Table of Contents
List of Figures vii
Preface ix
Building a Secure and Sustainable Cyberspace Ecosystem: An Overview D. Frank Hsu 1
Part I Technology
Improving Cyber Security Ruby B. Lee 37
Practical Vulnerabilities of the Tor Anonymity Network Paul Syverson 60
Defending Software Systems against Cyber Attacks throughout Their Lifecycle Hira Agrawal Thomas F. Bowen Sanjai Narain 74
Improve Availability of Networks: Internet Exchange Points and Their Role in Cyberspace Akio Sugeno 90
Part II Operations
Tor: Uses and Limitations of Online Anonymity Andrew Lewman 109
Authoritative Data Sources: Cyber Security Intelligence Perspectives Kuan-Tsae Huang Hwai-Jan Wu 121
The Evolving Consumer Online Threat Landscape: Creating an Effective Response Adam Palmer 139
Partners in Cybercrime Eileen Monsma Vincent Buskens Melvin Soudijn Paid Nieuwbeeita 146
Part III Experiences
Securing IT Networks Incorporating Medical Devices: Risk Management and Compliance in Health Care Cyber Security Nicholas J. Mankovich 173
Computer Forensics from a Law Enforcement Perspective Kevin Kelly 188
Computer Crime Incidents and Responses in the Private Sector Edward M. Stroz 200
Information Technology for a Safe and Secure Society in Japan: Toward a Cyber-Physical Solution Kazuo Takaragi 207
Part IV Partnership, Policy, and Sustainability
Public-Private Partnerships Changing the World Kathleen L. Kiernan Dyann Bradbury 221
Cyber Security: Protecting Our Cyber Citizens Preet Bharara 226
Cyber Security: Safeguarding Our Cyberspace Robert S. Mueller 235
Cyber Security: Securing Our Cyber Ecosystem Howard A. Schmidt 241
List of Contributors 245
Index 251