(eBook PDF) Effective Cybersecurity: A Guide to
Using Best Practices and Standards download
https://ebookluna.com/product/ebook-pdf-effective-cybersecurity-
a-guide-to-using-best-practices-and-standards/
Download full version ebook from https://ebookluna.com
We believe these products will be a great fit for you. Click
the link to download now, or visit ebookluna.com
to discover even more!
(eBook PDF) A Risk Professional's Survival Guide: Applied Best Practices in
Risk Management
https://ebookluna.com/product/ebook-pdf-a-risk-professionals-survival-
guide-applied-best-practices-in-risk-management/
(eBook PDF) Information Governance: Concepts, Strategies, and Best
Practices
https://ebookluna.com/product/ebook-pdf-information-governance-concepts-
strategies-and-best-practices/
(eBook PDF) Change Management: A Guide to Effective Implementation 4th
Edition
https://ebookluna.com/product/ebook-pdf-change-management-a-guide-to-
effective-implementation-4th-edition/
(eBook PDF) Regression & Linear Modeling: Best Practices and Modern Methods
https://ebookluna.com/product/ebook-pdf-regression-linear-modeling-best-
practices-and-modern-methods/
(eBook PDF) Policing America: Challenges and Best Practices 9th Edition
https://ebookluna.com/product/ebook-pdf-policing-america-challenges-and-
best-practices-9th-edition/
(eBook PDF) Modeling and Simulation: Challenges and Best Practices for
Industry
https://ebookluna.com/product/ebook-pdf-modeling-and-simulation-challenges-
and-best-practices-for-industry/
(eBook PDF) Human Capital Management Standards: A Complete Guide
https://ebookluna.com/product/ebook-pdf-human-capital-management-standards-
a-complete-guide/
(eBook PDF) Effective Training Systems Strategies and Practices 5th Edition
https://ebookluna.com/product/ebook-pdf-effective-training-systems-
strategies-and-practices-5th-edition/
(eBook PDF) Improving Board Risk Oversight Through Best Practices
https://ebookluna.com/product/ebook-pdf-improving-board-risk-oversight-
through-best-practices/
7
Appendix A: References and Standards
Appendix B: Glossary
Index
Appendix C (Online Only): Answers to Review Questions
You can find Appendix C at informit.com/title/9780134772806.
Click the Downloads tab to access the PDF file.
8
Table of Contents
Preface
Chapter 1: Best Practices, Standards, and a Plan of Action
1.1 Defining Cyberspace and Cybersecurity
1.2 The Value of Standards and Best Practices Documents
1.3 The Standard of Good Practice for Information Security
1.4 The ISO/IEC 27000 Suite of Information Security Standards
ISO 27001
ISO 27002
1.5 Mapping the ISO 27000 Series to the ISF SGP
1.6 NIST Cybersecurity Framework and Security Documents
NIST Cybersecurity Framework
NIST Security Documents
1.7 The CIS Critical Security Controls for Effective Cyber Defense
1.8 COBIT 5 for Information Security
1.9 Payment Card Industry Data Security Standard (PCI DSS)
1.10 ITU-T Security Documents
1.11 Effective Cybersecurity
The Cybersecurity Management Process
Using Best Practices and Standards Documents
1.12 Key Terms and Review Questions
Key Terms
Review Questions
1.13 References
Part I: Planning for Cybersecurity
Chapter 2: Security Governance
2.1 Security Governance and Security Management
9
2.2 Security Governance Principles and Desired Outcomes
Principles
Desired Outcomes
2.3 Security Governance Components
Strategic Planning
Organizational Structure
Roles and Responsibilities
Integration with Enterprise Architecture
Policies and Guidance
2.4 Security Governance Approach
Security Governance Framework
Security Direction
Responsible, Accountable, Consulted, and Informed
(RACI) Charts
2.5 Security Governance Evaluation
2.6 Security Governance Best Practices
2.7 Key Terms and Review Questions
Key Terms
Review Questions
2.8 References
Chapter 3: Information Risk Assessment
3.1 Risk Assessment Concepts
Risk Assessment Challenges
Risk Management
Structure of This Chapter
3.2 Asset Identification
Hardware Assets
Software Assets
Information Assets
Business Assets
Asset Register
3.3 Threat Identification
10
The STRIDE Threat Model
Threat Types
Sources of Information
3.4 Control Identification
3.5 Vulnerability Identification
Vulnerability Categories
National Vulnerability Database and Common
Vulnerability Scoring System
3.6 Risk Assessment Approaches
Quantitative Versus Qualitative Risk Assessment
Simple Risk Analysis Worksheet
Factor Analysis of Information Risk
3.7 Likelihood Assessment
Estimating Threat Event Frequency
Estimating Vulnerability
Loss Event Frequency
3.8 Impact Assessment
Estimating the Primary Loss
Estimating the Secondary Loss
Business Impact Reference Table
3.9 Risk Determination
3.10 Risk Evaluation
3.11 Risk Treatment
Risk Reduction
Risk Retention
Risk Avoidance
Risk Transfer
3.12 Risk Assessment Best Practices
3.13 Key Terms and Review Questions
Key Terms
Review Questions
3.14 References
11
Chapter 4: Security Management
4.1 The Security Management Function
Security Planning
Capital Planning
4.2 Security Policy
Security Policy Categories
Security Policy Document Content
Management Guidelines for Security Policies
Monitoring the Policy
4.3 Acceptable Use Policy
4.4 Security Management Best Practices
4.5 Key Terms and Review Questions
Key Terms
Review Questions
4.6 References
PART II: Managing the Cybersecurity Function
Chapter 5: People Management
5.1 Human Resource Security
Security in the Hiring Process
During Employment
Termination of Employment
5.2 Security Awareness and Education
Security Awareness
Cybersecurity Essentials Program
Role-Based Training
Education and Certification
5.3 People Management Best Practices
5.4 Key Terms and Review Questions
Key Terms
Review Questions
5.5 References
12
Chapter 6: Information Management
6.1 Information Classification and Handling
Information Classification
Information Labeling
Information Handling
6.2 Privacy
Privacy Threats
Privacy Principles and Policies
Privacy Controls
6.3 Document and Records Management
Document Management
Records Management
6.4 Sensitive Physical Information
6.5 Information Management Best Practices
6.6 Key Terms and Review Questions
Key Terms
Review Questions
6.7 References
Chapter 7: Physical Asset Management
7.1 Hardware Life Cycle Management
Planning
Acquisition
Deployment
Management
Disposition
7.2 Office Equipment
Threats and Vulnerabilities
Security Controls
Equipment Disposal
7.3 Industrial Control Systems
13
Differences Between IT Systems and Industrial Control
Systems
ICS Security
7.4 Mobile Device Security
Mobile Device Technology
Mobile Ecosystem
Vulnerabilities
Mobile Device Security Strategy
Resources for Mobile Device Security
7.5 Physical Asset Management Best Practices
7.6 Key Terms and Review Questions
Key Terms
Review Questions
7.7 References
Chapter 8: System Development
8.1 System Development Life Cycle
NIST SDLC Model
The SGP’s SDLC Model
DevOps
8.2 Incorporating Security into the SDLC
Initiation Phase
Development/Acquisition Phase
Implementation/Assessment Phase
Operations and Maintenance Phase
Disposal Phase
8.3 System Development Management
System Development Methodology
System Development Environments
Quality Assurance
8.4 System Development Best Practices
8.5 Key Terms and Review Questions
Key Terms
14
Review Questions
8.6 References
Chapter 9: Business Application Management
9.1 Application Management Concepts
Application Life Cycle Management
Application Portfolio Management
Application Performance Management
9.2 Corporate Business Application Security
Business Application Register
Business Application Protection
Browser-Based Application Protection
9.3 End User-Developed Applications (EUDAs)
Benefits of EUDAs
Risks of EUDAs
EUDA Security Framework
9.4 Business Application Management Best Practices
9.5 Key Terms and Review Questions
Key Terms
Review Questions
9.6 References
Chapter 10: System Access
10.1 System Access Concepts
Authorization
10.2 User Authentication
A Model for Electronic User Authentication
Means of Authentication
Multifactor Authentication
10.3 Password-Based Authentication
The Vulnerability of Passwords
The Use of Hashed Passwords
Password Cracking of User-Chosen Passwords
15
Password File Access Control
Password Selection
10.4 Possession-Based Authentication
Memory Cards
Smart Cards
Electronic Identity Cards
One-Time Password Device
Threats to Possession-Based Authentication
Security Controls for Possession-Based Authentication
10.5 Biometric Authentication
Criteria for Biometric Characteristics
Physical Characteristics Used in Biometric
Applications
Operation of a Biometric Authentication System
Biometric Accuracy
Threats to Biometric Authentication
Security Controls for Biometric Authentication
10.6 Risk Assessment for User Authentication
Authenticator Assurance Levels
Selecting an AAL
Choosing an Authentication Method
10.7 Access Control
Subjects, Objects, and Access Rights
Access Control Policies
Discretionary Access Control
Role-Based Access Control
Attribute-Based Access Control
Access Control Metrics
10.8 Customer Access
Customer Access Arrangements
Customer Contracts
Customer Connections
16
Protecting Customer Data
10.9 System Access Best Practices
10.10 Key Terms and Review Questions
Key Terms
Review Questions
10.11 References
Chapter 11: System Management
11.1 Server Configuration
Threats to Servers
Requirements for Server Security
11.2 Virtual Servers
Virtualization Alternatives
Virtualization Security Issues
Securing Virtualization Systems
11.3 Network Storage Systems
11.4 Service Level Agreements
Network Providers
Computer Security Incident Response Team
Cloud Service Providers
11.5 Performance and Capacity Management
11.6 Backup
11.7 Change Management
11.8 System Management Best Practices
11.9 Key Terms and Review Questions
Key Terms
Review Questions
11.10 References
Chapter 12: Networks and Communications
12.1 Network Management Concepts
Network Management Functions
Network Management Systems
17
Network Management Architecture
12.2 Firewalls
Firewall Characteristics
Types of Firewalls
Next-Generation Firewalls
DMZ Networks
The Modern IT Perimeter
12.3 Virtual Private Networks and IP Security
Virtual Private Networks
IPsec
Firewall-Based VPNs
12.4 Security Considerations for Network Management
Network Device Configuration
Physical Network Management
Wireless Access
External Network Connections
Firewalls
Remote Maintenance
12.5 Electronic Communications
Email
Instant Messaging
Voice over IP (VoIP) Networks
Telephony and Conferencing
12.6 Networks and Communications Best Practices
12.7 Key Terms and Review Questions
Key Terms
Review Questions
12.8 References
Chapter 13: Supply Chain Management and Cloud Security
13.1 Supply Chain Management Concepts
The Supply Chain
18
Supply Chain Management
13.2 Supply Chain Risk Management
Supply Chain Threats
Supply Chain Vulnerabilities
Supply Chain Security Controls
SCRM Best Practices
13.3 Cloud Computing
Cloud Computing Elements
Cloud Computing Reference Architecture
13.4 Cloud Security
Security Considerations for Cloud Computing
Threats for Cloud Service Users
Risk Evaluation
Best Practices
Cloud Service Agreement
13.5 Supply Chain Best Practices
13.6 Key Terms and Review Questions
Key Terms
Review Questions
13.7 References
Chapter 14: Technical Security Management
14.1 Security Architecture
14.2 Malware Protection Activities
Types of Malware
The Nature of the Malware Threat
Practical Malware Protection
14.3 Malware Protection Software
Capabilities of Malware Protection Software
Managing Malware Protection Software
14.4 Identity and Access Management
IAM Architecture
19
Federated Identity Management
IAM Planning
IAM Best Practices
14.5 Intrusion Detection
Basic Principles
Approaches to Intrusion Detection
Host-Based Intrusion Detection Techniques
Network-Based Intrusion Detection Systems
IDS Best Practices
14.6 Data Loss Prevention
Data Classification and Identification
Data States
14.7 Digital Rights Management
DRM Structure and Components
DRM Best Practices
14.8 Cryptographic Solutions
Uses of Cryptography
Cryptographic Algorithms
Selection of Cryptographic Algorithms and Lengths
Cryptography Implementation Considerations
14.9 Cryptographic Key Management
Key Types
Cryptoperiod
Key Life Cycle
14.10 Public Key Infrastructure
Public Key Certificates
PKI Architecture
Management Issues
14.11 Technical Security Management Best Practices
14.12 Key Terms and Review Questions
Key Terms
Review Questions
20
14.13 References
Chapter 15: Threat and Incident Management
15.1 Technical Vulnerability Management
Plan Vulnerability Management
Discover Known Vulnerabilities
Scan for Vulnerabilities
Log and Report
Remediate Vulnerabilities
15.2 Security Event Logging
Security Event Logging Objective
Potential Security Log Sources
What to Log
Protection of Log Data
Log Management Policy
15.3 Security Event Management
SEM Functions
SEM Best Practices
15.4 Threat Intelligence
Threat Taxonomy
The Importance of Threat Intelligence
Gathering Threat Intelligence
Threat Analysis
15.5 Cyber Attack Protection
Cyber Attack Kill Chain
Protection and Response Measures
Non-Malware Attacks
15.6 Security Incident Management Framework
Objectives of Incident Management
Relationship to Information Security Management
System
Incident Management Policy
Roles and Responsibilities
21
Incident Management Information
Incident Management Tools
15.7 Security Incident Management Process
Preparing for Incident Response
Detection and Analysis
Containment, Eradication, and Recovery
Post-Incident Activity
15.8 Emergency Fixes
15.9 Forensic Investigations
Prepare
Identify
Collect
Preserve
Analyze
Report
15.10 Threat and Incident Management Best Practices
15.11 Key Terms and Review Questions
Key Terms
Review Questions
15.12 References
Chapter 16: Local Environment Management
16.1 Local Environment Security
Local Environment Profile
Local Security Coordination
16.2 Physical Security
Physical Security Threats
Physical Security Officer
Defense in Depth
Physical Security: Prevention and Mitigation Measures
Physical Security Controls
16.3 Local Environment Management Best Practices
22
16.4 Key Terms and Review Questions
Key Terms
Review Questions
16.5 References
Chapter 17: Business Continuity
17.1 Business Continuity Concepts
Threats
Business Continuity in Operation
Business Continuity Objectives
Essential Components for Maintaining Business
Continuity
17.2 Business Continuity Program
Governance
Business Impact Analysis
Risk Assessment
Business Continuity Strategy
17.3 Business Continuity Readiness
Awareness
Training
Resilience
Control Selection
Business Continuity Plan
Exercising and Testing
Performance Evaluation
17.4 Business Continuity Operations
Emergency Response
Crisis Management
Business Recovery/Restoration
17.5 Business Continuity Best Practices
17.6 Key Terms and Review Questions
Key Terms
Review Questions
23
17.7 References
Part III: Security Assessment
Chapter 18: Security Monitoring and Improvement
18.1 Security Audit
Security Audit and Alarms Model
Data to Collect for Auditing
Internal and External Audit
Security Audit Controls
18.2 Security Performance
Security Performance Measurement
Security Monitoring and Reporting
Information Risk Reporting
Information Security Compliance Monitoring
18.3 Security Monitoring and Improvement Best Practices
18.4 Key Terms and Review Questions
Key Terms
Review Questions
18.5 References
Appendix A: References and Standards
Appendix B: Glossary
Index
Appendix C (Online Only): Answers to Review Questions
You can find Appendix C at informit.com/title/9780134772806.
Click the Downloads tab to access the PDF file.
24
Preface
There is the book, Inspector. I leave it with you, and you cannot doubt
that it contains a full explanation.
—The Adventure of the Lion’s Mane, by Sir Arthur Conan Doyle
Background
Effective cybersecurity is very difficult. A number of organizations,
based on wide professional input, have developed best-practices
types of documents as well as standards for implementing and
evaluating cybersecurity. On the standards side, the most
prominent player is the National Institute of Standards and
Technology (NIST). NIST has created a huge number of security
publications, including 9 Federal Information Processing
Standards (FIPS) and well over 100 active Special Publications
(SP) that provide guidance on virtually all aspects of cybersecurity.
Equally important is the International Organization for
Standardization (ISO) 27000 series of standards on information
security management systems. Other organizations that have
produced cybersecurity standards and guidelines include:
ISACA/COBIT: The COBIT-5 for information security and
related documents are widely used by the industry.
ITU Telecommunication Standardization Sector (ITU-T):
Most important are the series X.1050 through X.1069 on
security management.
Internet Society (ISOC): A number of published standards
and RFCs relate to cybersecurity.
In addition, a number of professional and industry groups have
produced best-practices documents and guidelines. The most
important such document is The Standard of Good Practice for
Information Security (SGP), produced by the Information Security
Forum (ISF). This almost 300-page document provides a wide
range of best practices based on the consensus of industry and
Discovering Diverse Content Through
Random Scribd Documents
The Project Gutenberg eBook of Shavings &
Scrapes from many parts
This ebook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this ebook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.
Title: Shavings & Scrapes from many parts
Author: Jules Joubert
Release date: November 4, 2018 [eBook #58230]
Language: English
Credits: Produced by Christian Boissonnas, The Online
Distributed
Proofreading Team at http://www.pgdp.net (This file
was
produced from scans of public domain works at The
National
Library of Australia.)
*** START OF THE PROJECT GUTENBERG EBOOK SHAVINGS &
SCRAPES FROM MANY PARTS ***
Shavings
&
Scrapes
FROM MANY PARTS
BY
Jules Joubert
There was a time when meadows, grove, and stream,
The earth, and every common sight, to me did seem
Apparelled in celestial light—
The glory and the freshness of a dream.
It is not now as it has been of yore,
Turn wheresoe’r I may,
By night or day,
The things which I have seen are now no more.
Wordsworth’s “Recollections of Early
Childhood.”
DUNEDIN
J. WILKIE AND CO.
Princes Street
1890
Dedicated to
The Members of the Savage Club,
Dunedin, N. Z.,
1889,
BY
The Author.
CONTENTS.
EARLY SCRAPES
A Stray Shot 1
Peep of Day 4
Chip from an Old Log 9
First Lesson in Finance 15
Robinson Crusoe Realised 20
Maoriland 25
EARLY AUSTRALIAN SHAVINGS
Sydney in 1839 32
The Gold Fever 37
Some Bushrangers I Have Known 41
How Money Used to be Made 49
NEW CALEDONIA
Taking Possession: “Tit for Tat” 53
“He who Fights and Runs Away” 56
Another Narrow Squeak 60
A South Sea Trip 63
NEW SOUTH WALES
A Few Old Identities 69
A Land Speculation 75
A Hard Knock 79
Home, Sweet Home 83
Antipodean Gratitude 88
CEYLON
Grains of Singalese Sand 92
The Paraherra 96
“Hamlet” Under Difficulties 103
An Elephant Hunt 106
A Matrimonial “Scrape” 113
The Tree of Life 131
A Water Party in the Garden of Eden 145
INDIA
Madras 155
The Ganges 158
Calcutta 162
The Denizens of the Jungle 169
Sanctimonious 173
The Calcutta Exhibition 180
A Tramp Through India 184
Benares—the Sacred City 196
Through the Central Provinces 200
Princely Hospitality 206
Indian Sports 211
Home, “Dear” Home 224
The Christening.
N one of the first chapters of Charles Dickens’ “Nicholas
Nickleby” he gives a very amusing description of the family
conclave held to decide upon the name of the newborn infant.
I am now in the same dilemma.
It is very well to say that “A rose will smell quite as sweet,” &c.,
&c., and that there is nothing in a name. On this point I must agree
to differ.
When I wrote this book I had fixed upon “Ups and Downs”—my
publisher tells me that there is already in existence a book under
that name. “A Random Shot” met with a similar objection. A score
more attempts proved equally fruitless—“Too long,” “Too short,”
“Won’t do”—until I made up my mind to translate it into French and
call it “Sans nom,” which after all would be most appropriate.
Owing no doubt to perplexity, a homicidal fit came upon me. My
fire was being lit: my M.S. laid before me. It struck me that after all
it would serve admirably to kindle a flame.
My servant entered with the coal scuttle and some shavings. This
saved my paper. “SAVED”!! I cried. I had a name at last: “Shavings
and Scrapes”—original, though slightly Barberous. “Shavings” it is,
and “Shavings” it shall be.
As you see, the christening was a private affair, settled au coin du
feu.
But for this timely assistance the book would have made a blaze,
it is true, and my literary effort would have ended in SMOKE.
J. J.
EARLY SCRAPES
I.
A STRAY SHOT.
HAT is life? A perpetual see-saw with fortune—man at one
end, the fickle jade at the other.
A feather at times turns the balance. In my case, an
ounce of lead has disturbed the equilibrium of the fortunes
of many lives.
Descended from men of war, I have become most essentially a
man of peace.
Still, when that most popular of all toasts, “The Army and Navy,” is
proposed, it stirs up the old leaven which still permeates the blood
that came to me with the name I inherited from my sires.
My paternal grandfather had two sons, one a soldier, the younger
a sailor. The latter is answerable for my sins—if I have ever
committed any.
The vicissitudes of life are strange, bordering at times on fiction.
During the war France had to wage against almost every other
nation in Europe to defend her soil from the invasion instigated by a
fallen monarchy against the Republican element which originated in
1789, an army, spontaneously raised from her “people,” crossed the
Alps, carrying the tricolor flag into Italy, where many hard battles
were fought.
These strangely composed, ill clad, badly fed, ragged hordes of
French soldiers were led to victory by two young, inexperienced
generals—both ambitious, energetic men—the younger, General
Bonaparte, in whom the “Directoire” possessed a dangerous enemy
of the Republic; the senior, my uncle, whose special mission was to
watch the impetuous Corsican and counter-balance the evident sway
and influence he was daily gaining over the young army by the
daring of his actions and electrifying effect of those short, pithy
allocutions he invariably made to the soldiers whom he sometimes
so rashly led to death—but always to victory. During the Italian
campaign the two young leaders vied with each other in their efforts
to drill and train the undisciplined battalions, recruited and enlisted
on the Champ de Mars, in Paris, during the terrible period so
graphically termed the “Reign of Terror.”
From the victories gained in Italy originated that wonderful army
whose glorious deeds have placed France foremost as a military
Power.
During one of the most decisive battles on the fields of Novi, after
a days’ hard fighting, and when the victory once more had smiled on
his flag, my uncle fell, shot through the heart. When his body,
carried reverently by his staff, was brought to his tent, a sealed
packet was found on the General’s camp-table—a packet containing
an official order from the “Directoire” to assume the supreme
command of the French army!
What changes in the destinies of Europe have resulted from this
stray shot! Two men then ruling the armies of France—one a
staunch Republican, seeking only the welfare of his country; the
other an ambitious parvenu, ever ready to sacrifice the lives of
hundreds of thousands to his own aggrandisement. Who can say
what might have been the result had Bonaparte fallen instead of his
brother officer?
I only refer to this episode in the early history of the family
whence I spring because I consider that it very likely had to a great
extent a direct influence on my after life, even though it occurred a
quarter of a century before I made my first appearance in this
wicked world. It gave rise to a jealous feeling in my father’s heart
and led him to leave the navy.
Soon after Napoleon became the ruler of the French Empire, my
father, like the Roman of old, exchanged the sword for the plough.
Instead of making a name in the naval engagements of Aboukir or
Trafalgar he devoted his life to a quieter and perhaps better purpose
—the drainage of the then pestilential morasses of Medoc, which
have since acquired a world-wide fame for the production of some of
the best wines in the south of France.
In some of the libraries of my native country some useful works
are to be found on the culture of the vine, the drainage of land in
the south of France, as well as a treatise on artesian wells, which
was one of my father’s hobbies—the first of these useful perforations
having been made in Medoc, and ultimately the great artesian well
of Grenelle, in Paris.
II.
PEEP OF DAY.
AVING so far established the genealogy of the author,
it might be as well to bring him to the fore, and to
state that on the 31st day of July, 1824, I made my
entrée at Angoulême, one of the prettiest towns in
France—a town now seldom visited by tourists,
owing to its peculiar position on the summit of a sugar-loaf-shaped
hill, almost surrounded by the river Charente—too steep for a
railway. The engineers who planned the iron road in that locality
avoided Angoulême, so that even in this age of progress my native
town is, I may say, what it was when I left it many, many years ago
—a quiet, unpretentious city, merely known by the paper mills,
which afford the principal item of trade of its inhabitants. These
mills, in the early part of the present century, belonged to my
grandfather; and to this day the water lines on the paper
manufactured at Angoulême bear the names “Laroche-Joubert,” the
former family having intermarried with ours.
Earlier than it is usual now to put a youth to school, I was sent to
Bordeaux, and made to plough up Latin and Greek under a most
strict and overbearing taskmaster. In those days the easy hours and
lazy system of education now in vogue were unknown. Strict
discipline—such, indeed, as would now cause a mutiny in a
penitentiary—was considered the right and proper treatment in the
best regulated schools. Even Dickens has been mild in his
description of scholastic comforts.
I confess that I little relished the scanty food, the corporeal
punishment, and long dreary hours spent at my first school at
Bordeaux.
The system of schooling now in vogue may—and I feel sure, does
—bring about quite as good a result as far as education is
concerned; but I still think that the discipline and hardship of the old
system had its beneficial effects. I have still a strong impression of
those old days, when the first bell used to wake us at 6 A.M., winter
and summer; ten minutes allowed to dress; marched to a trough of
iced water, in winter, for ablutions; then into a cold, dreary
schoolroom—each boy provided with a tallow dip to lighten the
darkness of his desk—where, with fingers benumbed with cold, he
had to dive into “Æsop” or “Cornelius Nepos,” translate Homer and
Virgil on an empty stomach, and with heavy eye-lids, until 8 o’clock,
when a slice of dry bread and very much christened milk of doubtful
origin would be handed over on our way to the playground. Thus
fortified we had to wait till 11 for a déjeuner à la fourchette, worse
than that I have often seen placed before vagrants in the soup
kitchens of Sydney or Melbourne. Such treatment, however, was
“quite the thing” fifty years ago. It not only sharpened the appetite—
it sharpened the “wits” of young “gentlemen.”
Being one of the youngest and smallest of boys in Mons. Worms’
school, I had to submit to the will of my seniors. The private store of
our schoolmaster was in a large room on the upper floor. The
skylight of our dormitories enabled us to have access to the roof,
and by dint of a clothes line a small boy could readily be lowered
through the chimney into this receptacle of jam pots, tinned
sardines, and other delicacies.
What my elders (whose education was more advanced) conceived,
I had to execute. Being lowered into the store-room to secure
“goodies” for my mates seemed quite a heroic achievement. This
systematic burglary we carried on for some time, until one fine
evening the line snapped. I dropped into the fireplace with a crash
which brought in one of the ushers. A trial—when, all attempts to
make me disclose the names of my companions having proved
fruitless, I was sentenced to expulsion from the school.
This scandalous beginning in the world, and ignominious exit from
my first school, though very disgraceful, have not been altogether
devoid of good results. I have ever since been fully impressed with
several important facts—First, that burglaries in the long run don’t
pay; second, that it is safer to get into a room by the door than
through the chimney; third, it is always better to lower someone else
after “goodies” than to be lowered one’s self; and last, though not
least, that it is not safe to trust one’s body to a hemp rope. It may
have been the means of keeping me from more mischief—who
knows?
I, however, hailed with delight my removal to the College Bourbon
in Paris, where, as a day pupil, I could enjoy the comforts of “home”
when my day’s college work came to an end.
It was there that I became personally acquainted with many
whose names have since become famous in French history, having
for several years sat on the same form with A. Dumas (fils), Clavel,
Leon Say, Phillipeaux Brénier; and, at the annual examinations, the
sons of our monarch, Louis Philippe—the Ducs d’Aumale and
Montpensier—schoolmates whom I had the good fortune to meet
again in Paris in 1878, after many years of a rambling life in the
Southern Hemisphere.
My eldest brother took it into his head to start for Australia in
1837. I was much engrossed by the fuss all our friends made with
him when he left for what was then considered the confines of the
world; his letters describing the voyage, his landing, and the
prospects of this new world so preyed on my mind that I at once
decided to follow in his tracks.
Communications, however, were not quite as frequent in those
days as they are now. Instead of a thirty-five days’ passage on board
a floating palace, a trip to Australia meant close imprisonment for
eleven or twelve months in a wooden tub of three or four hundred
tons, with hard biscuit and salt junk, and perhaps an occasional meal
of tinned beef and preserved potatoes, washed down with a draught
of putrid water, often doled out in very minute portions. All these
were thoroughly put before me to cool down my travelling
proclivities. But, on the other hand, most of the visitors at home
were old shipmates of my father’s—Dumont-Durville, Laplace, Berard
—all eminent French navigators, who had followed Cook and
Lapeyrouse’s ships in the Pacific—so that, whilst one ear listened to
the words of caution and “Home, Sweet Home,” sung to me by the
female portion of the household, the other, like gentle Desdemona’s,
heard our visitors tell
Of moving accidents by flood and field;
Of hair-breadth 'scapes in the imminent, deadly breach;
Of being taken by the insolent foe
And sold to slavery. . . .
And of the cannibals that each other eat—
The Anthropophagi— . . .
In faith ’twas strange, ’twas passing strange.
The more welcome tales of adventures across the sea became
prominent in my mind and eventually carried the day. Once my mind
was set on going, I left no stone unturned to make a start. At the
instigation of our sailor friends, and with their assistance, I obtained
from the then Ministre de la Marine, also a friend of my father—
Admiral Duperré—a passage on board the corvette Heroine, which
was going to make a voyage round the world, and, en passant, to
carry to the Bay of Islands some Church ornaments and
ecclesiastical garments sent by the Queen of the French—the
sainted wife of Louis Phillipe—to Monseigneur Pompallier, Catholic
Bishop of New Zealand.
III.
CHIPS FROM AN OLD LOG
N the 1st of May, 1839, before daybreak—having only been a
few hours on board the Heroine—an unusual noise and
turmoil gave me the first idea of the life of a “passager civil”
on board a man-of-war.
My hammock was hung close to the gun-room in the gun-deck,
where 32 caronades and 250 Jack-tars shared with me that rather
close and murky dormitory, which at a given signal from the
boatswain’s whistle had to be cleared of hammocks, washed,
holystoned, and mopped—all before 5 A.M.
This, I may say, was an operation commenced on that first
morning an hour earlier than usual, owing to the fact that “Saint
Philippe” being the patron saint of the King of the French, and the
first of May being the birthday of the said saint (a fact I am not
prepared to vouch for), the whole of the fleet at anchor in the port
of Brest would thunder a royal salute at sunrise, in which our ship
could not take part, as in those benighted days it was thought that
the firing of 21 guns might cause a deviation of the chronometers.
It appears that an order received during the night—to clear out
before daylight—had to be obeyed, so we weighed anchor and put
out to sea. It was a rough, miserable day. I had hardly managed to
hurry on my clothes before the Heroine commenced to toss and
pitch as only a heavily-gunned frigate can do in a short, heavy sea
with half a gale blowing in her teeth.
I shall never forget an eventful night in the Bay of Biscay, when
the frigate was rolling heavily from side to side. One of the racks
between the caronades gave way under the weight of the eight or
ten thirty-two pound shots it held. These cannon balls were of
course sent rolling from starboard to port with increased velocity,
threatening in their progress to knock the sides of the ship into
splinters. The watch was piped down to stop this mischief, but the
task was not an easy one. The men had only the dim light of
lanterns to see the very lively balls, and stopping them in their mad
career was fraught with much danger; indeed, before they were all
secured, several poor fellows had to be carried into the hospital with
bruised and broken limbs.
I must confess that had it been possible on that and the following
few days to have changed places with the only brother I had left
comfortably quartered under the paternal roof, these pages would
never have been penned in New Zealand, and he, poor fellow, would
have escaped the tragical death he met with in the trenches at
Sebastopol during the Crimean war, where he fell mortally wounded
at the head of his company, the 11th Artillery.
Youth and a healthy constitution soon overcame the effects of the
mal de mer. The Heroine was the smartest sailer in the French navy.
Our orders were to keep in the wake of an admiral’s ship—“La
Gloire”—sent to Rio de Janeiro to arrange matters in connection with
the intended marriage of the Prince de Joinville with the sister of
Don Pedro, Emperor of Brazil. Whilst tossing in the Bay of Biscay,
and in order to keep at a respectful distance astern of the admiral’s
ship, our commander—a knowing old salt, well versed in seamanship
—well aware that the best qualities of his frigate were under easy
sail, crammed on as much canvas as she could stagger under. This
manœuvre brought out a signal from La Gloire to reduce sail and
“rendezvous” at the entrance of Rio harbour. This, happening at
sunset, was at once acted upon. During the night, under reduced
sail, we forged ahead, so that when daylight came the admiral’s ship
was almost hull-down astern of the Heroine. A quarter-master came
to the skipper saying that the Gloire had hoisted our number, and
was signalling fresh orders. “Who told you to look astern, sir?” said
the captain. “You deserve to lose a week’s grog for being so
officious. Go on the fore-castle and see if there are any breakers
ahead; leave it to me to watch the admiral’s signals!” The fact is the
old boy wanted to call at the Azores to take in a supply of wine for
his and the gun-room table; he knew well that as soon as the heavy
pressure of canvas was taken off, the gallant ship would displace
less water under her bows, and could give the flag-ship one mile in
three.
Thanks to this dodge, we spent a few days at Madeira and
Teneriffe, where I received my first idea of semi-tropical climate,
vegetation, and manners.
By this time, though not much of a sailor, I had got over the
nauseous feeling, and got somewhat used to the “hard tack” called
food, served twice a day to the midshipmens’ mess, where I was
quartered.
Two meals of half a kilogramme of biscuit, as hard as cast-iron
and quite as dark in colour; half a pint of haricots or broad beans
alternately, which, I should think, were bought at the sale of surplus
stores of Noah’s ark after she stranded on Mount Ararat; salt beef or
pork, quite as ancient; and oh! such water!—the stench of it made
the washing of one’s hands in it a punishment. Yet we had to drink
it, together with the Vin de campagne—a bluish mixture which would
have been most acceptable to Messrs Day and Martin for the dilution
of their celebrated blacking, but certainly rejected with contempt by
Cross and Blackwell for pickling purposes.
What a treat it was to land at Funchal and Teneriffe! Shall I ever
forget the delicious treat to rush into a cook-shop and “tuck in” a
regular “burster” of white bread, fresh meat, and fruit. Of the latter I
made, of course, an ample provision—returning on board with
baskets of oranges, bananas, &c. Alas! I had to learn that in a man-
of-war, in the year A.D. 1839, a passenger was a kind of incubus—
looked upon as a nuisance—an object everlastingly in everybody’s
way—without a cabin, a locker, a place to resort to, barring the
hammock devoted to his use from 8 p.m. till 6 a.m. next day. The
consequence was that all my stores of “goodies” were summarily
seized by, and devoured in, the midshipmens’ mess, who, less
favoured, had not been allowed even a scamper on shore.
Prior to embarkation my father’s last words were—“A few months
on board one of His Majesty’s ships will give you an idea of the
world.” Most truly had he spoken. Barely one month from the
parental roof, I had already acquired some experience. I already
found out that a sea life was not couleur de rose, as I had painted it
in imagination. The petty tyranny of my messmates soon knocked
out of me all boyish, nursery, and even college notions of self-
importance.
The Peak of Teneriffe was soon lost in the far horizon; the gallant
ship, once more under canvas, sped her course through lovely
weather, shaping a direct course for the South American coast.
Gradually getting accustomed to what at first seemed a hard life,
making good friends in the gun-room—more especially with our
portly head surgeon and the purser, to whose kindness I was
indebted for leave to use the surgery and the clerk’s room, as well as
the free run of the ship’s library—time hung less wearily. Besides, we
were nearing the Brazilian shores. The land breeze every evening
wafted to sea the balmy-scented air of orange groves; all eyes
strained throughout the day to follow the varied indentations of
distant ranges. We passed daily a number of quaintly rigged vessels
and coast boats.
At last we reached our rendezvous with the Gloire, and paid the
penalty of our treachery. She was not there, and for five dreary long
days we had to tack off and on in view of one of the most lovely
harbours in the world, scanning the blue line of the sky for the
pennant of the old admiral. He came at last—his pride in finding the
Heroine newly painted, scrubbed, and in every plank, spar, or rigging
—a perfect picture of neat, trim beauty—made him overlook the
otherwise unpardonable sin of having out-sailed his old boat.
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
Let us accompany you on the journey of exploring knowledge and
personal growth!
ebookluna.com

(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Standards

  • 1.
    (eBook PDF) EffectiveCybersecurity: A Guide to Using Best Practices and Standards download https://ebookluna.com/product/ebook-pdf-effective-cybersecurity- a-guide-to-using-best-practices-and-standards/ Download full version ebook from https://ebookluna.com
  • 2.
    We believe theseproducts will be a great fit for you. Click the link to download now, or visit ebookluna.com to discover even more! (eBook PDF) A Risk Professional's Survival Guide: Applied Best Practices in Risk Management https://ebookluna.com/product/ebook-pdf-a-risk-professionals-survival- guide-applied-best-practices-in-risk-management/ (eBook PDF) Information Governance: Concepts, Strategies, and Best Practices https://ebookluna.com/product/ebook-pdf-information-governance-concepts- strategies-and-best-practices/ (eBook PDF) Change Management: A Guide to Effective Implementation 4th Edition https://ebookluna.com/product/ebook-pdf-change-management-a-guide-to- effective-implementation-4th-edition/ (eBook PDF) Regression & Linear Modeling: Best Practices and Modern Methods https://ebookluna.com/product/ebook-pdf-regression-linear-modeling-best- practices-and-modern-methods/
  • 3.
    (eBook PDF) PolicingAmerica: Challenges and Best Practices 9th Edition https://ebookluna.com/product/ebook-pdf-policing-america-challenges-and- best-practices-9th-edition/ (eBook PDF) Modeling and Simulation: Challenges and Best Practices for Industry https://ebookluna.com/product/ebook-pdf-modeling-and-simulation-challenges- and-best-practices-for-industry/ (eBook PDF) Human Capital Management Standards: A Complete Guide https://ebookluna.com/product/ebook-pdf-human-capital-management-standards- a-complete-guide/ (eBook PDF) Effective Training Systems Strategies and Practices 5th Edition https://ebookluna.com/product/ebook-pdf-effective-training-systems- strategies-and-practices-5th-edition/ (eBook PDF) Improving Board Risk Oversight Through Best Practices https://ebookluna.com/product/ebook-pdf-improving-board-risk-oversight- through-best-practices/
  • 6.
    7 Appendix A: Referencesand Standards Appendix B: Glossary Index Appendix C (Online Only): Answers to Review Questions You can find Appendix C at informit.com/title/9780134772806. Click the Downloads tab to access the PDF file.
  • 7.
    8 Table of Contents Preface Chapter1: Best Practices, Standards, and a Plan of Action 1.1 Defining Cyberspace and Cybersecurity 1.2 The Value of Standards and Best Practices Documents 1.3 The Standard of Good Practice for Information Security 1.4 The ISO/IEC 27000 Suite of Information Security Standards ISO 27001 ISO 27002 1.5 Mapping the ISO 27000 Series to the ISF SGP 1.6 NIST Cybersecurity Framework and Security Documents NIST Cybersecurity Framework NIST Security Documents 1.7 The CIS Critical Security Controls for Effective Cyber Defense 1.8 COBIT 5 for Information Security 1.9 Payment Card Industry Data Security Standard (PCI DSS) 1.10 ITU-T Security Documents 1.11 Effective Cybersecurity The Cybersecurity Management Process Using Best Practices and Standards Documents 1.12 Key Terms and Review Questions Key Terms Review Questions 1.13 References Part I: Planning for Cybersecurity Chapter 2: Security Governance 2.1 Security Governance and Security Management
  • 8.
    9 2.2 Security GovernancePrinciples and Desired Outcomes Principles Desired Outcomes 2.3 Security Governance Components Strategic Planning Organizational Structure Roles and Responsibilities Integration with Enterprise Architecture Policies and Guidance 2.4 Security Governance Approach Security Governance Framework Security Direction Responsible, Accountable, Consulted, and Informed (RACI) Charts 2.5 Security Governance Evaluation 2.6 Security Governance Best Practices 2.7 Key Terms and Review Questions Key Terms Review Questions 2.8 References Chapter 3: Information Risk Assessment 3.1 Risk Assessment Concepts Risk Assessment Challenges Risk Management Structure of This Chapter 3.2 Asset Identification Hardware Assets Software Assets Information Assets Business Assets Asset Register 3.3 Threat Identification
  • 9.
    10 The STRIDE ThreatModel Threat Types Sources of Information 3.4 Control Identification 3.5 Vulnerability Identification Vulnerability Categories National Vulnerability Database and Common Vulnerability Scoring System 3.6 Risk Assessment Approaches Quantitative Versus Qualitative Risk Assessment Simple Risk Analysis Worksheet Factor Analysis of Information Risk 3.7 Likelihood Assessment Estimating Threat Event Frequency Estimating Vulnerability Loss Event Frequency 3.8 Impact Assessment Estimating the Primary Loss Estimating the Secondary Loss Business Impact Reference Table 3.9 Risk Determination 3.10 Risk Evaluation 3.11 Risk Treatment Risk Reduction Risk Retention Risk Avoidance Risk Transfer 3.12 Risk Assessment Best Practices 3.13 Key Terms and Review Questions Key Terms Review Questions 3.14 References
  • 10.
    11 Chapter 4: SecurityManagement 4.1 The Security Management Function Security Planning Capital Planning 4.2 Security Policy Security Policy Categories Security Policy Document Content Management Guidelines for Security Policies Monitoring the Policy 4.3 Acceptable Use Policy 4.4 Security Management Best Practices 4.5 Key Terms and Review Questions Key Terms Review Questions 4.6 References PART II: Managing the Cybersecurity Function Chapter 5: People Management 5.1 Human Resource Security Security in the Hiring Process During Employment Termination of Employment 5.2 Security Awareness and Education Security Awareness Cybersecurity Essentials Program Role-Based Training Education and Certification 5.3 People Management Best Practices 5.4 Key Terms and Review Questions Key Terms Review Questions 5.5 References
  • 11.
    12 Chapter 6: InformationManagement 6.1 Information Classification and Handling Information Classification Information Labeling Information Handling 6.2 Privacy Privacy Threats Privacy Principles and Policies Privacy Controls 6.3 Document and Records Management Document Management Records Management 6.4 Sensitive Physical Information 6.5 Information Management Best Practices 6.6 Key Terms and Review Questions Key Terms Review Questions 6.7 References Chapter 7: Physical Asset Management 7.1 Hardware Life Cycle Management Planning Acquisition Deployment Management Disposition 7.2 Office Equipment Threats and Vulnerabilities Security Controls Equipment Disposal 7.3 Industrial Control Systems
  • 12.
    13 Differences Between ITSystems and Industrial Control Systems ICS Security 7.4 Mobile Device Security Mobile Device Technology Mobile Ecosystem Vulnerabilities Mobile Device Security Strategy Resources for Mobile Device Security 7.5 Physical Asset Management Best Practices 7.6 Key Terms and Review Questions Key Terms Review Questions 7.7 References Chapter 8: System Development 8.1 System Development Life Cycle NIST SDLC Model The SGP’s SDLC Model DevOps 8.2 Incorporating Security into the SDLC Initiation Phase Development/Acquisition Phase Implementation/Assessment Phase Operations and Maintenance Phase Disposal Phase 8.3 System Development Management System Development Methodology System Development Environments Quality Assurance 8.4 System Development Best Practices 8.5 Key Terms and Review Questions Key Terms
  • 13.
    14 Review Questions 8.6 References Chapter9: Business Application Management 9.1 Application Management Concepts Application Life Cycle Management Application Portfolio Management Application Performance Management 9.2 Corporate Business Application Security Business Application Register Business Application Protection Browser-Based Application Protection 9.3 End User-Developed Applications (EUDAs) Benefits of EUDAs Risks of EUDAs EUDA Security Framework 9.4 Business Application Management Best Practices 9.5 Key Terms and Review Questions Key Terms Review Questions 9.6 References Chapter 10: System Access 10.1 System Access Concepts Authorization 10.2 User Authentication A Model for Electronic User Authentication Means of Authentication Multifactor Authentication 10.3 Password-Based Authentication The Vulnerability of Passwords The Use of Hashed Passwords Password Cracking of User-Chosen Passwords
  • 14.
    15 Password File AccessControl Password Selection 10.4 Possession-Based Authentication Memory Cards Smart Cards Electronic Identity Cards One-Time Password Device Threats to Possession-Based Authentication Security Controls for Possession-Based Authentication 10.5 Biometric Authentication Criteria for Biometric Characteristics Physical Characteristics Used in Biometric Applications Operation of a Biometric Authentication System Biometric Accuracy Threats to Biometric Authentication Security Controls for Biometric Authentication 10.6 Risk Assessment for User Authentication Authenticator Assurance Levels Selecting an AAL Choosing an Authentication Method 10.7 Access Control Subjects, Objects, and Access Rights Access Control Policies Discretionary Access Control Role-Based Access Control Attribute-Based Access Control Access Control Metrics 10.8 Customer Access Customer Access Arrangements Customer Contracts Customer Connections
  • 15.
    16 Protecting Customer Data 10.9System Access Best Practices 10.10 Key Terms and Review Questions Key Terms Review Questions 10.11 References Chapter 11: System Management 11.1 Server Configuration Threats to Servers Requirements for Server Security 11.2 Virtual Servers Virtualization Alternatives Virtualization Security Issues Securing Virtualization Systems 11.3 Network Storage Systems 11.4 Service Level Agreements Network Providers Computer Security Incident Response Team Cloud Service Providers 11.5 Performance and Capacity Management 11.6 Backup 11.7 Change Management 11.8 System Management Best Practices 11.9 Key Terms and Review Questions Key Terms Review Questions 11.10 References Chapter 12: Networks and Communications 12.1 Network Management Concepts Network Management Functions Network Management Systems
  • 16.
    17 Network Management Architecture 12.2Firewalls Firewall Characteristics Types of Firewalls Next-Generation Firewalls DMZ Networks The Modern IT Perimeter 12.3 Virtual Private Networks and IP Security Virtual Private Networks IPsec Firewall-Based VPNs 12.4 Security Considerations for Network Management Network Device Configuration Physical Network Management Wireless Access External Network Connections Firewalls Remote Maintenance 12.5 Electronic Communications Email Instant Messaging Voice over IP (VoIP) Networks Telephony and Conferencing 12.6 Networks and Communications Best Practices 12.7 Key Terms and Review Questions Key Terms Review Questions 12.8 References Chapter 13: Supply Chain Management and Cloud Security 13.1 Supply Chain Management Concepts The Supply Chain
  • 17.
    18 Supply Chain Management 13.2Supply Chain Risk Management Supply Chain Threats Supply Chain Vulnerabilities Supply Chain Security Controls SCRM Best Practices 13.3 Cloud Computing Cloud Computing Elements Cloud Computing Reference Architecture 13.4 Cloud Security Security Considerations for Cloud Computing Threats for Cloud Service Users Risk Evaluation Best Practices Cloud Service Agreement 13.5 Supply Chain Best Practices 13.6 Key Terms and Review Questions Key Terms Review Questions 13.7 References Chapter 14: Technical Security Management 14.1 Security Architecture 14.2 Malware Protection Activities Types of Malware The Nature of the Malware Threat Practical Malware Protection 14.3 Malware Protection Software Capabilities of Malware Protection Software Managing Malware Protection Software 14.4 Identity and Access Management IAM Architecture
  • 18.
    19 Federated Identity Management IAMPlanning IAM Best Practices 14.5 Intrusion Detection Basic Principles Approaches to Intrusion Detection Host-Based Intrusion Detection Techniques Network-Based Intrusion Detection Systems IDS Best Practices 14.6 Data Loss Prevention Data Classification and Identification Data States 14.7 Digital Rights Management DRM Structure and Components DRM Best Practices 14.8 Cryptographic Solutions Uses of Cryptography Cryptographic Algorithms Selection of Cryptographic Algorithms and Lengths Cryptography Implementation Considerations 14.9 Cryptographic Key Management Key Types Cryptoperiod Key Life Cycle 14.10 Public Key Infrastructure Public Key Certificates PKI Architecture Management Issues 14.11 Technical Security Management Best Practices 14.12 Key Terms and Review Questions Key Terms Review Questions
  • 19.
    20 14.13 References Chapter 15:Threat and Incident Management 15.1 Technical Vulnerability Management Plan Vulnerability Management Discover Known Vulnerabilities Scan for Vulnerabilities Log and Report Remediate Vulnerabilities 15.2 Security Event Logging Security Event Logging Objective Potential Security Log Sources What to Log Protection of Log Data Log Management Policy 15.3 Security Event Management SEM Functions SEM Best Practices 15.4 Threat Intelligence Threat Taxonomy The Importance of Threat Intelligence Gathering Threat Intelligence Threat Analysis 15.5 Cyber Attack Protection Cyber Attack Kill Chain Protection and Response Measures Non-Malware Attacks 15.6 Security Incident Management Framework Objectives of Incident Management Relationship to Information Security Management System Incident Management Policy Roles and Responsibilities
  • 20.
    21 Incident Management Information IncidentManagement Tools 15.7 Security Incident Management Process Preparing for Incident Response Detection and Analysis Containment, Eradication, and Recovery Post-Incident Activity 15.8 Emergency Fixes 15.9 Forensic Investigations Prepare Identify Collect Preserve Analyze Report 15.10 Threat and Incident Management Best Practices 15.11 Key Terms and Review Questions Key Terms Review Questions 15.12 References Chapter 16: Local Environment Management 16.1 Local Environment Security Local Environment Profile Local Security Coordination 16.2 Physical Security Physical Security Threats Physical Security Officer Defense in Depth Physical Security: Prevention and Mitigation Measures Physical Security Controls 16.3 Local Environment Management Best Practices
  • 21.
    22 16.4 Key Termsand Review Questions Key Terms Review Questions 16.5 References Chapter 17: Business Continuity 17.1 Business Continuity Concepts Threats Business Continuity in Operation Business Continuity Objectives Essential Components for Maintaining Business Continuity 17.2 Business Continuity Program Governance Business Impact Analysis Risk Assessment Business Continuity Strategy 17.3 Business Continuity Readiness Awareness Training Resilience Control Selection Business Continuity Plan Exercising and Testing Performance Evaluation 17.4 Business Continuity Operations Emergency Response Crisis Management Business Recovery/Restoration 17.5 Business Continuity Best Practices 17.6 Key Terms and Review Questions Key Terms Review Questions
  • 22.
    23 17.7 References Part III:Security Assessment Chapter 18: Security Monitoring and Improvement 18.1 Security Audit Security Audit and Alarms Model Data to Collect for Auditing Internal and External Audit Security Audit Controls 18.2 Security Performance Security Performance Measurement Security Monitoring and Reporting Information Risk Reporting Information Security Compliance Monitoring 18.3 Security Monitoring and Improvement Best Practices 18.4 Key Terms and Review Questions Key Terms Review Questions 18.5 References Appendix A: References and Standards Appendix B: Glossary Index Appendix C (Online Only): Answers to Review Questions You can find Appendix C at informit.com/title/9780134772806. Click the Downloads tab to access the PDF file.
  • 23.
    24 Preface There is thebook, Inspector. I leave it with you, and you cannot doubt that it contains a full explanation. —The Adventure of the Lion’s Mane, by Sir Arthur Conan Doyle Background Effective cybersecurity is very difficult. A number of organizations, based on wide professional input, have developed best-practices types of documents as well as standards for implementing and evaluating cybersecurity. On the standards side, the most prominent player is the National Institute of Standards and Technology (NIST). NIST has created a huge number of security publications, including 9 Federal Information Processing Standards (FIPS) and well over 100 active Special Publications (SP) that provide guidance on virtually all aspects of cybersecurity. Equally important is the International Organization for Standardization (ISO) 27000 series of standards on information security management systems. Other organizations that have produced cybersecurity standards and guidelines include: ISACA/COBIT: The COBIT-5 for information security and related documents are widely used by the industry. ITU Telecommunication Standardization Sector (ITU-T): Most important are the series X.1050 through X.1069 on security management. Internet Society (ISOC): A number of published standards and RFCs relate to cybersecurity. In addition, a number of professional and industry groups have produced best-practices documents and guidelines. The most important such document is The Standard of Good Practice for Information Security (SGP), produced by the Information Security Forum (ISF). This almost 300-page document provides a wide range of best practices based on the consensus of industry and
  • 24.
    Discovering Diverse ContentThrough Random Scribd Documents
  • 28.
    The Project GutenbergeBook of Shavings & Scrapes from many parts
  • 29.
    This ebook isfor the use of anyone anywhere in the United States and most other parts of the world at no cost and with almost no restrictions whatsoever. You may copy it, give it away or re-use it under the terms of the Project Gutenberg License included with this ebook or online at www.gutenberg.org. If you are not located in the United States, you will have to check the laws of the country where you are located before using this eBook. Title: Shavings & Scrapes from many parts Author: Jules Joubert Release date: November 4, 2018 [eBook #58230] Language: English Credits: Produced by Christian Boissonnas, The Online Distributed Proofreading Team at http://www.pgdp.net (This file was produced from scans of public domain works at The National Library of Australia.) *** START OF THE PROJECT GUTENBERG EBOOK SHAVINGS & SCRAPES FROM MANY PARTS ***
  • 30.
  • 31.
    Scrapes FROM MANY PARTS BY JulesJoubert There was a time when meadows, grove, and stream, The earth, and every common sight, to me did seem Apparelled in celestial light— The glory and the freshness of a dream. It is not now as it has been of yore, Turn wheresoe’r I may, By night or day, The things which I have seen are now no more. Wordsworth’s “Recollections of Early Childhood.” DUNEDIN J. WILKIE AND CO. Princes Street 1890 Dedicated to
  • 32.
    The Members ofthe Savage Club, Dunedin, N. Z., 1889, BY The Author.
  • 33.
    CONTENTS. EARLY SCRAPES A StrayShot 1 Peep of Day 4 Chip from an Old Log 9 First Lesson in Finance 15 Robinson Crusoe Realised 20 Maoriland 25 EARLY AUSTRALIAN SHAVINGS Sydney in 1839 32 The Gold Fever 37 Some Bushrangers I Have Known 41 How Money Used to be Made 49 NEW CALEDONIA Taking Possession: “Tit for Tat” 53 “He who Fights and Runs Away” 56 Another Narrow Squeak 60 A South Sea Trip 63 NEW SOUTH WALES
  • 34.
    A Few OldIdentities 69 A Land Speculation 75 A Hard Knock 79 Home, Sweet Home 83 Antipodean Gratitude 88 CEYLON Grains of Singalese Sand 92 The Paraherra 96 “Hamlet” Under Difficulties 103 An Elephant Hunt 106 A Matrimonial “Scrape” 113 The Tree of Life 131 A Water Party in the Garden of Eden 145 INDIA Madras 155 The Ganges 158 Calcutta 162 The Denizens of the Jungle 169 Sanctimonious 173 The Calcutta Exhibition 180 A Tramp Through India 184 Benares—the Sacred City 196 Through the Central Provinces 200
  • 35.
    Princely Hospitality 206 IndianSports 211 Home, “Dear” Home 224 The Christening. N one of the first chapters of Charles Dickens’ “Nicholas Nickleby” he gives a very amusing description of the family conclave held to decide upon the name of the newborn infant. I am now in the same dilemma. It is very well to say that “A rose will smell quite as sweet,” &c., &c., and that there is nothing in a name. On this point I must agree to differ. When I wrote this book I had fixed upon “Ups and Downs”—my publisher tells me that there is already in existence a book under that name. “A Random Shot” met with a similar objection. A score more attempts proved equally fruitless—“Too long,” “Too short,” “Won’t do”—until I made up my mind to translate it into French and call it “Sans nom,” which after all would be most appropriate. Owing no doubt to perplexity, a homicidal fit came upon me. My fire was being lit: my M.S. laid before me. It struck me that after all it would serve admirably to kindle a flame. My servant entered with the coal scuttle and some shavings. This saved my paper. “SAVED”!! I cried. I had a name at last: “Shavings
  • 36.
    and Scrapes”—original, thoughslightly Barberous. “Shavings” it is, and “Shavings” it shall be. As you see, the christening was a private affair, settled au coin du feu. But for this timely assistance the book would have made a blaze, it is true, and my literary effort would have ended in SMOKE. J. J.
  • 37.
  • 38.
    I. A STRAY SHOT. HATis life? A perpetual see-saw with fortune—man at one end, the fickle jade at the other. A feather at times turns the balance. In my case, an ounce of lead has disturbed the equilibrium of the fortunes of many lives. Descended from men of war, I have become most essentially a man of peace. Still, when that most popular of all toasts, “The Army and Navy,” is proposed, it stirs up the old leaven which still permeates the blood that came to me with the name I inherited from my sires. My paternal grandfather had two sons, one a soldier, the younger a sailor. The latter is answerable for my sins—if I have ever committed any. The vicissitudes of life are strange, bordering at times on fiction. During the war France had to wage against almost every other nation in Europe to defend her soil from the invasion instigated by a fallen monarchy against the Republican element which originated in 1789, an army, spontaneously raised from her “people,” crossed the Alps, carrying the tricolor flag into Italy, where many hard battles were fought. These strangely composed, ill clad, badly fed, ragged hordes of French soldiers were led to victory by two young, inexperienced generals—both ambitious, energetic men—the younger, General Bonaparte, in whom the “Directoire” possessed a dangerous enemy of the Republic; the senior, my uncle, whose special mission was to
  • 39.
    watch the impetuousCorsican and counter-balance the evident sway and influence he was daily gaining over the young army by the daring of his actions and electrifying effect of those short, pithy allocutions he invariably made to the soldiers whom he sometimes so rashly led to death—but always to victory. During the Italian campaign the two young leaders vied with each other in their efforts to drill and train the undisciplined battalions, recruited and enlisted on the Champ de Mars, in Paris, during the terrible period so graphically termed the “Reign of Terror.” From the victories gained in Italy originated that wonderful army whose glorious deeds have placed France foremost as a military Power. During one of the most decisive battles on the fields of Novi, after a days’ hard fighting, and when the victory once more had smiled on his flag, my uncle fell, shot through the heart. When his body, carried reverently by his staff, was brought to his tent, a sealed packet was found on the General’s camp-table—a packet containing an official order from the “Directoire” to assume the supreme command of the French army! What changes in the destinies of Europe have resulted from this stray shot! Two men then ruling the armies of France—one a staunch Republican, seeking only the welfare of his country; the other an ambitious parvenu, ever ready to sacrifice the lives of hundreds of thousands to his own aggrandisement. Who can say what might have been the result had Bonaparte fallen instead of his brother officer? I only refer to this episode in the early history of the family whence I spring because I consider that it very likely had to a great extent a direct influence on my after life, even though it occurred a quarter of a century before I made my first appearance in this wicked world. It gave rise to a jealous feeling in my father’s heart and led him to leave the navy.
  • 40.
    Soon after Napoleonbecame the ruler of the French Empire, my father, like the Roman of old, exchanged the sword for the plough. Instead of making a name in the naval engagements of Aboukir or Trafalgar he devoted his life to a quieter and perhaps better purpose —the drainage of the then pestilential morasses of Medoc, which have since acquired a world-wide fame for the production of some of the best wines in the south of France. In some of the libraries of my native country some useful works are to be found on the culture of the vine, the drainage of land in the south of France, as well as a treatise on artesian wells, which was one of my father’s hobbies—the first of these useful perforations having been made in Medoc, and ultimately the great artesian well of Grenelle, in Paris.
  • 41.
    II. PEEP OF DAY. AVINGso far established the genealogy of the author, it might be as well to bring him to the fore, and to state that on the 31st day of July, 1824, I made my entrée at Angoulême, one of the prettiest towns in France—a town now seldom visited by tourists, owing to its peculiar position on the summit of a sugar-loaf-shaped hill, almost surrounded by the river Charente—too steep for a railway. The engineers who planned the iron road in that locality avoided Angoulême, so that even in this age of progress my native town is, I may say, what it was when I left it many, many years ago —a quiet, unpretentious city, merely known by the paper mills, which afford the principal item of trade of its inhabitants. These mills, in the early part of the present century, belonged to my grandfather; and to this day the water lines on the paper manufactured at Angoulême bear the names “Laroche-Joubert,” the former family having intermarried with ours. Earlier than it is usual now to put a youth to school, I was sent to Bordeaux, and made to plough up Latin and Greek under a most strict and overbearing taskmaster. In those days the easy hours and lazy system of education now in vogue were unknown. Strict discipline—such, indeed, as would now cause a mutiny in a penitentiary—was considered the right and proper treatment in the best regulated schools. Even Dickens has been mild in his description of scholastic comforts. I confess that I little relished the scanty food, the corporeal punishment, and long dreary hours spent at my first school at Bordeaux.
  • 42.
    The system ofschooling now in vogue may—and I feel sure, does —bring about quite as good a result as far as education is concerned; but I still think that the discipline and hardship of the old system had its beneficial effects. I have still a strong impression of those old days, when the first bell used to wake us at 6 A.M., winter and summer; ten minutes allowed to dress; marched to a trough of iced water, in winter, for ablutions; then into a cold, dreary schoolroom—each boy provided with a tallow dip to lighten the darkness of his desk—where, with fingers benumbed with cold, he had to dive into “Æsop” or “Cornelius Nepos,” translate Homer and Virgil on an empty stomach, and with heavy eye-lids, until 8 o’clock, when a slice of dry bread and very much christened milk of doubtful origin would be handed over on our way to the playground. Thus fortified we had to wait till 11 for a déjeuner à la fourchette, worse than that I have often seen placed before vagrants in the soup kitchens of Sydney or Melbourne. Such treatment, however, was “quite the thing” fifty years ago. It not only sharpened the appetite— it sharpened the “wits” of young “gentlemen.” Being one of the youngest and smallest of boys in Mons. Worms’ school, I had to submit to the will of my seniors. The private store of our schoolmaster was in a large room on the upper floor. The skylight of our dormitories enabled us to have access to the roof, and by dint of a clothes line a small boy could readily be lowered through the chimney into this receptacle of jam pots, tinned sardines, and other delicacies. What my elders (whose education was more advanced) conceived, I had to execute. Being lowered into the store-room to secure “goodies” for my mates seemed quite a heroic achievement. This systematic burglary we carried on for some time, until one fine evening the line snapped. I dropped into the fireplace with a crash which brought in one of the ushers. A trial—when, all attempts to make me disclose the names of my companions having proved fruitless, I was sentenced to expulsion from the school.
  • 43.
    This scandalous beginningin the world, and ignominious exit from my first school, though very disgraceful, have not been altogether devoid of good results. I have ever since been fully impressed with several important facts—First, that burglaries in the long run don’t pay; second, that it is safer to get into a room by the door than through the chimney; third, it is always better to lower someone else after “goodies” than to be lowered one’s self; and last, though not least, that it is not safe to trust one’s body to a hemp rope. It may have been the means of keeping me from more mischief—who knows? I, however, hailed with delight my removal to the College Bourbon in Paris, where, as a day pupil, I could enjoy the comforts of “home” when my day’s college work came to an end. It was there that I became personally acquainted with many whose names have since become famous in French history, having for several years sat on the same form with A. Dumas (fils), Clavel, Leon Say, Phillipeaux Brénier; and, at the annual examinations, the sons of our monarch, Louis Philippe—the Ducs d’Aumale and Montpensier—schoolmates whom I had the good fortune to meet again in Paris in 1878, after many years of a rambling life in the Southern Hemisphere. My eldest brother took it into his head to start for Australia in 1837. I was much engrossed by the fuss all our friends made with him when he left for what was then considered the confines of the world; his letters describing the voyage, his landing, and the prospects of this new world so preyed on my mind that I at once decided to follow in his tracks. Communications, however, were not quite as frequent in those days as they are now. Instead of a thirty-five days’ passage on board a floating palace, a trip to Australia meant close imprisonment for eleven or twelve months in a wooden tub of three or four hundred tons, with hard biscuit and salt junk, and perhaps an occasional meal of tinned beef and preserved potatoes, washed down with a draught
  • 44.
    of putrid water,often doled out in very minute portions. All these were thoroughly put before me to cool down my travelling proclivities. But, on the other hand, most of the visitors at home were old shipmates of my father’s—Dumont-Durville, Laplace, Berard —all eminent French navigators, who had followed Cook and Lapeyrouse’s ships in the Pacific—so that, whilst one ear listened to the words of caution and “Home, Sweet Home,” sung to me by the female portion of the household, the other, like gentle Desdemona’s, heard our visitors tell Of moving accidents by flood and field; Of hair-breadth 'scapes in the imminent, deadly breach; Of being taken by the insolent foe And sold to slavery. . . . And of the cannibals that each other eat— The Anthropophagi— . . . In faith ’twas strange, ’twas passing strange. The more welcome tales of adventures across the sea became prominent in my mind and eventually carried the day. Once my mind was set on going, I left no stone unturned to make a start. At the instigation of our sailor friends, and with their assistance, I obtained from the then Ministre de la Marine, also a friend of my father— Admiral Duperré—a passage on board the corvette Heroine, which was going to make a voyage round the world, and, en passant, to carry to the Bay of Islands some Church ornaments and ecclesiastical garments sent by the Queen of the French—the sainted wife of Louis Phillipe—to Monseigneur Pompallier, Catholic Bishop of New Zealand.
  • 46.
    III. CHIPS FROM ANOLD LOG N the 1st of May, 1839, before daybreak—having only been a few hours on board the Heroine—an unusual noise and turmoil gave me the first idea of the life of a “passager civil” on board a man-of-war. My hammock was hung close to the gun-room in the gun-deck, where 32 caronades and 250 Jack-tars shared with me that rather close and murky dormitory, which at a given signal from the boatswain’s whistle had to be cleared of hammocks, washed, holystoned, and mopped—all before 5 A.M. This, I may say, was an operation commenced on that first morning an hour earlier than usual, owing to the fact that “Saint Philippe” being the patron saint of the King of the French, and the first of May being the birthday of the said saint (a fact I am not prepared to vouch for), the whole of the fleet at anchor in the port of Brest would thunder a royal salute at sunrise, in which our ship could not take part, as in those benighted days it was thought that the firing of 21 guns might cause a deviation of the chronometers. It appears that an order received during the night—to clear out before daylight—had to be obeyed, so we weighed anchor and put out to sea. It was a rough, miserable day. I had hardly managed to hurry on my clothes before the Heroine commenced to toss and pitch as only a heavily-gunned frigate can do in a short, heavy sea with half a gale blowing in her teeth. I shall never forget an eventful night in the Bay of Biscay, when the frigate was rolling heavily from side to side. One of the racks between the caronades gave way under the weight of the eight or
  • 47.
    ten thirty-two poundshots it held. These cannon balls were of course sent rolling from starboard to port with increased velocity, threatening in their progress to knock the sides of the ship into splinters. The watch was piped down to stop this mischief, but the task was not an easy one. The men had only the dim light of lanterns to see the very lively balls, and stopping them in their mad career was fraught with much danger; indeed, before they were all secured, several poor fellows had to be carried into the hospital with bruised and broken limbs. I must confess that had it been possible on that and the following few days to have changed places with the only brother I had left comfortably quartered under the paternal roof, these pages would never have been penned in New Zealand, and he, poor fellow, would have escaped the tragical death he met with in the trenches at Sebastopol during the Crimean war, where he fell mortally wounded at the head of his company, the 11th Artillery. Youth and a healthy constitution soon overcame the effects of the mal de mer. The Heroine was the smartest sailer in the French navy. Our orders were to keep in the wake of an admiral’s ship—“La Gloire”—sent to Rio de Janeiro to arrange matters in connection with the intended marriage of the Prince de Joinville with the sister of Don Pedro, Emperor of Brazil. Whilst tossing in the Bay of Biscay, and in order to keep at a respectful distance astern of the admiral’s ship, our commander—a knowing old salt, well versed in seamanship —well aware that the best qualities of his frigate were under easy sail, crammed on as much canvas as she could stagger under. This manœuvre brought out a signal from La Gloire to reduce sail and “rendezvous” at the entrance of Rio harbour. This, happening at sunset, was at once acted upon. During the night, under reduced sail, we forged ahead, so that when daylight came the admiral’s ship was almost hull-down astern of the Heroine. A quarter-master came to the skipper saying that the Gloire had hoisted our number, and was signalling fresh orders. “Who told you to look astern, sir?” said the captain. “You deserve to lose a week’s grog for being so
  • 48.
    officious. Go onthe fore-castle and see if there are any breakers ahead; leave it to me to watch the admiral’s signals!” The fact is the old boy wanted to call at the Azores to take in a supply of wine for his and the gun-room table; he knew well that as soon as the heavy pressure of canvas was taken off, the gallant ship would displace less water under her bows, and could give the flag-ship one mile in three. Thanks to this dodge, we spent a few days at Madeira and Teneriffe, where I received my first idea of semi-tropical climate, vegetation, and manners. By this time, though not much of a sailor, I had got over the nauseous feeling, and got somewhat used to the “hard tack” called food, served twice a day to the midshipmens’ mess, where I was quartered. Two meals of half a kilogramme of biscuit, as hard as cast-iron and quite as dark in colour; half a pint of haricots or broad beans alternately, which, I should think, were bought at the sale of surplus stores of Noah’s ark after she stranded on Mount Ararat; salt beef or pork, quite as ancient; and oh! such water!—the stench of it made the washing of one’s hands in it a punishment. Yet we had to drink it, together with the Vin de campagne—a bluish mixture which would have been most acceptable to Messrs Day and Martin for the dilution of their celebrated blacking, but certainly rejected with contempt by Cross and Blackwell for pickling purposes. What a treat it was to land at Funchal and Teneriffe! Shall I ever forget the delicious treat to rush into a cook-shop and “tuck in” a regular “burster” of white bread, fresh meat, and fruit. Of the latter I made, of course, an ample provision—returning on board with baskets of oranges, bananas, &c. Alas! I had to learn that in a man- of-war, in the year A.D. 1839, a passenger was a kind of incubus— looked upon as a nuisance—an object everlastingly in everybody’s way—without a cabin, a locker, a place to resort to, barring the hammock devoted to his use from 8 p.m. till 6 a.m. next day. The
  • 49.
    consequence was thatall my stores of “goodies” were summarily seized by, and devoured in, the midshipmens’ mess, who, less favoured, had not been allowed even a scamper on shore. Prior to embarkation my father’s last words were—“A few months on board one of His Majesty’s ships will give you an idea of the world.” Most truly had he spoken. Barely one month from the parental roof, I had already acquired some experience. I already found out that a sea life was not couleur de rose, as I had painted it in imagination. The petty tyranny of my messmates soon knocked out of me all boyish, nursery, and even college notions of self- importance. The Peak of Teneriffe was soon lost in the far horizon; the gallant ship, once more under canvas, sped her course through lovely weather, shaping a direct course for the South American coast. Gradually getting accustomed to what at first seemed a hard life, making good friends in the gun-room—more especially with our portly head surgeon and the purser, to whose kindness I was indebted for leave to use the surgery and the clerk’s room, as well as the free run of the ship’s library—time hung less wearily. Besides, we were nearing the Brazilian shores. The land breeze every evening wafted to sea the balmy-scented air of orange groves; all eyes strained throughout the day to follow the varied indentations of distant ranges. We passed daily a number of quaintly rigged vessels and coast boats. At last we reached our rendezvous with the Gloire, and paid the penalty of our treachery. She was not there, and for five dreary long days we had to tack off and on in view of one of the most lovely harbours in the world, scanning the blue line of the sky for the pennant of the old admiral. He came at last—his pride in finding the Heroine newly painted, scrubbed, and in every plank, spar, or rigging —a perfect picture of neat, trim beauty—made him overlook the otherwise unpardonable sin of having out-sailed his old boat.
  • 50.
    Welcome to ourwebsite – the ideal destination for book lovers and knowledge seekers. With a mission to inspire endlessly, we offer a vast collection of books, ranging from classic literary works to specialized publications, self-development books, and children's literature. Each book is a new journey of discovery, expanding knowledge and enriching the soul of the reade Our website is not just a platform for buying books, but a bridge connecting readers to the timeless values of culture and wisdom. With an elegant, user-friendly interface and an intelligent search system, we are committed to providing a quick and convenient shopping experience. Additionally, our special promotions and home delivery services ensure that you save time and fully enjoy the joy of reading. Let us accompany you on the journey of exploring knowledge and personal growth! ebookluna.com