As a developer, you need to build software in a secure way. But you can't spend all your time focusing on security. The answer is to use good design principles, tools, and mindsets that make security an implicit result - it's secure by design. Secure by Design teaches developers how to use design to
Security by Design
✍ Scribed by Anthony J. Masys
- Publisher
- Springer International Publishing
- Year
- 2018
- Tongue
- English
- Leaves
- 401
- Series
- Advanced Sciences and Technologies for Security Applications
- Edition
- 1st ed.
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This edited book captures salient global security challenges and presents ‘design’ solutions in dealing with wicked problems. Through case studies and applied research this book reveals the many perspectives, tools and approaches to support security design. Security design thereby can support risk and threat analysis, risk communication, problem framing and development of interventions strategies. From the refugee crisis to economic slowdowns in emerging markets, from ever-rising numbers of terrorist and cyberattacks to global water shortages, to the proliferation of the Internet of Things and its impact on the security of our homes, cities and critical infrastructure, the current security landscape is diverse and complex. These global risks have been in the headlines in the last year (Global Risks Report) and pose significant security challenges both nationally and globally. In fact, national security is no longer just national. Non-state actors, cyber NGO, rising powers, and hybrid wars and crimes in strategic areas pose complex challenges to global security. In the words of Horst Rittel (1968):"Design is an activity, which aims at the production of a plan, which plan -if implemented- is intended to bring about a situation with specific desired characteristics without creating unforeseen and undesired side and after effects."
✦ Table of Contents
Front Matter ....Pages i-vi
Introduction (Anthony J. Masys)....Pages 1-9
Design Thinking and Design Doing: Describing a Process of People-Centred Innovation (Rama Gheerawo)....Pages 11-42
An Integral Futures Lens on Future Security Issues (Craig Perry, Andy Hines)....Pages 43-54
Innovations in Active Shooting Emergency Medical Response and Triage (Bradley Keating, Anthony J. Masys)....Pages 55-72
Mass Migration, Humanitarian Assistance and Crisis Management: Embracing Social Innovation and Organizational Learning (Miriam Kaundert, Anthony J. Masys)....Pages 73-91
Complexity and Unintended Consequences in a Human Security Crisis: A System Dynamic Model of the Refugee Migration to Europe (Ivan Taylor, Anthony J. Masys)....Pages 93-136
Cyber-Physical Systems Governance: A Framework for (Meta)CyberSecurity Design (Polinpapilinho F. Katina, Charles B. Keating)....Pages 137-169
To Feel Secure or to Be Secure, That Is the Question (Erik Hollnagel)....Pages 171-180
Clustering Heterogeneous Semi-structured Social Science Datasets for Security Applications (D. B. Skillicorn, C. Leuprecht)....Pages 181-191
Critical Infrastructure Protection and Resilience—Integrating Interdependencies (Frédéric Petit, Duane Verner, Julia Phillips, Lawrence Paul Lewis)....Pages 193-219
The Application of Warden’s Concentric Ring Theory to Applegate’s Offensive Cyber Manoeuvre Strategy in Modern Conflicts (David G. Wood)....Pages 221-252
Fentanyl Crisis: A National Security Matter (Corey Tsang, Anthony J. Masys)....Pages 253-272
Risk-Based Aviation Security—Designing-Out Terror? (Simon Bennett)....Pages 273-290
Customizing Web-EOC Crisis Management Software to Facilitate Collaboration and Increase Situational Awareness: Advances in Business Resource Center (BRC) Design for Business Continuity Management (Jason Levy, Ross Prizzia)....Pages 291-316
Advances in Cybersecurity Design: An Integrated Framework to Quantify the Economic Impacts of Cyber-Terrorist Behavior (JiYoung Park, Jason Levy, Minsu Son, Changkeun Park, Ha Hwang)....Pages 317-339
Operationalizing ‘Deliverology’ for Humanitarian Aid and Disaster Risk Reduction: Accelerating Improvement in Delivery (Anthony J. Masys)....Pages 341-359
Nuclear Waste Management: Security and Safety Implications (Suzanne Waldman, Anthony J. Masys)....Pages 361-374
Building Effective Emergency Management Public-Private Partnerships (PPP) for Information Sharing (Jason Levy, Ross Prizzia)....Pages 375-401
✦ Subjects
Criminology and Criminal Justice; Cybercrime; Security Science and Technology; Computational Intelligence; Software Management; Simulation and Modeling
📜 SIMILAR VOLUMES
As a developer, you need to build software in a secure way. But you can't spend all your time focusing on security. The answer is to use good design principles, tools, and mindsets that make security an implicit result - it's secure by design. <i>Secure by Design</i> teaches developers how to us
<p>Der Softwareingenieur von heute muss die grundlegende Disziplin der Entwicklung sicherer informationstechnischer Systeme verstehen. Nicht, weil es eine ein „gute Idee“ ist, sondern weil unsere Arbeits- und Lebenswelten zunehmend auf die Funktionsfähigkeit und die Sicherheit hochkomplexer und dyna
<p>Asia is rising and will wield greater economic and strategic weight in world affairs. However Asia also faces numerous challenges like poverty, domestic instability, deficiencies in governance and the rule of law, inter-state disputes and rivalries, and military build-ups, to name just a few. The
Oracle security expert David Knox explains how to design and develop an integrated, secure Oracle environment. "In my experience in the security world, including 32 years at the Central Intelligence Agency, I've not found anyone with more experience in the theory and practice of protecting your data