Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Book Reviews

Submission + - Security Strategy: From Requirements to Reality.

brothke writes: Untitled documentol{margin:0;padding:0}p{margin:0}.c1{line-height:1.15;text-indent:0pt;text-align:justify;direction:ltr}.c4{color:#000099;font-size:12pt;text-decoration:underline;font-family:Garamond}.c5{line-height:1.15;text-indent:0pt;direction:ltr}.c0{color:#000000;font-size:12pt;font-family:Garamond}.c3{font-style:italic}.c2{background-color:#ffffff}

Security Engineering: A Guide to Building Dependable Distributed Systems by Ross Anderson is arguably the best information security book ever written. Anderson’s premise is that security technology needs to take a structured engineering approach to systems design, with detailed requirements and specification from start-up to development and implementation; just as those designing buildings and bridges do. Without a deeply embedded structured approach to security systems design, Anderson argued that we find ourselves in the situation we are in today, with applications and operating systems full of bugs, vulnerabilities and other serious security flaws.





As good as Security Engineering is, it was not written to be a detailed information security design guide. That vacuum has been filled by an incredibly important and valuable new book Security Strategy: From Requirements to Reality.





Security Strategy is one of the first books that shows how to perform a comprehensive information security assessment and design, from section, development and deployment of a security strategy best suited to a specific organization.





The books main focus is on the planning, requirements and execution need to ensure formal and comprehensive information security elements are built into systems, applications and processes.





Authors Bill Stackpole and Eric Oksendahl each have over 25 years in the industry and the book reflects their vast expertise. Oksendahl spent time at Boeing, one of the most security aware organizations, with Stackpole spending a decade at Microsoft. While Microsoft is chided for creating more insecurity than security, it is worth noting that no organization in the world has spent more on training its staff and developers on security than Microsoft.





The books 300 densely written pages are composed of 14 chapters divided into 2 sections. Section one (chapters 1-6) is about strategy, with section two (chapters 7-14) around tactics.





Complete with checklists of the physical security requirements that organizations should consider when evaluating or designing facilities, the book provides the insight needed to enable an organization to achieve the operational efficiencies, cost reductions, and brand enhancements that are possible when an effective security strategy is put into action.





Chapters 1-3 take a high-level overview on how to approach strategy, with its many details. The authors note that strategy is a long-term plan of action designed to achieve a goal that includes what work will be done and by whom. This is not a trivial task, as many organizations simply roll-out a new technology, without defining what its goals are, and who exactly will manage and support this new technology.





Chapter 4 is where the hard work begins, as this chapter details the issues around strategic planning. Noting that strategic security planning is hard work and takes time; many organizations attempt to take an assumed easier path, that of bypassing security details and specifications. That is precisely why information security is in such a sorry state in many firms. These firms would rather buy a security appliance and place it in their data center and hope it works; rather than defining the details and specifications of what the appropriate appliance is in the first place.





Part 2 commences on the topic of tactics, and defines them as procedures or sets of actions used to achieve a specific objective. What this chapter does well, as does the entire book, is that it compels the reader to focus on specifics and objectives.





Chapter 9 gets into the importance of observation, in knowing what is going on within the network. The book notes that observation is both a deterrent and a detector. The chapter goes into detail about how observation works both in the physical world and its corollary use in the network side. The chapter breaks down the various functions needed to ensure that observation is done correctly; as opposed to the common method of simply rolling out an IDS and hoping that it somehow works.





Chapter 11 details the SDL (security development lifecycle). As the chapter notes, an effective SDL can improve application security via the use of a set of development practices designed to reduce or eliminate exploitable vulnerabilities. The issue though is that far too few organizations realize the need for a SDL, let alone take the time to design and deploy it.





Chapter 14 ends on the topic of security awareness training. While the notion of security awareness for many firms is an annual 10-slide PowerPoint; the authors take a pragmatic approach and detail the various parts of what makes for an effective awareness program.





Security Strategy: From Requirements to Reality is an incredibly valuable book that advances the state of information security. For organizations that are looking to get serious about information security, and those that want to go from good to great, the book is an invaluable guide that lays the groundwork on how to develop a first-rate information security infrastructure.





Taking a look at its table of contents shows the many fine points in which the book goes into each particular point, showing how it can be properly designed and deployed for effective security controls.





My only peeve with the book is that it lacked a CD-ROM or web site in which to download the many tables and matrices the book is built on. It is hoped that future editions will have them available.





Security Strategy: From Requirements to Reality is one of the best information security books of the last few years. Those who are serious about information security will ensure this is on their reading list, and that of everyone in their organization tasked with information security.







Ben Rothke is the author of Computer Security: 20 Things Every Employee Should Know.
Book Reviews

Submission + - bookreview (amazon.com)

brothke writes: CyberForensics: Understanding Information Security Investigations is a new book written by a cast of industry all-stars. The book takes a broad look at cyberforensics with various case studies. Each of the books 10 chapters takes a different approach to the topic. The book is meant to be a source guide to the core ideas on cyberforensics.

The book notes that there is a cohesive set of concepts that binds cybersecurity investigators to a shared vision, of which is tries to be a source to. But at 150 pages, while all of the chapters are well-written and enlightening, the book does not have the breadth and depth needed to be a single source of all things cyberforensics.

Jennifer Bayuk is the books editor, who also wrote the introduction. I reviewed two of Bayuk’s books on this site, Stepping Through the InfoSec Program and Enterprise Security For the Executive. Bayuk’s introduction provides a historical background to the subject and puts things into context. The chapter uses a fantastic visual tool to explain the complete cyberforensic framework.

Chapter 2 is about the Complex World of Corporate CyberForencisc Investigations, and does a good job of detailing the various elements involved in getting various corporate departments integrated during an investigation. IT in an enterprise setting is fraught with challenges. Performing a forensic investigation in enterprise IT is even more challenging. Often these groups have different agendas and react quite different to a forensic event. The author uses the analogy of a puzzle, which can be complex to put together, but is challenging and necessary nonetheless.

Many of the chapters take a broader view of the topic, while others are quite detailed. Perhaps the best chapter in the book is chapter 6 – Analyzing Malicious Software from Lenny Zeltser. The chapter is an outgrowth of Zeltser’s SANS Security 569 course on the topic. The chapter use of a case study to detail the behaviors analysis of malicious code provides an excellent synopsis of how to analyze and debug malicious code.

Chapter 7 on Network Packet Forensics from Eddie Schwartz is another exceptional chapter that provides the reader with a walk-through of using various digital forensic input to solve an incident.

Chapter 10 in Cybercrime and Law Enforcement Cooperation is about how to interface with law enforcement during a cyberforensic investigation. This may be the Achilles heel of forensics is that getting external cooperation is difficult at best, and often impossible. A recent example of this is when a friend of mine who had detailed information about the source of the Stuxnet worm. He attempted to share the information with law enforcement without much success. The various organizations were not receptive to it and didn’t to take action on his well-researched claims.

The book is written for an experienced practitioner who wants an overview of current trends. This is not a for dummies type of book. Readers are expected to be comfortable with varied topics such as Wireshark packet capture, code analysis, investigations, and more. Those looking for an introduction to cyberforensics should definitely consider another title such as Computer Forensics for Dummies.

A problem with books of collaborations such as this is that they often lack a consistent stream of thought. This book is suffers from that, but to a limited degree. It is impossible for ten different authors wring about the same subject not to have different styles. An example of that is the use of the spelling of both CyberForensics and Cyberforensics in the book.

At 150 pages, the book is a relatively quick initial read, and covers numerous interesting areas.

The only downside to the book is that it has a prohibitive list price of $189.00 A month after its release, that price may be the reason why it has an Amazon Bestsellers Rank of #1,399,835.

While the book has excellent content, its exorbitant price will simply ensure that its sales will be eclipsed by the Pocket Oxford Latin Dictionary, coming in way ahead with an
Amazon Bestsellers Rank of 182,392.

Ben Rothke is the author of Computer Security: 20 Things Every Employee Should Know.

Book Reviews

Submission + - Fatal System Error:

brothke writes: /* default css */ table { font-size: 1em; line-height: inherit; border-collapse: collapse; } tr { text-align: left; } div, address, ol, ul, li, option, select { margin-top: 0px; margin-bottom: 0px; } p { margin: 0px; } pre { font-family: Courier New; white-space: pre-wrap; margin:0; } body { margin: 6px; padding: 0px; font-family: Verdana, sans-serif; font-size: 10pt; background-color: #ffffff; color: #000; } img { -moz-force-broken-image-icon: 1; } @media screen { html.pageview { background-color: #f3f3f3 !important; overflow-x: hidden; overflow-y: scroll; } body { min-height: 1100px; counter-reset: __goog_page__; } * html body { height: 1100px; } /* Prevent repaint errors when scrolling in Safari. This "Star-7" css hack targets Safari 3.1, but not WebKit nightlies and presumably Safari 4. That's OK because this bug is fixed in WebKit nightlies/Safari 4 :-). */ html*#wys_frame::before { content: '\A0'; position: fixed; overflow: hidden; width: 0; height: 0; top: 0; left: 0; } .pageview body { border-top: 1px solid #ccc; border-left: 1px solid #ccc; border-right: 2px solid #bbb; border-bottom: 2px solid #bbb; width: 648px !important; margin: 15px auto 25px; padding: 40px 50px; } /* IE6 */ * html { overflow-y: scroll; } * html.pageview body { overflow-x: auto; } .writely-callout-data { display: none; } .writely-footnote-marker { background-image: url('MISSING'); background-color: transparent; background-repeat: no-repeat; width: 7px; overflow: hidden; height: 16px; vertical-align: top; -moz-user-select: none; } .editor .writely-footnote-marker { cursor: move; } .writely-footnote-marker-highlight { background-position: -15px 0; -moz-user-select: text; } .writely-footnote-hide-selection ::-moz-selection, .writely-footnote-hide-selection::-moz-selection { background: transparent; } .writely-footnote-hide-selection ::selection, .writely-footnote-hide-selection::selection { background: transparent; } .writely-footnote-hide-selection { cursor: move; } /* Comments */ .writely-comment-yellow { background-color: #ffffd7; } .writely-comment-orange { background-color: #ffe3c0; } .writely-comment-pink { background-color: #ffd7ff; } .writely-comment-green { background-color: #d7ffd7; } .writely-comment-blue { background-color: #d7ffff; } .writely-comment-purple { background-color: #eed7ff; } .br_fix span+br:not(:-moz-last-node) { position:relative; left: -1ex } #cb-p-tgt { font-size: 8pt; padding: .4em; background-color: #ddd; color: #333; } #cb-p-tgt-can { text-decoration: underline; color: #36c; font-weight: bold; margin-left: 2em; } #cb-p-tgt .spin { width: 16px; height: 16px; background: url(//ssl.gstatic.com/docs/clipboard/spin_16o.gif) no-repeat; } } h6 { font-size: 8pt } h5 { font-size: 8pt } h4 { font-size: 10pt } h3 { font-size: 12pt } h2 { font-size: 14pt } h1 { font-size: 18pt } blockquote {padding: 10px; border: 1px #DDD dashed } .webkit-indent-blockquote { border: none; } a img {border: 0} .pb { border-width: 0; page-break-after: always; /* We don't want this to be resizeable, so enforce a width and height using !important */ height: 1px !important; width: 100% !important; } .editor .pb { border-top: 1px dashed #C0C0C0; border-bottom: 1px dashed #C0C0C0; } div.google_header, div.google_footer { position: relative; margin-top: 1em; margin-bottom: 1em; } /* Table of contents */ .editor div.writely-toc { background-color: #f3f3f3; border: 1px solid #ccc; } .writely-toc > ol { padding-left: 3em; font-weight: bold; } ol.writely-toc-subheading { padding-left: 1em; font-weight: normal; } /* IE6 only */ * html writely-toc ol { list-style-position: inside; } .writely-toc-none { list-style-type: none; } .writely-toc-decimal { list-style-type: decimal; } .writely-toc-upper-alpha { list-style-type: upper-alpha; } .writely-toc-lower-alpha { list-style-type: lower-alpha; } .writely-toc-upper-roman { list-style-type: upper-roman; } .writely-toc-lower-roman { list-style-type: lower-roman; } .writely-toc-disc { list-style-type: disc; } /* Ordered lists converted to numbered lists can preserve ordered types, and vice versa. This is confusing, so disallow it */ ul[type="i"], ul[type="I"], ul[type="1"], ul[type="a"], ul[type="A"] { list-style-type: disc; } ol[type="disc"], ol[type="circle"], ol[type="square"] { list-style-type: decimal; } /* end default css */ /* default print css */ @media print { body { padding: 0; margin: 0; } div.google_header, div.google_footer { display: block; min-height: 0; border: none; } div.google_header { flow: static(header); } /* used to insert page numbers */ div.google_header::before, div.google_footer::before { position: absolute; top: 0; } div.google_footer { flow: static(footer); } /* always consider this element at the start of the doc */ div#google_footer { flow: static(footer, start); } span.google_pagenumber { content: counter(page); } span.google_pagecount { content: counter(pages); } .endnotes { page: endnote; } /* MLA specifies that endnotes title should be 1" margin from the top of the page. */ @page endnote { margin-top: 1in; } callout.google_footnote { display: prince-footnote; footnote-style-position: inside; /* These styles keep the footnote from taking on the style of the text surrounding the footnote marker. They can be overridden in the document CSS. */ color: #000; font-family: Verdana; font-size: 10.0pt; font-weight: normal; } /* Table of contents */ #WritelyTableOfContents a::after { content: leader('.') target-counter(attr(href), page); } #WritelyTableOfContents a { text-decoration: none; color: black; } /* Comments */ .writely-comment-yellow { background-color: #ffffd7; } .writely-comment-orange { background-color: #ffe3c0; } .writely-comment-pink { background-color: #ffd7ff; } .writely-comment-green { background-color: #d7ffd7; } .writely-comment-blue { background-color: #d7ffff; } .writely-comment-purple { background-color: #eed7ff; } } @page { @top { content: flow(header); } @bottom { content: flow(footer); } @footnotes { border-top: solid black thin; padding-top: 8pt; } } /* end default print css */ /* custom css */ /* end custom css */ /* ui edited css */ body { font-family: Verdana; font-size: 10.0pt; line-height: normal; background-color: #ffffff; } /* end ui edited css */ /* editor CSS */ .editor a:visited {color: #551A8B} .editor table.zeroBorder {border: 1px dotted gray} .editor table.zeroBorder td {border: 1px dotted gray} .editor table.zeroBorder th {border: 1px dotted gray} .editor div.google_header, .editor div.google_footer { border: 2px #DDDDDD dashed; position: static; width: 100%; min-height: 2em; } .editor .misspell {background-color: yellow} .editor .writely-comment { font-size: 9pt; line-height: 1.4; padding: 1px; border: 1px dashed #C0C0C0 } /* end editor CSS */ As computing and technology has evolv...

As computing and technology has evolved, so too have the security threats correspondingly evolved. The classic Yankee Doodle virus did minimal damage, all while playing a patriotic, albeit monotone song. In 2010, aggressive malware attacks in stealth mode, and is often quite extremely dangerous.



Cybercrimes have evolved using increasingly sophisticated techniques, and the resulting financial losses are staggering. Many criminal cyber gangs are well organized and resourceful and their ability to recover after new defenses have been deployed make it a challenge for those on the right side of the law.



Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet is an excellent book billed as a non-fiction cyber-thriller, and describes the cyber gangs who operate on the Internet. Author Joseph Menn, a cyber security reporter for the Financial Times, takes the reader into the inner operations of todayââs cyber-criminal, who use the Internet as their personal mint.



While Willie Sutton never really said that the reason he robbed banks is because thatââs where the money is; the truth is that todayââs cyber criminal does know where the money is, and its address is the Internet. They use the net as a means to steal and extort money from businesses and individuals.



The books protagonist is Barrett Lyon, a highly skilled technical engineer and entrepreneur, who founded companies such as Prolexic, BitGravity and 3Crowd. It was at Prolexic where Lyon developed the software used to fend off the DoS attacks that were bringing some of his clientââs networks to a standstill.



Lyon, along with the other major character in the book, Andy Crocker, a British policeman, were the 1-2 punch that resulted in the prosecution of a Russian cyber criminal. The fact that the prosecution took place via the Russian judicial system was a surprise to everyone. What was unusual about the prosecution is that criminals in Russia and Eastern Europe often operate with the assistance of corrupt political and police forces. Even though the evidence against the defendant was significant, the ability to secure a guilty verdict was far from a sure thing.



Much of the book deals with Lyon and his working relationship with BetCRIS, a company offering online gambling services, including sports betting, online casino games, online bingo and mobile gambling.



BetCRIS is an off-shore company, operating in the safe havens of the Republic of Costa Rica. In 2003, at the height of the DoS attacks, the BetCRIS website was down for nearly a month. With tens of millions of dollars of gambling revenue at stake, BetCRIS management were desperate for a solution, and they reached out to Lyon.



While Lyon created a first-generation solution to stop the early DoS attacks, the book details how the attackers were able to get around those countermeasures, and how it turned into a cat and mouse game of futility, where Lyon would create a fix, only to be beguiled by a new attack.



In the book, Menn writes about many of the major players in the Internet criminal world. He spends a good amount of time writing about the infamous Russian Business Network (RBN). He notes that little true business was carried out via the RBN; rather it was a front for Internet-based criminal activities in Russia.



Menn does get into some technical details, but not so much so to confuse a non-technical reader. He covers topics such as botnets, DoS and DDoS attacks, cyberwarfare, cyber espionage, and the difficulty in prosecuting the perpetrators.



Menn notes that there are many reasons why Russia and in Eastern Europe are ground zero for cybercriminals. The educational institutions there provide a good source of technical training, combined that legitimate job opportunities are often quite limited. Add to the fact that political and law enforcement officials often ignore the cyber attacks again the rich capitalists of the US, the difficulty and challenges with jurisdiction, and you have a perfect storm for the creation of a sophisticated cyber criminal element. Finally, there is a long and established culture of corruption in Russia and in Eastern Europe that adds to the problem.



There are two directions that Fatal System Error takes. The main part of the book is Mennââs narrative, which takes up 11 of the books 12 chapters. These 11 chapters take the reader on an enthralling ride into the inner workings of the cyber-criminal world. Fatal System Error is an enjoyable read on par books such as The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage and Takedown: The Pursuit and Capture of Kevin Mitnick.



Where the book truly stands out is in the final chapter ââoe Fixing Whatââs Fixable, and is worth purchasing for that chapter alone. Menn displays his incredibly deep understanding of the underlying issues around computer security and why we are vulnerable. He suggests numerous pragmatic solutions to the crisis, and how to better secure the Internet and networks.



Some of the ideas include significantly greater budgets for information security, more liability against software developers who write insecure code, greater information sharing between the cybercrime agencies in the US and their counterparts in Russia, and more. His on-target analysis of what the US Government can and should do to increase the security of the Internet infrastructure is quite impressive.



Reading the narrative part of the book, many readers will likely be scared to death to connect their computers to the Internet, and to a limited degree, rightfully so. Even with Mennââs balanced and compelling account of what transpired, the threat of identity theft and ease of how financial accounts are breached may be too much for some readers many to bear.



If corporate America and the US Government would take Mennââs suggestions to heart on how to create a secure Internet infrastructure, many of those security concerns he wrote about could be obviated, and the cyber criminals of Eastern Europe would have to look for different work.



Additional pragmatic ideas that Menn suggests are to legalize and regulate online gambling, more funding to teach safer computing in schools, and for a complete re-engineering of the Internet, in order to build in the necessary security functionality which should have been in there in the first place. As part of the process to re-engineer the Internet, Menn suggests designs that create accountability into the Internet fabric.



Finally, Menn notes that many end-users are not blameless. By not educating themselves on how to securely use the Internet, they are setting themselves up to becoming victims. He writes that anyone that connects a computer to the Internet needs to have significant security vigilance to ensure that they donâât make themselves a victim. It is 2010 and far too many people are still oblivious to the security threats. Many still naively believe that someone from Nigeria really does want to make them richer with tens of millions of dollars worth of gold from their deceased uncle.



Menn shows how the underlying infrastructure of the Internet is significantly more vulnerable than most people realize. Finally, what exacerbates the problem is that those doing the attacks are working much quicker than those who are trying to secure it.



One of Mennââs criticisms is that the US Government spends a fraction of what it should on securing its critical technology infrastructure. Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet is the wake-up call that those in Washington, and those charged with IT need to wake up to. Unfortunately, it is likely those that truly need to read this book, will press the information security snooze button yet again.





Ben Rothke is the author of Computer Security: 20 Things Every Employee Should Know.

Submission + - Fatal System Error:

brothke writes: Book review of Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down
Book Reviews

Submission + - Human Factors in the Design and Evaluation

brothke writes: In aviation today, technically advanced airplanes present a unique paradox. Technically advanced airplanes, in theory, have more available safety, and the outcome should be that there are less accidents. But without proper training for their pilots, they could be less safe than airplanes with less available safety. The FAA found that without proper training for the pilots who fly them, technically advanced airplanes don’t advance safety at all. The reason is that technically advanced airplanes present challenges that under-prepared pilots might not be equipped to handle.

In the IT world, staff members are often expected to install, configure, maintain and support technically advanced software. Companies often buy huge infrastructure software, such as CRM, ERP, PKI, identify management, intrusion detection and more, without first understanding how to make them work in their complex environment. Management often is oblivious to the fact that just because they can buy and install the software; that it will work on its own. The reason why so many large software deployments fail miserable is that the IT staff often doesn’t have the proper training, support and assistance that they need.

Human Factors in the Design and Evaluation of Central Control Room Operations is a fantastic book that shows what it takes to ensure support staff work and operate together, in a formal and efficient manner. The book integrates the topics of human factors and ergonomics to create an incredibly valuable tome. The book details the interactions between people and their working environment, and shows in depth how the work environment can and must be designed to reduce errors, improve performance, improve the quality of work, and increase the work satisfaction of the workers themselves.

While the book was written primarily for control room settings, it is relevant for those in IT if they have any involvement remote support, security operation centers (SOC) and network operation centers (NOC).

While the book is of value to anyone involved in operation, those who will find the most value are those charged with the management and operations or large groups or operations. If they have management support to deploy the formal methods detailed in the book, they will find that they can create significantly higher levels of customer and end-user satisfaction.

The authors note that all SOC and NOC’s have a common feature in that the people operating them are often remote from the processes that they are monitoring and controlling, and the operations function on a 24/7 basis. The many demands of remote and continuous operation place special considerations on the design of the SOC and NOC. The output of the book is that it can be used to effectively to design these operating centers.

The books presents a comprehensive and all-inclusive on the topic of human factors on the following 14 topics: competencies, training, procedures, communications, workload, automation, supervision, shift patterns, control room layout, SCADA interfaces, alarms, control room environment, human error, and safety culture. Each chapter includes extensive diagrams and flowcharts to show how the processes develop.

The book also provides a highly analytical approach to each topic. It details the required processes and procedures necessary to make each subject area work. The book is not only based on the four author’s expertise; they quote heavily from other experts and their research.

Chapter 2 opens with the observation that the safe and efficient operation of operating centers and control rooms is dependant upon the competence of the operators working within them. It details how to create competence assessments to ensure that staff is capable of carrying out their tasks safely and efficiently by assessing their skills and knowledge. The authors stress that it is not acceptable for organizations to assume that their staff are competent based on only their exposure to training and experience. They suggest that organizations create a program to determine those competence levels.

Chapter 3 goes into detail about how to create effective training programs to ensure worker competence. The benefit of a trained worked is that they can yield higher productivity and provide better service. Well-trained workers often have better morale and produce less errors. The chapter details the importance of a training needs analysis to properly determine what needs to be in the curriculum.

Chapter 4 is on procedures and is particularly important to those working in a SOC or NOC. If consistent and repeatable procedures are created, staff can provide much a more effective and dependable levels of service. Even with the benefits of well crafted procedures, its development process is a complex one involving the identification of all of the tasks that require procedures, a judgment on the level of assistance required, identification of the type or format of procedure required, writing and reviewing the procedures, and obtaining approval for them.

The importance of procedures is underscored when the book notes research that 70% of accidents and incidents within the nuclear power companies occurred when workers failed to properly follow procedures. In the petrochemical industry, 27% of incidents were caused by situations for which there were inadequate or no procedures available.

The percentage of failed IT projects and large software rollout catastrophes is both staggering and appalling. No other sector but IT would tolerate such failures. A book like as Human Factors in the Design and Evaluation of Central Control Room Operations goes a long way to stop that. The book is a rare one in that it both provides all of the factors involved in the problem at hand, and then provides all of the details needed to obviate those problems.

Ben Rothke is the author of Computer Security: 20 Things Every Employee Should Know- http://www.amazon.com/gp/product/0072262826?ie=UTF8&tag=benrothkswebp-20&linkCode=as2&camp=1789&creative=9325&creativeASIN=0072262826

Submission + - bookreview

Book Reviews

Submission + - Book review: The Social Media Marketing Book

brothke writes: The fact that President Barack Obama has over 7 million Facebook fans, and First Lady Michelle Obama over 650,000 fans, are confirmation that social media has come of age. That is a far cry from former President Bush’s comment in 2006 that he used the Google . While it is relatively easy for the President to get millions of followers, the challenge for businesses of all sizes is how to use social media to get fans and followers, and use them to drive business. Many spam messages recently have such enticing subjects as 'Make Money on Twitter' or 'Be a Facebook Money Machine'. While those are clearly scam emails, the truth is that social media is a tidal wave. The challenge for everyone, how to get in front of that wave. At about half the size of a regular book at 224 pages, The Social Media Marketing Book is lean to begin with. Given that about half of its pages are screen prints, one would think that such a book is a sparse approach to the topic. But the book is indeed a highly-tactical guide of significant value to any individual or organization looking to get into social media. Many are looking to get into social media for either themselves or their business, but are clueless on how to do that. For those, the book provides an easy to understand and implement guide to using the major social networks. This includes information on Twitter, Facebook, MySpace, LinkedIn. The book does a good job of showing the difference between different social media sites, such as pure networking (LinkedIn, Facebook), media sharing (YouTube, Flickr), blogs, microsblogging, and bookmarking (Reddit, Delicious, Digg) and more. While others would take three times the books length to make their point, Dan Zarrella is able to do that succinctly and to the point. His real-world experience in the social web is evident throughout the book. It is clear the author is one who is enmeshed in the topic in which he is writing. A lot of books show the promise of what social networks can do, but do not show how to get it done; this book does and shows what it can, and can't do. The book(TM)s organization places an emphasis on practical use and readability. For the social media newbie, the first two chapters provide a superb synopsis of the history, protocols, and content strategies around social media. The introduction to social media provides the reader with an overview of the use, history, definition, and description of the various types of social media. Each chapter is full of actionable items that the reader can put to immediate use. The book is zero theory and complete actionability around social media. Zarrella has also done significant research on what makes for a successful social media presence. In chapter 3 on Twitter and microblogging, he writes of the importance of an effective Twitter bio. In the chapter, he also looks at the relationship the content of a user’s bio has on the number of followers a user has. He also writes about the relationship between follower number and gender and family roles. For those looking to make the most of Twitter, his paper The Science of ReTweets is a great resource. Another benefit of The Science of ReTweets and this book is that Zarrella has not a single high-level suggestion that is impossible to put into practice. All of his advice is based on solutions that work. Zarrella's analytical marketing approach is based on science, statistics, experimentation and real data. Quite a novel concept in the world of marketing. Throughout the book, there is good advice and it tells you what works and does not work. The book is easy to read and it makes significant use of screenshots, which are meant to give the reader a specific visual explanation of the steps they need to take. In the section on Facebook, Zarrella makes an observation that is crucial to ones success for a business use of Facebook. He notes that for businesses, the best social media marketing is always going to be done by your fans, not by you. He notes that nearly every company engaged in social media marketing should have a Facebook page, as it can often serve as a central place for the integration of others parts of a campaign. In chapter 8, on the topic of forums, he reiterates the importance of fans, writing that a business should not underestimate the power of networks of niche forums to drive impressive numbers of visitors to your site. Once again, the best promotion comes not from the business, but from its fans. One of the mistakes far too many companies have made, and which the book strongly advises against, is the use of forum marketing services. These organizations promise a lot but rarely deliver results. They use myriad bogus accounts to create a false buzz on behalf of the business they are trying to promote. Such an approach only serves to wreck the reputation of the business due to the zero value they post from bogus accounts. While getting into the social web is important, chapter 10 is the books most important chapter, on the topic of strategy, tactics and practice. A mistake many make is in thinking a social web presence alone is enough, which is far from the truth. The chapter details all of the intricacies of strategy, tactics and practice to make it work. The chapter notes that strategy and tactics are inseparable, and that any successful social network presence will require both. In an interview, Zarrella observed that the biggest challenge in social media is learning how to incorporate social media into their daily work and life. With Twitter for instance, there are many good marketers who don't Tweet that much, or do for a little while and then stop. It's a marathon, not a sprint and the savvy businesses are going to have the best results when they can learn to integrate social media with what they are already doing. Overall, The Social Media Marketing Book is an extremely valuable resource on understanding and applying social media for both the individuals, and business. The book is a great introduction that can help you to get started. Once done, you can move onto the next level. Hopefully, Zarrella is working on that book now. Ben Rothke is the author of Computer Security: 20 Things Every Employee Should Know
Book Reviews

Submission + - Book review of The Social Media Marketing Book

brothke writes: About half the size of a regular book at 224 pages, The Social Media Marketing Book is lean to begin with. Given that about half of its pages are screen prints, one would think that such a book is a sparse approach to the topic. But the book is indeed a highly-tactical guide of significant value to any individual or organization looking to get into social media. Many are looking to get into social media for either themselves or their business, but are clueless on how to do that. For those, the book provides an easy to understand and implement guide to using the major social networks. This includes information on Twitter, Facebook, MySpace, LinkedIn. While others would take three times the books length to make their point, Dan Zarrella is able to do that succinctly and to the point. His real-world experience in the social web is evident throughout the book. It is clear the author is one who is enmeshed in the topic in which he is writing. A lot of books show the promise of what social networks can do, but don't show how to get it done; this book does and shows what it can, and can't do. The book's organization places an emphasis on practical use and readability. It begins with an introduction to social media and then provides the reader with an overview of the use, history, definition, and description of the various types of social media. Each chapter is full of actionable items that the reader can put to immediate use. Zarrella has also done significant research on what makes for a successful social media presence. In chapter3 on Twitter and microblogging, he writes of the importance of an effective Twitter bio. In the chapter, he also looks at the relationship the content of the bio of a user to the number of followers a user has. He also writes about the relationship between follower number and gender and family roles. For those looking to make the most of Twitter, his paper The Science of ReTweets is a great resource. Throughout the book, there is good advice and it tells you what works and does not work. The book is easy to read and it makes significant use of screenshots, which are meant to give the reader a specific visual explanation of the steps they need to take. In the section on Facebook, Zarrella makes an observation that is crucial to ones success for a business use of Facebook. He notes that for businesses, the best social media marketing is always going to be done by your fans, not by you. He notes that nearly every company engaged in social media marketing should have a Facebook page, as it can often serve as a central place for the integration of others parts of a campaign. In chapter 8, on the topic of forums, he reiterates the importance of fans, writing that a business should not underestimate the power of networks of niche forums to drive impressive numbers of visitors to your site. Once again, the best promotion comes not from the business, but from its fans. One of the mistakes far too many companies have made, and which the book strongly advises against, is the use of forum marketing services. These organizations promise a lot but rarely deliver results. They use myriad bogus accounts to create a false buzz on behalf of the business they are trying to promote. Such an approach only serves to wreck the reputation of the business due to the zero value they post from bogus accounts. While getting into the social web is important, chapter 10 is the books most important chapter, on the topic of strategy, tactics and practice. A mistake many make is in thinking a social web presence alone is enough, which is far from the truth. The chapter details all of the intricacies of strategy, tactics and practice to make it work. The chapter notes that strategy and tactics are inseparable, and that any successful social network presence will require both. Overall, The Social Media Marketing Book is an extremely valuable resource on understanding and applying social media for both the individuals, and business. The book is a great introduction that can help you to get started. Once done, you can move onto the next level. Hopefully, Zarrella is working on that book now. Ben Rothke is the author of Computer Security: 20 Things Every Employee Should Know

Comment Re:Review author lives in a happy place (Score 2, Informative) 75

>>>Or could be a matter of reporting bias. Maye he doesn't bother writing reviews for books that aren't very good. And I said, I don’t see it as my task to write negative reviews. I take the opposite approach that Robert Slade takes. See http://en.wikipedia.org/wiki/Robert_Slade - He reviews other works but gave first priority to information security. His reviews are often critical—to the project FAQ question, “Don't you like any books?” Slade replied that he may be cruel but is fair.
Book Reviews

Submission + - Book review Enterprise Security for the Executive (amazon.com)

brothke writes: If Shakespeare were to write an information security tragedy, it would not be titled Hamlet, rather Bayuk. The story of Jennifer Bayuk is tragic in that she spent a decade as CISO at Bear, Stearns, building up its security group to be one of the best in the business; only to find it vaporized when the firm collapsed and was acquired by J.P. Morgan Clearing Corp. After all that toil and sweat, Bayuk was out of a job. (Full disclosure: Bayuk and I have given a presentation together in the past, and I did get a copy of this book for free.)

While the information security engineering group that was at Bear, Stearns is no more, Bayuk has taken her vast expertise and put it in a great new book: Enterprise Security for the Executive: Setting the Tone from the Top. While many other books equate security with technology, and are written for technologists; Bayuk writes that information security is all about management control. And to the extent which a CxO controls assets, is the extent to which others can't use them in unexpected ways.

The book is written to help CxO's and business executives become familiar with information security concepts and techniques to make sure they are able to manage and support the efforts of their security team. This is an issue, as a big problem for the poor state of information security is that CxO's are far too often disconnected from their information security groups. No story is more manifest than that of when Heartland Payment Systems CEO Robert Carr blamed his PCI auditors for his firm's security problems. Carr is a perfect example of the type of person that needs to read this book. As an aside, for an excellent reply to Carr's kvetching, read what Rich Mogull wrote in An Open Letter to Robert Carr, CEO of Heartland Payment Systems.

While many CxO's think that security is about firewalls and other cool security products, it is truly a top-down management approach, and not a technology one. The book notes that the only way for information security to succeed in an organization is when management understands what their role is.

What is unique about the book is that Bayuk uses what she calls SHS (security horror stories). Rather than typical FUD stories, the horror stories detail systematic security problems and how they could have been obviated. By seeing how these companies have done it wrong, it makes it easier for pragmatic organizations to accomplish effective security by setting a strong tone from the top down.

Bayuk details the overall problem in the introduction and notes that many CxO's have wrongly spent significant amounts of money on security to avert security incidents; but have done that without any context of a greater information security methodology. The leads to executives thinking that security as nothing more than one long spending pattern.

Chapter 1 — Tone at The Top, notes that tone exists at the top, whether it is set or not. The tone is reflected in how an organization thinks about the things it really cares about. Employees can tell how a CxO cares about security by their level of personal involvement. Not that a CxO needs to be, or should be involved with minutia of firewall configuration or system administration; the key is rather that they are for example, championing the effective and consistent use of firewalls and how systems are securely administered.

In chapter 5 — Security through Matrix Management — Bayuk does a good job of detailing the various places that the security group can be placed in an organization. The chapter notes that there are as many ways to organize security as there are organization structures. Bayuk writes for example that if CxO's in a given organization are a tight-knit group, accustomed to close coordination, then it should not matter to which CxO the person managing information security reports to. If that is not the case, there may be multiple security programs that end up far too below the required C-levels that are needed for effective security. The chapter provides a number of different organizational scenarios, with requisite roles and responsibilities.

Chapter 5 closes with an important observation that a CxO should task the human resources department to put a line in all performance reviews whereby managers attest (or not) that the person being reviewed follows security policy. A CxO should fire people who willfully avoid compliance with security policy. Whatever tone at the top exists should be employed to make sure that everyone knows that the CxO is serious about the corporate security program. Such a tone clearly demonstrates an organization that is resolute about information security.

One thing that Bayuk does very well repeatedly throughout the book is to succinctly identify an issue and its cause. In chapter 6 — Navigating the Regulatory Landscape — she writes that if a CxO does not have management control over an organization, then the organization will fail the audit. It will fail because even if the organization is secure today, there is no assurance that it will be going forward. In addition, control means that the CxO will ensure that the organization is attempting to do the right thing. And in such cases, passing an audit is much easier.

Overall, Enterprise Security for the Executive is a fantastic book. It provides a no-nonsense approach to attaining effective information security. For those executives that are serious about security, the book will be their guiding light down the dark information security tunnel. In its 8 chapters (and a case study), the book focuses on a straightforward and plain-speaking approach to enable CxO's to get a handle on information security. As such, it is hoped that Enterprise Security for the Executive will soon find its way onto every executives required reading list.

Ben Rothke is the author of Computer Security: 20 Things Every Employee Should Know.

Book Reviews

Submission + - Book review of 'Confessions of a Public Speaker' (amazon.com)

brothke writes: While there is a plethora of books such as Public Speaking for Dummies, and many similar titles; Confessions of a Public Speaker is unique in that it takes a holistic approach to the art and science of public speaking. The books doesn't just provide helpful hints, it attempts to make the speaker, and their associated presentation, compelling and necessary. Confessions is Scott Berkunn's first-hand account of his many years of public speaking, teaching and television appearances. In the book, he shares his successes, failures, and many frustrating experiences, in the hope that the reader will be a better speaker for it.

An issue with many books on public speaking is that they focus on the mechanics of public speaking. While there is nothing necessarily wrong with that approach, Confessions takes a much deeper and analytical look at public speaking. The book demonstrates that the best public speakers are not simply people with fancy PowerPoint's rather they are excellent communicators with a strong message.

While other books focus and stress the importance of creating good PowerPoint's, Confessions shows how one can rise above the PowerPoint and be a presenter of ideas to the audience. Such an approach can take a dry presentation and turn it into a compelling one.

Berkun notes that while many people perceive public speaking to be a terrifying experience, the reality is that it does not have to be so petrifying. With fundamental preparations, even the most timid person can be a public speaker. While such a person will never be a speaker at the caliber of a Steve Jobs, there is no reason they can't present an enjoyable and educating presentation.

The book is loaded with chapter after chapter of practical advice. Berkun also shows what to do when things go terribly wrong; from how to work a tough room, when technology fails, microphones that go bad and more.

The book also provides effective techniques on how to deal with a participant, who in the course of asking a question, turns it into a monologue or diatribe. His suggestion is to throw the question back at the audience. Ask the audience "how many people are interested in this question?", If only a fraction of the audience raise their hands, tell the questioner to come up afterwards and that you will answer them. Berkun concludes that just because a question is raised, does not mean that the speaker is obligated to answer it.

Some of the advice in the book is obvious, but only after you read it, such as not turning your back on the audience, and more. One of the better suggestions is rather than ending a talk with "are there there any questions?", use "what questions did you think I would answer but didn't?

As an effective communicator, one would have thought that Berkun could have gotten his message across with less profanity. While the book is not necessarily profanity laden; it is there in numerous places. That will preclude the book from being purchased in many organizations sensitive to that.

Chapter 6 — the Science of not boring people — is perhaps the best chapter in the book, where Berkun takes a look at a fundamental problem with many public presentations, they are simply boring. The chapter describes an experiment in which heart-rate monitors were strapped to listening students during lectures. Their heart rate peaked at the start of the lectures and then steadily declined. Berkun notes that with this depressing fact, it's easy to understand why most lectures are slow one-way trips into sedation. Our bodies, sitting around doing little, go into rest mode, and where our bodies go, our minds will follow."

Berkun also writes of perhaps what is the biggest bane of having to listen to a speaker, death by PowerPoint. Far too many speakers lack relevant content and try to make up for that with fancy PowerPoint presentations. Berkun notes that far too few people create their content first. Rather they put their ideas immediately into a PowerPoint, with the hope that good content will magically emerge. The message Berkun says repeatedly and which speakers should take to heart, is that content is what matters, and not the sacred PowerPoint.

The reason for so much death by PowerPoint is that many speakers are seduced by the style of the presentation and get caught up in the fonts, videos, graphics, and more, and lose all context of the points that they want to make. Berkun concludes that the problem with most bad presentations is not the slides, the visuals or any of the things that most people obsess about; rather it is the lack of thinking.

The book also stresses the importance of good feedback for the speaker to grow into a better speaker. The challenge is that most attendees are reticent to give effective rebuke to the speaker. Berkun says the best way to overcome this is for a speaker to videotape themselves, and be merciless with themselves, extracting what their mistakes are.

The last chapter is "You Can't Do Worse Than This" is made up of stories of disastrous experiences from various public speakers. The chapter is exceptionally insightful and entertaining. Perhaps the funniest story was when Larry Lessig was invited to be a guest at a conference in Georgia (as in Eastern Europe) and after the introduction, was unexpectedly told that he was to give a one-hour talk comparing the German, French and American constitutions, with special insights for Georgia.

Overall, Confessions of a Public Speaker is a very well-written, entertaining and engaging overview of the art of public speaking. For those that are contemplating public speaking, or want to improve their current aptitude, it is impossible that after reading the book, that they won't be a better speaker. For those that simply want to know what goes into, and what makes a really good presentation, Confessions of a Public Speaker is also a worthwhile book to read.

Ben Rothke is the author of Computer Security: 20 Things Every Employee Should Know (http://www.amazon.com/gp/product/0072262826?ie=UTF8&tag=benrothkswebp-20&linkCode=as2&camp=1789&creative=9325&creativeASIN=0072262826)

Security

Submission + - End-to-End Encryption: The PCI Security Holy Grail (csoonline.com)

brothke writes: "Encryption seems like the simple answer to data security problems.
So why is end-to-end encryption not ubiquitous?
Implementation challenges abound. Here's how to handle encryption's 'key issues, in this article from CSO:
End-to-End Encryption: The PCI Security Holy Grail

http://www.csoonline.com/article/501694/End_to_End_Encryption_The_PCI_Security_Holy_Grail"

Slashdot Top Deals

Saliva causes cancer, but only if swallowed in small amounts over a long period of time. -- George Carlin

Working...