
Moving Target Defense
Case Study: Defending Against Unintentional Insider Threats
How to Find More Information
Conclusion
References
11. Human-Computer Interaction and Usable Security
An Example Scientific Experiment in Usable Security
Double-Blind Experimentation
Usability Measures: Effectiveness, Efficiency, and Satisfaction
Methods for Gathering Usability Data
Testing Usability During Design
Testing Usability During Validation and Verification
Case Study: An Interface for User-Friendly Encrypted Email
A New Experiment
How to Find More Information
Conclusion
References
12. Visualization
An Example Scientific Experiment in Cybersecurity Visualization
Graphical Representations of Cybersecurity Data
Experimental Evaluation of Security Visualization
Case Study: Is My Visualization Helping Users Work More Effectively?
How to Find More Information
Conclusion
References
A. Understanding Bad Science, Scientific Claims, and Marketing Hype
Dangers of Manipulative Graphics and Visualizations
Recognizing and Understanding Scientific Claims
Vendor Marketing
Clarifying Questions for Salespeople, Researchers, and Developers
References
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Essential Cybersecurity Science
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset