Higher Education

shoe image

Cybersecurity: Engineering a Secure Information Technology Organization (Print on Demand)

Author(s): Dan Shoemaker | Kenneth Sigler

ISBN: 9788131520482

1st Edition

Copyright: 2015

India Release: 2015

₹755

Binding: Paperback

Pages: 302

Trim Size: 279 x 216 mm

Refer Book

Order Inspection Copy

Software is vital yet vulnerable, with risks across its lifecycle that attackers often exploit. This comprehensive guide goes beyond secure coding to cover rigorous processes aligned with ISO/IEEE 12207-2008. It introduces proven frameworks like ISO 21827, CERT-RMM, and NIST 800-53, addressing threat evaluation, assurance cases, and adversarial testing. Designed for cybersecurity professionals, the text equips readers to manage secure, cost-effective software operations and ensure defect-free systems across both public and private sectors.

  • Complete, thorough coverage of the ISO/IEEE 12207-2008 System and Software Lifecycle Processes Standard, detailing all elements, activities, and practices encompassed by this universally accepted set of guidelines.
  • Explores four of the most influential and effective models for establishing a secure system and software operation, preparing readers to apply ISO 21827 (SSE-CMM), CERT-RMM, the Software Assurance Maturity Model, and NIST 800-53 in real-world environments.
  • Emphasizes rigorous processes and detailed standards to provide a framework for managing complex functions, but they also address practical considerations for real-world implementation--including tailoring general models to the requirements of specific operations and organizations.
  • Covers high-level concepts and frameworks, detailed tasks and activities, and practical applications and examples, equipping readers to align lifecycle IT functions with business processes and stakeholder expectations.
  • Provides a uniquely comprehensive guide to software cybersecurity, outlining processes and activities related to acquisition, development, operation, and maintenance to ensure defect-free systems and software.

1. Lifecycle Management.

2. The Agreement Processes.

3. Organizational Project Enabling Processes.

4. Project Processes.

5. Technical Processes.

6. Software Implementation Process Group.

7. Software Supporting Processes and Software Reuse.

8. Standard Process Models to Secure Information and Communications Technology.

9. The Systems Security Engineering Capability Maturity Model (ISO 21827).

10. Software Assurance Maturity Model.

11. Building Security In Maturity Model.

12. Aligning the ICT Organization with Regulatory Requirements.

Dan Shoemaker

Dan Shoemaker is a professor and senior research scientist at the Center for Cyber Security and Intelligence Studies--a National Security Agency (NSA) Center of Academic Excellence--at the University of Detroit Mercy (UDM).

 

Kenneth Sigler

Ken Sigler has been a faculty member of the Computer Information Systems (CIS) program at the Auburn Hills, Michigan, campus of Oakland Community College (OCC) since 2001, and he has served as department chair since 2011.