1966952
1966952
https://ebooknice.com/product/biota-grow-2c-gather-2c-cook-6661374
ebooknice.com
https://ebooknice.com/product/information-security-management-
handbook-4982032
ebooknice.com
https://ebooknice.com/product/information-security-management-
handbook-4982144
ebooknice.com
https://ebooknice.com/product/information-security-management-
handbook-978506
ebooknice.com
(Ebook) Information security management handbook by Harold F. Tipton,
Micki Krause (editors) ISBN 9780203005552, 9780849332104, 0203005554,
0849332109
https://ebooknice.com/product/information-security-management-
handbook-2138408
ebooknice.com
https://ebooknice.com/product/information-security-management-
handbook-1389978
ebooknice.com
https://ebooknice.com/product/information-security-management-
handbook-1840356
ebooknice.com
https://ebooknice.com/product/information-security-management-
handbook-1389698
ebooknice.com
https://ebooknice.com/product/information-security-management-
handbook-sixth-edition-4982300
ebooknice.com
AU7495—Prelims—6/2/2007—18:01—VELU—14657—XML MODEL CRC12a – pp. 1–46.
AU7495—Prelims—6/2/2007—18:01—VELU—14657—XML MODEL CRC12a – pp. 1–46.
AU7495—Prelims—6/2/2007—18:01—VELU—14657—XML MODEL CRC12a – pp. 1–46.
AU7495—Prelims—6/2/2007—18:01—VELU—14657—XML MODEL CRC12a – pp. 1–46.
Table of Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiii
Editors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv
Contributors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvii
3 Corporate Governance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
David C. Krehnke
vi
vii
41 Policy Development
Chris Hare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
viii
ix
3 CRYPTOGRAPHY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1019
xi
xii
104 Physical Security: The Threat after September 11, 2001 . . . . . . . . . . . . . . . . . . . . . . . 1373
Jaymes Williams
xiii
xiv
xv
xvi
158 Cookies and Web Bugs: What They Are and How They Work
Together . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2133
William T. Harding, Anita J. Reed, and Robert L. Gray
xvii
xviii
xix
xx
xxi
xxii
As this book goes to galley, a federal jury has found former Enron Corporation executives Kenneth L.
Lay and Jeffrey K. Skilling guilty of conspiracy and fraud in connection with the 2001 collapse of the
onetime energy trading giant.
However, long before the guilty verdicts against Lay and Skilling, the “Enron Effect” was already
impacting the behavior of some corporations.
Houston oil service company Dresser-Rand Group Inc., responded to the public outrage that followed
Enron Corp.’s 2001 collapse, referencing its more stringent ethics policy, announced its dogma of
corporate good behavior on the company’s Website. Engineering giant Fluor Corp.’s new code of conduct
has a one word description under the Exceptions section: “None.”
Moreover, new laws and regulations have forced companies to develop stronger ethics policies. More
so than ever before, shareholders are holding publicly traded companies more accountable for their
practices.
What does this have to do with Information Security? In a word, everything.
An organization’s information security program is a direct result of its management ethics and values.
Principles such as “we comply with applicable laws and regulations” and “we protect our customers’
privacy” lead directly to the technical, physical, and administrative controls that should be implemented.
US federal and state legislators continue to make certain that information security is a board-level
conversation vis-à-vis the enactment of regulations such as Sarbanes-Oxley, Gramm-Leach-Bliley, the
Payment Card Industry Standard (PCI), the Health Insurance Portability and Accountability Act
(HIPAA) and the Federal Information Security Management Act (FISMA).
Current EU privacy legislation and evolving US privacy laws, such as California’s Senate Bill 1386,
demonstrate the concerns that consumers continue to verbalize relative to the privacy of their personal
information. These laws ensure that the topic of information security remains on the board of directors’
agenda.
Is this good news for those that are tasked with securing information assets? Or are these new rules
contending for valuable resources that would otherwise be deployed for other priorities?
At some point in time, security and compliance efforts should converge. One way or the other, private
or public organizations must deal with protecting the sensitive information for which they are entrusted.
So where do we turn for practical, viable solutions? Clearly, there are more options available than at
any other time: trade magazines, internet websites, technical compositions, practitioner classes,
certificate courses, industry associations and this handbook. All sources are worth a look-see.
Many of these sources are worth placing in a spot that is easily accessible, at arm’s reach, so they can be
pulled off the shelf when a question must be answered or a solution sought.
I submit that this handbook is one of those references that should be “close at hand.”
The handbook is a compilation of treatises which address risk assessments, metrics, security
governance, emerging threats, standards, physical security and business continuity, and a plethora of
technology issues including application controls, network security, virus controls and hacking.
xxiii
Best of luck,
Hal Tipton and Micki Krause
xxiv
Harold F. Tipton, CISSP, currently an independent consultant and past president of the International
Information System Security Certification Consortium (ISC)2, was Director of Computer Security for
Rockwell International Corporation for 15 years. He initiated the Rockwell computer and data security
program in 1977, and he continued to administer, develop, enhance, and expand the program to
accommodate the control needs produced by technological advances until his retirement from Rockwell
in 1994. He became a member of the Information Systems Security Association (ISSA) in 1982, and he
served as president of the Los Angeles Chapter in 1984. From 1987 to 1989, he served as president of the
national organization of ISSA. He was added to the ISSA Hall of Fame and the ISSA Honor Role in 2000.
He received the Computer Security Institute “Lifetime Achievement Award” in 1994 and the (ISC)2 “Hal
Tipton Award” in 2001.
He was a member of the National Institute for Standards and Technology (NIST) Computer and
Telecommunications Security Council and the National Research Council Secure Systems Study
Committee (for the National Academy of Science). He has a B.S. in engineering from the U.S. Naval
Academy, an M.P.A. from George Washington University, and a certificate in computer science from the
University of California, Irvine. He has published several papers on information security issues in the
Information Security Management Handbook, Data Security Management, Information Systems Security,
and the National Academy of Sciences report Computers at Risk.
He has been a speaker at all of the major information security conferences, including the Computer
Security Institute, ISSA Annual Working Conference, Computer Security Workshop, MIS Conferences,
AIS Security for Space Operations, DOE Computer Security Conference, National Computer Security
Conference, IIA Security Conference, EDPAA, UCCEL Security and Audit Users Conference, and
Industrial Security Awareness Conference. He has conducted and participated in information security
seminars for (ISC)2, Frost and Sullivan, UCI, CSULB, System Exchange Seminars, and the Institute for
International Research.
Micki Krause, CISSP, has held positions in the information security profession for the past 20 years. She
currently serves as the Chief Information Security Officer at Pacific Life Insurance Company in Newport
Beach, California, where she is accountable for directing its information protection and security program
enterprise-wide. She has held several leadership roles in industry-influential groups, including the
Information Systems Security Association (ISSA) and the International Information System Security
Certification Consortium. She is a long-term advocate for professional security education and
certification. In 2003, she received industry recognition as a recipient of the “Women of Vision”
award given by Information Security magazine. In 2002, she was honored as the second recipient of the
Harold F. Tipton Award in recognition of sustained career excellence and outstanding contributions to
the profession. She is a reputed speaker, published author, and co-editor of the Information Security
Management Handbook series.
xxv
Thomas Akin, CISSP, has worked in information security for almost a decade. He is the founding
director of the Southeast Cybercrime Institute where he also serves as chairman for the Institute’s Board
of Advisors. He is an active member of the Georgia Cybercrime Task Force where he heads up the task
force’s education committee. He also works with Atlanta’s ISSA, InfraGard, and HTCIA professional
organizations. He has published several articles on information security, and he is the author of
Hardening Cisco Routers. He developed Kennesaw State University’s highly successful UNIX and Cisco
training programs and, in addition to his security certifications, is also certified in Solaris, Linux, and
AIX; is a Cisco Certified Academic Instructor (CCAI); and is a Certified Network Expert (CNX).
Mandy Andress, CISSP, SSCP, CPA, CISA, is founder and president of ArcSec Technologies, a security
consulting firm specializing in product/technology analysis. Before starting ArcSec Technologies, she
worked for Exxon, USA, and several Big 5 accounting firms, including Deloitte & Touche and Ernst &
Young. After leaving the Big 5, she became the director of security for Privada, Inc., a privacy start-up in
San Jose. At Privada, she helped develop security policies, secure network design, develop Firewall/VPN
solutions, increase physical security, secure product design, and periodic network vulnerability testing.
She has written numerous security product and technology reviews for various computer trade
publications. A member of the Network World Global Test Alliance, she is also a frequent presenter at
conferences, including NetworldCInterop, Black Hat, and TISC. She is the author of Surviving Security,
2nd Edition (Auerbach Publications, 2003).
Jim Appleyard is a senior security consultant with the IBM Security and Privacy Services consulting
practice. With 33 years of technical and management experience in information technology, he
specializes in enterprise-wide information security policies and security architecture design. He has
specific expertise in developing information security policies, procedures, and standards; conducting
business impact analysis; performing enterprise-wide security assessments; and designing data classi-
fication and security awareness programs.
Ioana V. Bazavan, CISSP, is a manager with Accenture’s global security consulting practice. She has
written security policies, standards, and processes for clients in a range of industries, including financial
services, high-tech, resources, and government.
Chuck Bianco, FTTR, CISA, CISSP, is an IT examination manager for the Office of Thrift Supervision in
Dallas, Texas. He has represented his agency on the IT subcommittee of the FFIEC. He has experienced
more than 600 IT examinations, participated in six IT symposia, written OTS’ original Disaster Recovery
Bulletin, and led the Interagency Symposium, resulting in SP-5. He was awarded the FFIEC Outstanding
Examiner Award for significant contributions, and he received two Department of the Treasury Awards
for Outstanding Performance.
xxvii
Steven F. Blanding, CIA, CISA, CSP, CFE, CQA, was, when his contributions were written, the regional
director of technology for Arthur Andersen based in Houston, Texas. He has 25 years of experience in the
areas of financial auditing, systems auditing, quality assurance, information security, and business
resumption planning for large corporations in the consulting services, financial services, manufacturing,
retail electronics, and defense contract industries.
David Bonewell, CISSP, CISSP/EP, is the president of Accomac Consulting LLC, Cincinnati, Ohio. He
was a chief security architect with Teradata, Cincinnati, Ohio.
Dan M. Bowers, CISSP, is a consulting engineer, author, and inventor in the field of security engineering.
Gerald Bowman is currently the North American director of ACE and advanced technologies for
SYSTIMAXw Solutions for the design of the professional community and advanced technology in the
corporate enterprise. He joined the SYSTIMAX team from Superior Systems Technologies where he
was COO. Prior to that appointment, he was vice president of engineering for Riser Management
Systems, a telecommunications design, engineering, management, and consulting firm responsible for
consulting engineering projects for 78 of the tallest buildings in the United States, including 12
Carrier Hotels, numerous data centers for ISPs, high-end telecom real estate, and other corporate
enterprises.
Robert Braun, a partner in the Corporate Department of Jeffer, Mangles, Butler, & Marmaro LLP,
specializes in corporate, finance, and securities law with an emphasis on technology-oriented firms. His
practice includes the establishment and development of strategies to implement computer software,
computer hardware, communications, and e-commerce solutions as well as public and private securities
offerings; mergers and acquisitions; venture capital financing; and joint ventures. He counsels a variety of
firms on software development and licensing; formation, maintenance, and linking of websites;
electronic commerce transactions and related matters; and acquisitions, divestitures, and corporate
and strategic functions. He is a member of the American, California, and Los Angeles County Bar
Associations and is an active participant in a variety of business and technology committees and task
forces.
Thomas J. Bray, CISSP, is a principal security consultant with SecureImpact. He has more than 13 years
of information security experience in banking, information technology, and consulting. SecureImpact is
a company dedicated to providing premier security consulting expertise and advice. SecureImpact has
created its information and network service offerings to address the growing proliferation of security
risks experienced by small to mid-sized companies.
Al Bredenberg is a writer, web developer, and Internet marketing consultant. He is author of The Small
Business Guide to Internet Marketing and the editor of The NET Results News Service, both of which are
electronic publications available over the Internet.
xxviii
Alan Brusewitz, CISSP, CBCP, has more than 30 years of experience in computing in various capacities,
including system development, EDP auditing, computer operations, and information security. He has
continued his professional career leading consulting teams in cyber security services with an emphasis on
e-commerce security. He also participates in business continuity planning projects, and he is charged
with developing that practice with his current company for delivery to commercial organizations.
Graham Bucholz is a computer security research analyst for the United States government in Baltimore,
Maryland.
Carl Burney, CISSP, is a senior Internet security analyst with IBM in Salt Lake City, Utah.
Ken Buszta, CISSP, is the chief information security officer for the City of Cincinnati, Ohio, and he has
more than ten years of IT experience and six years of InfoSec experience. He served in the U.S. Navy’s
intelligence community before entering the consulting field in 1994.
Mark Carey is the CEO of DelCreo Inc., an enterprise risk management company. He directs DelCreo
operations and consulting services, including enterprise-wide risk management, business continuity and
disaster recovery planning, incident management, information security, and e-business risk management
programs in the technology industry. Prior to starting DelCreo, he managed Ernst & Young’s western U.S.
region of the business risk solutions practice. He coordinated the relationship and managed delivery of all
risk management related services, including program management, business continuity planning,
enterprise risk assessments, information security, incident management, and privacy advisory services.
Glenn Cater, CISSP, has more than 11 combined years experience in information security, IT
management, and application development. He currently holds the position of director of IT risk
consulting at Aon Consulting, Inc. In this role, he supports Aon’s electronic discovery services, high-tech
investigations, and IT security consulting practices. He joined Aon from Lucent Technologies where he
held the position of technical manager within the IT security organization. At Lucent, he supervised the
Computer Security Incident Response Team, supporting the intrusion prevention and security event
management systems. He also worked as managing principal of the reliability and security consulting
practice at Lucent Worldwide Services, leading and supporting security consulting engagements for LWS
clients. Before that, he worked as a senior network security manager at Lucent Technologies where he
managed a development team and supported internal security solutions. Prior to joining Lucent, he
began his career as a software engineer at British Aerospace working on military systems.
Tara Chand, Esq., CISSP, is the founder of Internet Promise Group LLC.
Samuel W. Chun, CISSP, is the director of information and risk assurance services with TechTeam Global
Government Solutions Inc. He has over fifteen years of experience in technical architecture and network
engineering with an emphasis on secure network environments. He is currently leading his company’s
technical compliance effort to the Sarbanes-Oxley Act of 2002.
Anton Chuvakin, PhD, GCIA, GCIH, GCFA, is a recognized security expert and book author. In his
current role as a director of product management with LogLogic, he is involved with defining and
executing on a product vision and strategy, driving the product roadmap, conducting research, and
xxix
Ian Clark is the security portfolio manager for Nokia’s business infrastructure where he has been working
on global security projects for the past five years. Prior to Nokia, he worked for EDS and spent 11 years in
the British army specializing in secure communications. He is a member of the BCS.
Douglas G. Conorich is the global solutions manager for IBM Global Service’s Managed Security
Services with over 30 years of experience with computer security through his holding a variety of
technical and management positions. He is responsible for developing new security offerings, ensuring
that the current offerings are standardized globally, and overseeing the training of new members of the
MSS team worldwide. He teaches people how to use the latest vulnerability testing tools to monitor
Internet and intranet connections and how to develop vulnerably assessments by suggesting security-
related improvements. He is also actively engaged in the research of bugs and vulnerabilities in computer
operating systems and Internet protocols, and he is involved in the development of customized alerts,
notifying clients of new potential risks to security. He has presented papers at over 400 conferences,
published numerous computer security-related articles on information security in various magazines and
periodicals, and held associate professor positions at several colleges and universities.
Michael J. Corby, CCP, CISSP, the senior director of Risk Management at Gartner Consulting, has over
35 years of experience in IT strategy, operations, development, and security. He has successfully managed
large projects and developed flexible IT infrastructures and sound security organizations for hundreds of
the world’s most successful organizations. He is also the founder of (ISC) 2 Inc., the organization that
established the CISSP credential. In 1992, he was named the first recipient of the Computer Security
Institute’s Lifetime Achievement Award. A frequent global speaker and author, he formerly held executive
positions with several global consulting organizations, including Netigy Corporation and QinetiQ prior
to joining Gartner Group Consulting through the acquisition of Meta Group, and he was formerly CIO
for a division of Ashland Oil and for Bain & Company. A business owner for over 15 years (M Corby &
Associates, Inc.) and a community supporter, he has established a reputation for creativity and excellence
in technology and its application to business needs. He is based in the Lowell, Massachusetts office.
Mignona Cote, CISA, CISM, has over 15 years of management-level experience securing and improving
technical operations for companies like PepsiCo, Nortel Networks, and Verizon. She recently joined a
large financial institution to leverage her expertise in the security and auditing field into the financial
control environment. Her experience spans across multiple technologies and disciplines, ranging from
running incident response teams, vulnerability management initiatives to leading hardening programs to
secure networks and large scale application environments. She maintains hands-on experience with the
growing malware concerns while ensuring proactive and detective controls such as IPS/IDS solutions are
protecting enterprises. She is a member of the North Dallas chapter of the Institute of Internal Auditors
and a member of ISACA.
Chris R. Cunningham, CISSP, is an Internet security engineer at Wilmington Trust Corporation. His
responsibilities include the security architecture and management of policies and technologies that
xxx
Jeffrey Davis, CISSP, has been working in information security for over ten years. He is currently a senior
manager at Lucent Technologies, and he is involved with intrusion detection, anti-virus, and threat
assessment.
Matthew J. Decker, CISSP, CISA, CISM, CBCP, is a principal with Agile Risk Management, specializing
in information security consulting and computer forensics services. During his career, he has been a
senior manager with a Big 4 accounting firm, provided security consulting services for Lucent
Technologies and International Network Services, devoted engineering and security consulting
support to the United States Special Operations Command (USSOCOM) with Booz Allen Hamilton,
and served nine years with the National Security Agency (NSA). He is a member of the ISSA, ISACA, and
DRII, and he served as president to the Tampa Bay Chapter of ISSA from 1999 to 2003.
Gildas Deograt-Lumy, CISSP, is a CISSP CBK seminar instructor. He has been working in the IT field for
more than eleven years with a focus over the past six years on information security. His experience
includes development and implementation of physical access control, security policy, architecture, and
awareness programs. Presently, he is an information system security officer for Total E&P Head Quarter,
implementing policy, conducting audits, and responsible for various projects such as implementing
network-based IDS/IPS across worldwide corporate networks and creating enclave systems to deal with
high-grade attacks. Before working in France, he was the chief information security officer at TotalFinaElf
E&P Indonesia, a board member of the Information System Security Association Indonesia, and a board
member of Kampus Diakoneia Modern, a non-government organization in Indonesia that serves
homeless people and street children.
John Dorf, ARM, is a senior manager in the Actuarial Services Group of Ernst & Young. Specializing in
insurance underwriting and risk management consulting, he earned his 19 years of experience as a risk
manager at several Fortune 500 financial service and manufacturing firms. Before joining Ernst & Young,
he was a senior risk manager at General Electric Capital Corporation. He has also held risk management
positions at Witco Corporation, National Westminster Bank, and the American Bureau of Shipping.
Prior to becoming a risk manager, he spent seven years as an underwriting manager and senior marine
insurance underwriter at AIG and Atlantic Mutual.
Ken Doughty, has over 25 years experience in IS auditing and business continuity both in the public and
private sectors. He holds an Accounting Degree and a Graduate Diploma in Internal Auditing from the
University of Technology, Sydney (UTS). In September 2000, he had his first book published, “Business
Continuity: Protecting Your Organization’s Life” (Auerbach Publications, 2000). In 2002 he received the
ISACA’s Best Speaker & Conference Contributor Award. A former TAB Limited (NSW) CIO and lecturer
at UTS, Ken was one of the standout presenters at both the 2003 and 2004 itSMFA National Conferences.
Mark Edmead, CISSP, SSCP, TICSA, is president of MTE Software, Inc., and he has more than 25 years of
experience in software development, product development, and network/information systems security.
Fortune 500 companies have often turned to him to help them with projects related to Internet and
computer security. He previously worked for KPMG Information Risk Management Group and IBM’s
Privacy and Security Group where he performed network security assessments, security system reviews,
development of security recommendations, and ethical hacking. Other projects include helping
companies develop secure and reliable network system architecture for their Web-enabled businesses.
He was managing editor of the SANS Digest and contributing editor to the SANS Step-by-Step Windows
NT Security Guide. He is co-author of Windows NT: Performance, Monitoring and Tuning, and he
developed the SANS Business Continuity/Disaster Recovery Plan Step-by-Step Guide.
xxxi
Jeffrey H. Fenton, CBCP, CISSP, is the corporate IT crisis assurance/mitigation manager and technical
lead for IT risk management and a senior staff computer system security analyst in the corporate
information security office at Lockheed Martin Corporation. He joined Lockheed Missiles and Space
Company in Sunnyvale, California, as a system engineer in 1982, and he transferred into its
telecommunications group in 1985. Fenton completed a succession of increasingly complex assignments,
including project manager for the construction and activation of an earthquake resistant network center
on the Sunnyvale campus in 1992 and group leader for network design and operations from 1993
through 1996.
Bryan D. Fish, CISSP, is a security consultant for Lucent Technologies in Dallas, Texas. He holds a BS in
computer engineering and an MCS with a focus on internetworking and computer system security, both
of which are from Texas A&M University. His professional interests include security programs and
policies and applications of cryptography in network security.
Patricia A.P. Fisher, is president of Janus Associates, a company that specializes in computer security.
Todd Fitzgerald, CISSP, CISA, CISM, is the director of systems security and systems security officer for
United Government Services LLC. He has over 25 years of broad-based information technology
experience, holding senior IT management positions with Fortune 500 and Global Fortune 250
companies. He is a member of the Board of Directors and Security Taskforce co-chair for the HIPAA
Collaborative of Wisconsin (HIPAA COW), a participant in the CMS/Gartner Security Best Practices
Group, Blue Cross Blue Shield Association Information Security Advisory Group; he is a previous board
member for several Information Systems Security Associations (ISSA), and he is a frequent speaker and
writer on security issues. He largely focuses on issues related to security management, risk assessments,
policy development, organizing security, security assessments, regulatory compliance (HIPAA, CAST,
NIST, ISO 17799), security awareness, and developing security programs.
Stephen D. Fried, CISSP, is the vice president for information security and privacy at Metavante
Corporation. He is a seasoned information security professional with over 20 years experience in
information technology. For the past ten years, he has concentrated his efforts on providing effective
information security management to large organizations. He has led the creation of security programs for
two Fortune 500 companies, and he has extensive background in such diverse security issues as risk
assessment and management, security policy development, security architecture, infrastructure and
perimeter security design, outsource relationship security, offshore development, intellectual property
protection, security technology development, business continuity, secure e-business design, and
information technology auditing. A frequent speaker at conferences in the United States as well as
international locations, he is active in many security industry organizations.
Robby Fussell, CISSP, NSA IAM, GSEC, is an information security/assurance manager for a government
contracting company. He is currently performing academic research in the area of preventing cascading
failures in scale-free networks using artificial intelligence techniques.
Karen Gibbs is a senior data warehouse architect with Teradata in Dayton, Ohio.
Bonnie A. Goins, MSIS, CISSP, NSA IAM, ISS, is a senior security strategist at Isthmus Group, Inc. where
she is the co-practice leader for IGI’s Security Practice. She has over 15 years experience in the areas of
information security; secure network design and implementation; risk, business impact, and security
xxxii
Ronald A. Gove, PhD, is Vice President, Science Applications International Corp., Columbia, MD.
Robert L. Gray, PhD, is currently chair of the Quantitative Methods and Computer Information Systems
Department at Western New England College, and he has more than 20 years of academic and
management experience in the IT field.
Geoffrey C. Grabow, CISSP, was Chief Technology Officer of beTRUSTED and Leader - Pricewaterhou-
seCoopers Cryptographic Centre of Excellence.
Frandinata Halim, CISSP, MCSE, is a senior security consultant at ITPro Citra Indonesia PT. He has
ample experience and qualifications in providing clients with managed security services, information
system security consulting, secure network deployment, and other services. In addition, he is competent
and knowledgeable in the use and hardening of the Windows environment, Cisco security devices, the
number of IDSs, firewalls, and others, currently holding certifications from the (ISC)2, Cisco Systems,
and Microsoft.
Sasan Hamidi, PhD, is the chief security officer at Interval International, Inc.
Susan D. Hansche, CISSP-ISSEP, is a senior manager for information system security awareness and
training at PEC Solutions based in Fairfax, Virginia. She has designed numerous training courses on
information technology and information systems security for both private-sector and government
clients. She is co-author of the Official (ISC)2 Guide to the CISSP Exam.
William T. Harding, PhD, is the dean of the College of Business Administration and an associate
professor at Texas A & M University, in Corpus Christi.
Chris Hare, CISSP, CISA, CISM, is employed with a large U.S. financial institution as the information
systems auditor. He has taught information security at Algonquin College (Ottawa, Canada), and he sat
on the advisory council for this program. He frequently speaks on Unix, specialized technology and
applications, security, and audit at conferences.
Gilbert Held is an award-winning author and lecturer. He is the author of over 40 books and 450
technical articles. Some of his recent book titles include Building a Wireless Office and The ABCs of IP
Addressing, published by Auerbach Publications.
Jonathan S. Held, graduated from the University of Pennsylvania with a B.A. in mathematics and
proceeded to serve seven years in the U.S. Navy as a cryptologic officer. Awarded an M.S. in computer
science from the Naval Postgraduate School, he is currently a software design engineer for Microsoft in
Seattle, Washington. He has been involved in the design and testing of a variety of Microsoft product
offerings, including Commerce Server 2002, BizTalk Accelerator for Suppliers, Solution for Internet
Business, and BizTalk Accelerator for Financial Services. He co-authored the books Data Encryption
xxxiii
Foster J. Henderson, CISSP, MCSE, CRP, CNA, is an information assurance analyst for Analytic Services,
Inc. (ANSER). He is currently a member of the Network Operations and Security Branch within the
federal government, covering a wide range of IA matters.
Kevin Henry, CISA, CISSP, is the director of program development for (ISC)2 Institute, and he is a
regular speaker at conferences and training seminars worldwide with frequent requests to provide in-
depth training, foundational and advanced information systems security and audit courses, and detailed
presentations and workshops on key issues surrounding the latest issues in the information systems
security field. He combines over twenty years experience in telecom and consulting engagements
for major government and corporate clients with an interesting and comfortable learning style that
enhances the understanding, relevance, and practical applications of the subject matter. He has also had
several articles published in leading trade journals and in the Handbook of Information Security
Management.
Paul A. Henry, CISSP, is the senior vice president of CyberGuard Corporation. He has more than 20 years
experience with security and safety controls for high-risk environments such as nuclear power plants and
industrial boiler sites. In addition, he has developed and managed security projects for major government
and commercial organizations worldwide. He has written technical papers on port scanning basics, buffer
over-runs, firewall architectures and burner management and process controls for nuclear power plants
as well as white papers on covert channel attacks, distributed denial of service (DDoS) attacks, common
mode noise and common mode rejection, PLC programming, and buffer over-runs. He also frequently
serves as a featured and keynote speaker at network security seminars and conferences worldwide,
presenting white papers on diverse topics, including DDoS attack risk mitigation, firewall architectures,
intrusion methodology, enterprise security, and managed security services. In addition to his CISSP
certification, he holds many other security certifications such as MCPCI, MCSE, CCSA, CCSE, CFSA,
CFSO, CISM, and CISA.
Rebecca Herold, CISM, CISA, CISSP, FLMI, is an information privacy, security, and compliance
consultant, author, and instructor. She has over 15 years of information privacy, security, and regulatory
compliance experience, and she assists organizations of all sizes with their information privacy, security,
and regulatory compliance programs. Prior to owning her own business, she was the vice president of
privacy services and chief procurement officer at DelCreo for two years. She was also the senior systems
security consultant at Principal Financial Group where she was instrumental in building an information
security and privacy program that was awarded the 1998 CSI Information Security Program of the Year.
She is the author of The Privacy Papers (Auerbach, 2001) and Managing an Information Security and
Privacy Training and Awareness Program (Auerbach, 2005), and she is coauthor of The Practical Guide to
HIPAA Privacy and Security Compliance (Auerbach, 2003) and The Business Executive Practical Guides to
Compliance and Security Risks book series in 2004.
Debra S. Herrmann is the technical advisor for information security and software safety in the FAA
Office of the Chief Scientist. In this capacity, she is leading four major collaborative research
initiatives: security metrics, adaptive quarantine, FAA protection profile library, and integration of
common criteria and security certification and accreditation (C&A) evaluations. Previously, she was
the manager of security engineering for the $1.7B FAA Telecommunications Infrastructure (FTI)
program, one of the first programs to apply the common criteria to a nation-wide safety-critical
WAN. Prior to that position, she worked for a number of years in the defense/intelligence
community. She has published several papers and three books, including Using the Common Criteria
for IT Security Evaluation (Auerbach, 2003); A Practical Guide to Security Engineering and Information
xxxiv
Steven Hofmeyr, PhD, is chief scientist and founder of Sana Security, Inc. Hofmeyr has authored and
coauthored many articles published in conference proceedings and peer- reviewed journals on
computer security, immunology, and adaptive computation. He has served on the program
committee for the ACM’s New Security Paradigms Workshop, and he is currently on the program
committee for the Artificial Immune Systems workshop at the IEEE World Congress on Compu-
tational Intelligence.
Joseph T. Hootman is the president of Computer Security Systems, Inc., a computer and information
security consulting and product sales firm based in Northern California.
Daniel D. Houser, CISSP, MBA, e-BizC, is a senior security engineer with Nationwide Mutual Insurance
Company.
Joost Houwen, CISSP, CISA, is the security manager for Network Computing Services at BCHydro. He
has a diverse range of IT and information security experience.
Patrick D. Howard, CISSP is a senior information security consultant for the Titan Corporation, and he
has over 31 years experience in security management and law enforcement. He has been performing
security certification and accreditation tasks for over 14 years as both a security manager and a consultant
from both government and commercial industry perspectives. He has experience with implementing
security C&A with numerous federal departments and agencies, and he has been charged with developing
C&A and risk management guidance for a wide variety of organizations. He has extensive practical
experience in implementing programs and processes based on NIST guidance, OMB Circular A-130,
Appendix III, and BS 7799/ISO 17799. He has direct working experience in security plan development for
complex systems, sensitivity definition, use of minimum security baselines, risk analysis, vulnerability
assessment, controls validation, risk mitigation, and documenting certification and accreditation
decisions. He has also developed and presented training on all of these processes. He is the author of
Building and Implementing a Security Certification and Accreditation Program (Auerbach Publications,
2005).
Charles R. Hudson, Jr., CISSP, CISM, is an information security manager and assistant vice president at
Wilmington Trust Company. He is a regular speaker at national conferences, speaking at more than
fifteen conferences in the past five years as a subject matter expert. He has been involved in writing
magazine articles for Computer World, Security Watch, and Information Security.
Lee Imrey, CISSP, CISA, CPP, is an information security specialist with the U.S. Department of Justice
where he writes policies to secure critical and classified information, and he works with various
government organizations to implement practices and technological procedures consistent with those
policies. Previously, he was a senior communications manager with (ISC)2 and a lead instructor for the
CISSP CBK Review Seminar. He has worked for telecommunications, retail, and consulting organi-
zations, and he continues to contribute to the profession in several volunteer capacities, including as
xxxv
Carl B. Jackson, CISSP, CBCP, is the business continuity program director with Pacific Life Insurance.
He has more than 25 years experience in the areas of continuity planning, information security, and
information technology internal control and quality assurance reviews and audits. Prior to joining Pacific
Life, he worked with several information security consulting companies and as a partner with Ernst &
Young where he was the firm’s BCP line leader. He has extensive consulting experience with numerous
major organizations in multiple industries, including manufacturing, financial services, transportation,
healthcare, technology, pharmaceutical, retail, aerospace, insurance, and professional sports manage-
ment. He also has extensive industry business information security experience as an information security
practitioner and manager in the field of information security and business continuity planning. He has
written extensively, and he is a frequent public speaker on all aspects of information security and business
continuity planning.
Georges J. Jahchan, CISA, CISM, BS7799 Lead Auditor, has been in various personal computer-related
positions for over twenty five years, six of which were addressing gateway security and three as a security
officer in a university. He currently works as a senior security consultant in Levant with Computer
Associates.
Martin Johnson is senior manager of information systems assurance and advisory services with Ernst &
Young LLP.
Andy Jones, PhD, MBE, is a research group leader, Security Research Centre, BT Group Chief Technology
Office. An experienced military intelligence analyst and information technology security specialist, he
moved into research in information warfare and information security after completing 25 years service
with the British Army’s Intelligence Corps. He has experience as a project manager within the U.K.
Defense Evaluation and Research Agency (DERA) for security aspects of digitization of the battlefield
initiative, and he has gained considerable expertise on the criminal and terrorist aspects of information
security.
Ray Kaplan, CISSP, CISA, CISM, Qualified BS7799 Auditor Credentials, and CHSP (Certified HIPAA
Security Professional), is an information security consultant with Ray Kaplan and Associates in
Minneapolis, Minnesota. He has been a consultant and a frequent writer and speaker in information
security for over two decades.
Kenneth J. Knapp, PhD, is an assistant professor of management at the U.S. Air Force Academy,
Colorado. In 2005, he earned his doctorate in Management Information Systems at Auburn University,
Alabama. He has over 15 years of information technology and security experience in the Air Force. His
publications include Communications of the Association for Information Systems, Information Systems
Management, Information Systems Security, and Information Management & Computer Security.
Walter S. Kobus, Jr., CISSP, is the vice president of security consulting services with Total Enterprise
Security Solutions LLC. He has over 35 years experience in information systems with 15 years experience
in security, and he is a subject matter expert in several areas of information security, including
application security, security management practice, certification and accreditation, secure infrastructure,
and risk and compliance assessments. As a consultant, he has an extensive background in implementing
information security programs in large environments. He has been credited with the development of
several commercial software programs in accounting, military deployment, budgeting, marketing, and
several IT methodologies currently in practice in security and application development.
xxxvi
Joe Kovara is CTO and the principal consultant of Certified Security Solutions Inc. He has more than 25
years in the security and IT industries with extensive experience in all aspects of information security and
operating systems and networks as well as in the development and practical application of new
technologies to a wide variety of applications and markets. He holds patents on self-configuring
computer systems and networks. Prior to joining CSS in 2001, he was CTO of CyberSafe Corporation.
He was a key contributor to CyberSafe’s growth and in bringing several enterprise-security products to
market and deploying them in mission-critical Fortune 100 environments. Prior to CyberSafe, he was a
principal with the security-consulting firm of Kaplan, Kovara, & Associates.
David C. Krehnke, CISSP, CISM, IAM, is a principal information security analyst for Northrop
Grumman Information Technology in Raleigh, North Carolina. He has more than 30 years experience
in assessment and implementation of information security technology, policy, practices, procedures, and
protection mechanisms in support of organizational objectives for various federal agencies and
government contractors. He has also served the (ISC)2 organization as a board member, vice president,
president, and program director responsible for test development.
Mollie E. Krehnke, CISSP, CHS-II, IAM, is a senior information security consultant for Insight Global,
Inc. in Raleigh, North Carolina. She and her husband, David Krehnke, are members of the inventor team
for the Workstation Lock and Alarm System (U.S. Patent Number 6, 014, 746). She has served as an
information security consultant for more than 15 years.
Kelly J. “KJ” Kuchta, CPP, CFE, is the president of Forensics Consulting Solutions in Phoenix, Arizona.
He is formerly an area leader for Meta Security Group and Ernst & Young’s Computer Forensics Services
Group in Phoenix, Arizona. He is an active member of the High Technology Crime Investigation
Association (HTCIA), Association of Certified Fraud Examiners (ACFE), the International Association
of Financial Crime Investigators (IAFCI), and the American Society of Industrial Security (ASIS). He
currently serves on the board of the ASIS Information Technology Security Council.
Paul Lambert is responsible for the development and implementation of Certicom’s product
strategy to meet and exceed current market demands, trends, and forecasts for cryptographic
security technologies. He is currently a government appointee to a technical advisory committee for
federal information processing and an active contributor to technical standards for such security
technologies as digital signatures and network, e-mail, and LAN security. He was previously at
Motorola where he served as a top security architect, designing the security architecture for a family
of products to protect Internet communications. Prior to Motorola, he was director of security
products at Oracle where he was responsible for the development and product management of core
security technologies for all Oracle products. He has published numerous papers on key manage-
ment and communication security, and he is the founder and co-chair of the IP security working
group in the Internet Engineering Task Force.
xxxvii
Ian Lim, CISSP, is a senior consultant in Accenture’s global security consulting practice who has defined
and deployed security architectures for Fortune 100 companies as well as contributed to Accenture’s
global privacy and policy framework.
Bill Lipiczky has practiced in the information technology and security arena for over two decades,
beginning his career as a mainframe operator. As information technology and security evolved, he
evolved as well. His experience includes networking numerous operating systems (*NIX, NetWare, and
Windows) and networking hardware platforms. He is currently a principal in a security consulting and
management firm as well as a lead CISSP instructor for the (ISC)2.
David A. Litzau, CISSP, with a foundation in electronics and audio/visual, moved into the
computer sciences in 1994. He has been teaching information security in San Diego for the past
six years.
Franjo Majstor, CISSP, CCIE, is the EMEA senior technical director at CipherOptics Inc. where he is
responsible for driving to market the latest generation of data protection solutions. Previously, as
technical director EMEA at Fortinet, Inc., he was responsible for security products and solutions based
on the modern perimeter security architecture. He is also an external CISSP instructor at (ISC)2, and he
is a mentor and recognized lecturer of an ICT audit and security postgraduate study, joint program
between ULB, UCL, and Solvay Business School in Brussels, Belgium. As a member of several
professional associations, he is a frequently invited speaker at worldwide technical conferences on
network security topics. His public work references could be found on a private home page at
www.employees.org/wfranjo.
xxxviii
George G. McBride, CISSP, CISM, is a director at Aon Consulting IT Risk Management organization in
Eatontown, New Jersey, and he has worked in the network security industry for more than twelve years.
He has spoken at conferences worldwide on topics such as penetration testing, risk assessments, and open
source security tools. He has consulted numerous Fortune 100 companies on projects, including network
architecture, application vulnerability assessments, and security organization and program development.
He has contributed to The Black Book on Corporate Security, hosted several Webcasts, and contributed to
several previous editions of the Information Security Management Handbook.
R. Scott McCoy, CPP, CISSP, CBCP, is the director of enterprise security for Xcel Energy where he is
responsible for corporate security, IT security, and business continuity. He has 22 years of security
experience, starting in 1984 in the U.S. Army, including four years on active duty as an explosive
ordnance disposal technician, 10 years of security management experience with the last eight years in the
electric and gas utility industry.
Samuel C. McClintock is a principal security consultant with Litton PRC, Raleigh, North Carolina.
Lowell Bruce McCulley, CISSP, has more than 30 years of professional experience in the information
systems industry. His security credentials are complemented by an extensive background in systems
development engineering that is primarily focused on critical systems along with experience in
production operations, training, and support roles.
Lynda L. McGhie, CISSP, CISM, is the information security officer (ISO)/risk manager for Wells Fargo
Bank, Private Client Services (PCS). She has over 25 years of information technology and information
security experience, specializing in risk management and compliance, security engineering and design,
business continuity planning (BCP) and crisis management, network security and identity management.
She is formerly the CISO for Delta Dental and Lockheed Martin Corporation. In her current role, she is
responsible for risk management and security for PCS within the Wells Fargo Corporation, and she has a
dotted line responsibility to the corporate CISO/IT security governance. She regularly publishes articles
on state of the art security topics/issues, and she is also a regular speaker for MISTI, ISSA, ISACA, and
other IT security venues.
Laurie Hill McQuillan, CISSP, has been a technology consultant for 25 years, providing IT support
services to commercial and federal government organizations. She is the vice president of KeyCrest
Enterprises, a national security consulting company. She teaches graduate-level classes on the uses of
technology for research and the impact of technology on culture. She is treasurer of the Northern
Virginia chapter of the Information Systems Security Association (ISSA) and a founding member of
CASPR, an international project that plans to publish Commonly Accepted Security Practices and
Recommendations.
Jeff Misrahi, CISSP, is an information security manager at a large data and news organization in
New York, where, among other tasks, he has responded to a plethora of client questionnaires and audit
xxxix
James S. Mitts, CISSP, is a principal consultant with Vigilant Services Group who has over 18 years of
demonstrated ability in managing, planning, implementing, and controlling complex projects
involving numerous aspects of business continuity, disaster recovery, and information technology
and security.
Ron Moritz, CISSP, is director of the Technology Office at Finjan Software, where he serves as primary
technology visionary. As a key member of the senior management team interfacing between sales,
marketing, product management, and product development, he helps establish and maintain the
company’s technological standards and preserve the company’s leadership role as a developer of advanced
Internet security solutions. He was instrumental in the organization of Finjan’s Java Security Alliance,
and he established and currently chairs Finjan’s Technical Advisory Board. He has served in various
capacities, including president, with both the North Coast chapter of the ISSA and the Northeast Ohio
chapter of ISACA. He has lectured on Web security, mobile code security, computer ethics, intellectual
property rights, and business continuity and resumption planning. Over the past year, his presentations
on mobile code security have been well received at the European Security Forum (London), the FBI’s
InfraGuard Conference (Cleveland), CSI’s NetSec (San Antonio), MISTI’s Web-Sec Europe (London),
and RSA Data Security (San Francisco).
Dorsey Morrow, JD, CISSP, is operations manager and general counsel for the International Information
Systems Security Certification Consortium, Inc. (ISC)2. He has served as general counsel to numerous
information technology companies, and he also served as a judge. He is licensed to practice in Alabama,
Massachusetts, the 11th Federal Circuit, and the U.S. Supreme Court.
William Hugh Murray, CISSP, is an executive consultant for TruSecure Corporation and a senior lecturer
at the Naval Postgraduate School; he has more than fifty years experience in information technology and
more than thirty years in security. During more than twenty-five years with IBM, his management
responsibilities included development of access control programs, advising IBM customers on security,
and the articulation of the IBM security product plan. He is the author of the IBM publication,
Information System Security Controls and Procedures. He has made significant contributions to the
literature and the practice of information security. He is a popular speaker on such topics as
network security architecture, encryption, PKI, and secure electronic commerce. He is a founding
member of the International Committee to establish the Generally Accepted System Security Principles
(GASSP) as called for in the National Research Council’s Report, Computers at Risk. He is a founder and
board member of the Colloquium on Information System Security Education (CISSE). He has been
recognized as a founder of the systems audit field and by Information Security as a Pioneer in Computer
Security. In 1987, he received the Fitzgerald Memorial Award for leadership in data security. In 1989, he
received the Joseph J. Wasserman Award for contributions to security, audit, and control. In 1995, he
received a Lifetime Achievement Award from the Computer Security Institute. In 1999, he was enrolled in
the ISSA Hall of Fame in recognition of his outstanding contribution to the information security
community.
K. Narayanaswamy, PhD, is the chief technology officer and co-founder, Cs3, Inc. He is an accomplished
technologist who has successfully led the company’s research division since inception. He was the
principal investigator of several DARPA and NSF research projects that have resulted in the company’s
initial software product suite, and he leads the company’s current venture into DDoS and Internet
infrastructure technology.
xl
Felicia M. Nicastro, CISSP, CHSP, is a principal consultant with International Network Services (INS).
She has worked with various Fortune 500 companies in over the four years she has been with INS. Her
areas of expertise include security policies and procedures, security assessments and security architecture
planning, design, implementation, and operation. Prior to joining INS, she was a systems administrator
for the Associated Press, and she was responsible for UNIX and security administration.
Keith Pasley, CISSP, is a security professional with over 20 years experience designing and building
security architectures for both commercial and federal government. He has authored papers and taught
security classes, and he is currently working as a regional security practice director.
Christopher A. Pilewski, BS 7799 Lead Auditor, NSA IAM/IEM, CCSA, GIAC, CPA/E, FSWCE, FSLCE,
MCP, is a senior consultant for the international consulting and professional services firm Ajilon. He has
over sixteen years of professional experience in consulting, audit, security, networking technology, and
engineering. This experience spans compliance, audit, security, risk assessment and mitigation, business
process, technical controls, business continuity, technical project leadership, design, and integration of
network and information systems. Before joining Ajilon, he worked for consulting and audit firms as well
as flagship communications companies where he led a wide variety of projects ranging from compliance
efforts (Sarbanes-Oxley, HIPAA, VISA CISP, and others), audits, security assessments, implementation of
security systems, secure network architecture, network management systems, quality control/assurance,
protocol analysis, and technical marketing.
Ralph Spencer Poore, CFE, CISA, CISSP, CHS-III, CTM/CL, is the chief scientist at Innové LLC where he
provides security, privacy, and compliance consulting services, continuing a 30-plus year distinguished
career in information security as an inventor, author, consultant, CISO, CTO, educator, and
entrepreneur.
Mike R. Prevost is the DBsign product manager at Gradkell Systems, Inc., in Huntsville, Alabama.
Sean M. Price, CISSP, is an independent information security consultant located in the Washington,
D.C., area. He provides security consulting and engineering support for commercial and government
entities. His experience includes nine years as an electronics technician in metrology for the U.S. Air
Force. He is continually immersed in research and development activities for secure systems.
Anderson Ramos, CISSP, is an educational coordinator for Modulo Security, a leading information
security and risk management company in Latin America. He is recognized as one of the most important
professionals in Brazil and a key instructor for the country, having been responsible for training
hundreds of security officers. Since 1998, he has been involved with dozens of projects for the public and
private sector. A lead instructor for (ISC)2 since 2001, he has presented official CISSP Review Seminars in
several countries around the world. He served as a director of the Brazilian ISSA Chapter from 2004 to
2006. He possesses more than 20 certifications in the IT and security field, including the CISSP, CISA,
SSCP, CCSI/EC, MCSE and CNE.
Anita J. Reed, CPA, is currently an accounting doctoral student at the University of South Florida,
Tampa, and she has 19 years of public accounting experience.
xli
Steve A. Rodgers, CISSP, the co-founder of Security Professional Services, has been assisting clients in
securing their information assets for more than six years. He specializes in attack and penetration testing,
security policy and standards development, and security architecture design.
Marcus K. Rogers, PhD, CISSP, CCCI, is the chair of the Cyber Forensics Program in the Department of
Computer and Information Technology at Purdue University. He is an associate professor and also a
research faculty member at the Center for Education and Research in Information Assurance and
Security (CERIAS). He was a senior instructor for (ISC)2, the international body that certifies
information system security professionals (CISSP), is a member of the quality assurance board for
(ISC)2’s SCCP designation, and is chair of the Law, Compliance, and Investigation Domain of
International Common Body of Knowledge (CBK) committee. He is a former police detective who
worked in the area of fraud and computer crime investigations. He sits on the editorial board for several
professional journals, and he is a member of various national and international committees focusing on
digital forensic science and digital evidence. He is the author of numerous book chapters and journal
publications in the field of digital forensics and applied psychological analysis. His research interests
include applied cyber forensics, psychological digital crime scene analysis, and cyber terrorism.
Georgina R. Roselli is a member of the faculty at the College of Commerce and Finance at Villanova
University.
Ben Rothke, CISSP, CISM, is the director of Security Technology Implementation for AXA Technology
Services. He has over 15 years of industry experience in the area of information systems security and
privacy, and his areas of expertise are in risk management and mitigation, PKI, security and
privacy regulation, design and implementation of systems security, encryption, and security policy
development. Prior to joining AXA, he was with ThruPoint, Baltimore Technologies, Ernst & Young, and
Citicorp, and he has provided security solutions to many Fortune 500 companies. He is the author of
Computer Security—20 Things Every Employee Should Know (McGraw-Hill 2006), and a contributing
author to Network Security: The Complete Reference (Osborne) and the Information Security Management
Handbook (Auerbach). He writes a monthly security book review for Security Management, and he is a
former columnist for Information Security, Unix Review, and Solutions Integrator magazines. He is a co-
chairman (along with Warren Axelrod of Pershing) of the Information Security Policy Principles
Working Group for the GAISP Project, and he is on the Experts Panel for Information Shield and an
editorial board member for Information Systems Security. He is a member of ISSA, ISACA, ASIS, CSI and
InfraGard.
xlii
Craig A. Schiller, CISSP-ISSMP, ISSAP, is the president of Hawkeye Security Training, LLC. He is the
primary author of the first Generally Accepted System Security Principles (GASSP). He has been a
contributing author to several editions of the Handbook of Information Security Management and a
contributing author to Data Security Management. He co-founded two ISSA U.S. regional chapters: the
Central Plains Chapter and the Texas Gulf Coast Chapter. He is a volunteer with the Police Reserve
Specialists unit of the Hillsboro Police Department in Oregon. He leads the unit’s Police-to-Business
High-Tech speakers’ initiative and assists with Internet forensics.
Thomas J. Schleppenbach is a senior information security advisor and security solutions and product
manager for Inacom Information Systems in Madison, Wisconsin. With more than 16 years of IT
experience, he provides information security and secure infrastructure design, and he acts in a strategic
role helping organizations plan and build information security programs. He also sits on the Western
Wisconsin Chapter of InfraGard planning committee, and he is the co-chair for the Wisconsin Kids
Improving Security (KIS) poster contest, working with schools and school districts to educate kids on
how to stay safe online.
Paul Serritella is a security architect at American International Group. He has worked extensively in the
areas of secure application design, encryption, and network security.
Ken M. Shaurette, CISSP, CISA, CISM, IAM, is an engagement manager in Technology Risk Manager
Services at Jefferson Wells, Inc. in Madison, Wisconsin. With over 25 total years of IT experience, he has
provided information security and audit advice and vision for companies building information security
programs for over 18 of those years. He is a founding member and past president of the Western
Wisconsin Chapter of InfraGard; is past president and current vice president of ISSA-Milwaukee Chapter
(International Systems Security Association); current president and founding member of ISSA-Madison
Chapter. He chairs the Milwaukee Area Technical College’s Security Specialist Curriculum Advisory
Committee, is an active committee member on Herzing College Madison’s Department of Homeland
Security Degree Program, a member of the Wisconsin Association of Computer Crime Investigators
(WACCI), a former chair of the HIPAA-COW (Collaborative of Wisconsin) Security Workgroup, and
past co-chair of the Wisconsin InfraGard KIS (Kids Improving Security) Poster Contest. In addition to all
that, he actually finds time to work.
Sanford Sherizen, PhD, CISSP, is president of Data Security Systems, Inc. in Natick, Massachusetts.
Brian Shorten, CISSP, CISA, has been involved in information security since 1986, working in financial
institutions and telecommunications companies. He has held positions as data protection officer and
business continuity manager. A member of the ISACA, the British Computer Society, and the Business
Continuity Institute, he writes and presents on various aspect of information security and business
continuity.
Carol A. Siegel, CISA, is the chief security officer of AmericanInternational Group. Siegel is a well-
known expert in the field of information security, and she has been in the field for more than ten
years.
Micah Silverman, CISSP and a Sun Certified Java programmer, is president of M*Power Internet
Services, Inc. With over 13 years of experience, he has written numerous articles for industry journals,
including Information Security Magazine, Dr. Dobbs Journal, Java Developers Journal, and Linux Journal.
xliii
Janice C. Sipior, PhD, is a member of the faculty at the College of Commerce and Finance at Villanova
University.
Valene Skerpac, CISSP, is past chairman of the IEEE Communications Society. Over the past 20 years,
she has held positions at IBM and entrepreneurial security companies. She is currently president of
iBiometrics, Inc.
Ed Skoudis, CISSP, is a senior security consultant with Intelguardians Network Intelligence. His expertise
includes hacker attacks and defenses, the information security industry, and computer privacy issues. He
has performed numerous security assessments, designed secure network architectures, and responded to
computer attacks for clients in the financial, high-technology, healthcare, and other industries. He is a
frequent speaker on issues associated with hacker tools and defenses, and he has published several articles
on these topics and Malware and Counter Hack. He is also the author of the popular Crack the Hacker
Challenge series that challenges information security professionals to learn from others’ mistakes.
Additionally, he conducted a demonstration of hacker techniques against financial institutions for the
U.S. Senate. His prior work experience includes Bell Communications Research (Bellcore), SAIC, Global
Integrity, and Predictive Systems.
Robert M. Slade, CISSP, is a data communications and security specialist from North Vancouver, British
Columbia, Canada. He has both formal training in data communications and exploration with the BBS
and network community, and he has done communications training for a number of international
commercial seminar firms. He is the author of Robert Slade’s Guide toComputer Viruses. He is the founder
of the DECUS Canada Education and Training SIG.
Timothy R. Stacey, CISSP, CISA, CISM, CBCP, PMP, is an independent senior consultant with over twenty
years of managerial and technical experience in system engineering and software development in a wide
range of real-time and scientific applications. His primary area of focus for the last twelve years has been in
the area of information security. His focus areas include IS audit, disaster recovery/business continuity
planning, security risk analysis, and business impact assessment. Prior to becoming an independent
consultant, he was a senior consultant with KPMG in its information risk management practice, a senior
information security consultant in the Shell Services International’s Global Information Security Team,
and a senior software engineer with Science Application International Corporation supporting NASA/JSC.
Bill Stackpole, CISSP, is the regional engagement manager of Trustworthy Computing Services for
Microsoft Corporation. He was a senior security consultant with Olympic Resource Management.
Stan Stahl, PhD, is the president of Citadel information Group, an information security management
consultancy. An information security pioneer, his career began nearly 25 years ago on a wide range of
advanced projects for the White House, various military branches, the National Security Agency, and
NASA. He serves as vice president of the Los Angeles Chapter of the Information System Security
Association, and he is on the Editorial Advisory Board of Continuity Insights, for whom he writes a
bimonthly information security column.
Christopher Steinke, CISSP, is an information security consulting staff member at Lucent World Wide
Services, Dallas, Texas.
xliv
The St. Helens Railway was famous—or, from an engineer’s point of view, we should say, perhaps,
infamous—for the severe gradients, sharp curves, and numerous points, crossings, and junctions. The
inclines were as steep as 1 in 35, 1 in 70, and 1 in 85, whilst the curves were constructed with radii of
300ft. and 500ft., and reverse or S curves were also more frequent than pleasant. The St. Helens
Railway was only 30 miles long, but within two miles of the St. Helens Station no less than 12 miles of
sidings were located. We do not mean to suggest that the whole line of railway was so thickly covered
with siding connections, but such were distributed over the remaining mileage of the railway in too
plentiful profusion. Here, then, was a length of railway containing the three great hindrances to smooth
and quick running, but the locomotive about to be described was so constructed as to successfully
overcome these impediments.
This engine had inside cylinders, 15in. diameter and 20in. stroke. The coupled wheels were 5ft. 1in.
in diameter, the rigid wheel base being 8ft., but as these wheels had spring tyres, each pair of wheels
was practically as free to traverse the curves as uncoupled wheels. Other dimensions were:—Heating
surface, 687 sq. ft.; grate area, 16.25 sq. ft.; total wheel base, 22ft.; weight in working order, on
leading wheels, 7 tons 15 cwt.; on driving, 11¾ tons; on rear coupled, 11¼ tons; on trailing, 10 tons,
including 4¼ tons water and 1¼ tons coal. Total weight, 40¾ tons.
The boiler contained 121 tubes, 10ft. 11in. long, and 1⅞in. diameter; steam pressure, 140lb.; water
capacity of tank, 950 gallons. The fire-grate was 5ft. long, and sloped from the door to the tube-plate.
The springs of the coupled wheels were connected by means of a compensation lever. The dome was
placed on the raised fire-box, and fitted with a screw-down safety valve; a second valve of the same
pattern was fixed on the boiler barrel. A roomy and well-enclosed cab, fitted with side windows,
thoroughly protected the enginemen.
Adams’ radial axle-boxes are, of course, still in use on the Great Northern Railway, London,
Chatham, and Dover Railway, and other lines, so that a detailed account here is not necessary, the
salient feature being that they are made with a radius, having its centre in the centre of the adjoining
axle, the axle-box guide-boxes being curved to fit. In the engine we are now describing the radius of
the boxes was 7ft., and the lateral play of the boxes was 4½in. on each side. The spring-pins were not
fixed on the top of the boxes, but were each fitted with a small roller to allow the boxes to freely
traverse. The axle-boxes weighed 3½ cwt. each.
It will be understood that when an engine fitted with these boxes enters a right-hand curve the
flanges of the leading wheels draw the boxes to the right, so that the engine itself remains a tangent to
the curve, whilst, since the axle-boxes are themselves curved, the effect is that the right-hand side
axles are brought nearer the rigid wheels, and consequently the radial wheels on the opposite side of
the engine further from the fixed wheels, the whole effect of the radial axle-boxes being that the trailing
and leading axles actually become radii of the curves being traversed, although the flanges continue
parallel to the rails.
Adams’ spring tyres require a more precise description, and before we describe them, readers may
perhaps be reminded that Adams had strong views on the subject of railway rolling stock wheels. He
enters rather fully into the matter in his book, “Roads and Rails,” especially in the chapter dealing with
“the mechanical causes of accidents.” In this, Adams maintains that the usual forms of wheels are in
reality rollers, and not wheels.
The spring tyres had been tried on the North London Railway, Eastern Counties, and on another
locomotive on the St. Helens Railway, before the engine now under review was constructed. Upon the
coupled wheels of the new locomotive for the latter railway, double spring hoops were employed, the
single form having been used in the three previously mentioned engines. The plan adopted was as
follows:—
“The tyres chosen were constructed with a deep rib in front; this was bored out, internally, to a
depth of ¾in., and to a conical section, and, of course, parallel to the tread. A flat edge, ⅜in. wide, was
thus left on either side.
“The springs, formed of tempered hoop steel, were placed on the inner surface of the tyres.
Corresponding curves were turned across the outer circumference of the wheels. The wheels were
forced into the cones containing the springs, and retained by three 1in. bolts, and a flat ring in the
groove at the back of the tyre, the effort of the spring tyres being to allow of a slight lateral motion in
running round curves and also to give a better grip of the rails, as the tyres, by reason of the weight
upon them being transmitted through the tyre springs, slightly flattened upon the rails, and so
presented a larger surface for adhesion between the tyres and rails.”
The following interesting account of the working of the radial axle and spring tyre locomotive on the
St. Helens Railway is extracted from a paper by Mr. J. Cross, the designer of the locomotive, and read
before the Institution of Civil Engineers. Mr. Cross stated that “the engine was completed in the first
week of November, 1863, and has since been running very regularly, taking its turn of duty with
passenger trains or coal trains, or as a shunting engine; and about the numerous works connected by
sharp curves with the St. Helens line. The motion round curves is free from all jerking, and on straight
lines the speed is more than 60 miles an hour; either end of the engine being first, without any train
behind to give steadiness; and the motion is so smooth that it has only been by taking the actual time
that the engineers have convinced themselves of the fact of the speed exceeding 40 miles an hour. It
was built to traverse curves of 200ft. radius. This it does with the greatest facility, and it has regularly
worked the passenger trains round a curve of 1,000ft. radius, going directly off the straight line by a
pair of facing points at a speed of more than 30 miles an hour, and it has gone round curves of 132ft.
radius. It has also run a train of 12 passenger carriages, weighted up to 100 tons, exclusive of its own
weight, at 60 miles an hour on the level. From the advantages it possesses over the ordinary mixed
engines for weighting the trailing coupled wheel, it, without difficulty, on a wet, slippery day, started,
and took this load up a gradient of 1 in 70, drawing seven of the carriages with a load weighing 72 tons
5 cwt., up a gradient of 1 in 36, round a curve of 440ft. radius; and coal trains of 250 tons are worked
over long gradients of 1 in 200 with the greatest ease.
“It is evident, then, that engines on this principle, affording facilities for the use of high power in
hilly countries, are peculiarly adapted for Metropolitan lines, where sharp curves are a necessity (being
equally safe whichever end is foremost), and are also well suited for light lines in India and the
Colonies. It may likewise be remarked that carriages and wagons on this principle would carry heavier
freights, with a saving in the proportion of dead weight, while their friction round curves would be less
than at present.”
The improvements adopted in the construction of this locomotive for the St. Helens Railway were so
successful that, as usual, other claimants, who appropriated the radial axle-boxes as their invention,
were soon contending with Adams and Cross as to who was entitled to the honour of introducing the
improvement.
The first portion of the Metropolitan Railway was opened on January 18th, 1863, and the line was
then worked on the broad-gauge by the Great Western Railway for a percentage of the receipts. The
Great Western Railway provided the stations, staff, locomotives, and rolling stock.
Mr. D. Gooch, in 1862, designed a special class of tank engines for working the Metropolitan Railway.
They were six-wheel engines, the driving and trailing wheels being 6ft. diameter and coupled. The
cylinders were outside. A special form of fire-box and baffle-plate was employed, and tanks were
provided beneath the boiler barrel, into which the exhaust steam was discharged by means of a
reversing valve fitted to the bottom of the blast pipe. When in the open air, the waste steam escaped up
the chimney in the usual manner.
The first of these engines were named: Bee, Hornet, Locust, Gnat, Wasp, Mosquito, Bug, Khan,
Kaiser, Mogul, Shah, and Czar. Later ones were named after flowers and Great Western Railway officers.
A dispute arose between the two companies at the beginning of August, 1865, and immediately
developed into a complete rupture. The smaller quasi vassal railway, through the energy displayed by its
chief officers, successfully overcame the apparently insurmountable obstacles that beset it, and
consequently the Metropolitan Railway asserted its complete independence of the Great Western
Railway, and has since maintained it.
It was indeed a nine days’ wonder that the Metropolitan Railway was called upon to perform, for it
had to obtain from somewhere locomotives and carriages to work the underground line, commencing
on the morning of August 10th, 1863.
Mr. Sturrock, the locomotive superintendent of the Great Northern Railway, had at this time under
construction a class of condensing-tank engines that he had designed to work the Great Northern
Railway traffic over the Metropolitan Railway. The directors of the Metropolitan Railway in this
emergency applied to Mr. Sturrock for assistance, and by working day and night he managed to fit up
some Great Northern tender engines with a temporary condensing apparatus.
The difficulty was to provide some kind of condensing apparatus on the Great Northern tender
engines, it being necessary to use flexible connecting pipes between the engine and tender strong
enough to withstand the steam pressure, but Mr. Sturrock was successful enough to contrive the
necessary flexible pipes by which the exhaust steam was conveyed from the engine to the water-tank of
the tender, but these pipes very frequently burst, and all concerned were far from sorry when the
proper engines were delivered.
An order for eighteen had already been placed with a well-known Manchester firm of locomotive
builders by the Metropolitan Railway, Beyer, Peacock, and Co. building them from the designs of the late
Mr. (afterwards Sir) John Fowler.
The type is well known to London readers, the engines having side tanks, a leading bogie, the
wheels of which were 3ft. diameter, with a base of 4ft. The driving and trailing wheels (coupled) were
5ft 9in. diameter, their base being 8ft. 10in.; the total wheel base being 20ft. 9in., or to centre of bogie,
18ft. 9in. The cylinders were outside, slightly inclined from the horizontal, 17in. diameter, and 24in.
stroke. The grate area was 19 sq. ft. The fire-boxes had sloping grates, which were 6in. deeper at the
front than the back. The boiler barrel was 4ft. in diameter, and 10ft. 3in. long; it contained 166 tubes,
2in. diameter, the total heating surface being 1,014 sq. ft. The working pressure was nominally 130lb.
per sq. in., but when working through the tunnels, condensing the steam, and with the dampers closed,
a very much lower pressure resulted. The frames were inside, the dome (fitted with a Salter valve) was
on the boiler barrel, close to the smoke-box, a sand-box being also fixed on the boiler barrel at the back
of the dome.
The bogie truck was built of plate frames, and was on the Bissell system, turning on a centre-pin
fixed to the engine frame, at a radial distance of 6ft. 8in. from the centre of the truck. “Locomotive
Engineering” says that “this radial length ensures a nearly correct radiality of the bogie to curves of all
radii, the proper length of the radius to ensure exact radiality of the centre of the bogie for all curves
being 7ft. 2in., or 6in. more than the actual length—a difference which is, perhaps, of no great
importance in practice.”
For the purpose of effectually condensing the exhaust steam the side tanks were only filled with
water to within 6in. of the top, and the steam was discharged upon the surface of the water, from a 7in.
pipe on each side—one to each tank. Into the mouth of these 7in. pipes a 4in. pipe was projected a
short distance, and the other end of the 4in. pipe was below the surface of the water, so that a portion
of the steam was discharged right into the water in the tanks, and agitated the water sufficiently to
prevent the surface of the water from becoming too hot, as would have been the case if the same
portion of the water had always been presented to the waste steam. The tanks held 1,000 gallons, and
at the end of a journey the water had become too warm to properly condense the exhaust, and it
therefore became necessary to quickly empty the tanks and to take in a fresh supply of cold water.
To expeditiously perform the former operation, each tank was provided with a pipe 7in. in diameter;
this led to a cast-iron valve-box being placed below the foot-plate. By means of a screw, worked from
the foot-plate, a 10in. valve was operated, and the water in the tanks could be discharged into the pits
below the engine in the course of some 60 seconds.
The following list gives the names and builders’ numbers of the first locomotives constructed for the
Metropolitan Railway:
These engines were fitted with a very small coal bunker, only 18in. wide. Weight of engine in
working order: on bogie, 11 tons 3½ cwt.; driving, 15 tons 9½ cwt.; and trailing, 15 tons 10 cwt. Total
weight, 42 tons 3 cwt.
Mr. Sturrock’s engines for working the Great Northern trains over the Metropolitan Railway were
numbered 241 to 250, their leading dimensions being:—Cylinders (inside), 16½in. diameter, 22in.
stroke; leading and driving wheels (coupled), 5ft. 6in.; trailing wheels, 4ft. diameter; wheel base, L. to
D., 7ft. 6in.; D. to T., 11ft. 9in.; total, 19ft. 3in. Weight, empty, 32 tons 4 cwt. 1 qr.; in working order, 39
tons 12 cwt. 2 qrs.
These Great Northern Railway locomotives were fitted with Adams’ radial axle-boxes to the trailing
wheels, and commenced working at the end of October, 1865.
The patentee of the Bissell bogie truck did not intend to hide the light of his invention under a
bushel, for he advertised the improvement in a truly American style. The following advertisement was to
be found in the columns of the sober railway newspapers soon after the Metropolitan locomotives were
at work:—
“Important to Railway Directors, Engineers, and the Travelling public.
“No more accidents from engines running off the line (see Queen’s letter to Railway Directors
copied in the railway papers January 28th, 1866).
“The Bissell bogie, or safety truck, for locomotive engines, so much prized on American and
foreign railroads for the great safety and economy it affords on curved roadways, after
years of probationary trial in England, has at length been adopted by John Fowler, Esq.,
C.E., F.G.S., upon all the new engines, eighteen in number, now working on the
Metropolitan Railway, and by Robert Sinclair, Esq., C.E., upon twenty new eight-wheeled
engines on the Great Eastern Railway, which may be seen daily. The royalty for the use of
the Bissell Patents has been reduced to £10 per engine, so that every engine requiring a
bogie underframe should be provided with the Bissell safety truck. Apply to——.”
Whilst on the subject of railway advertisements we take the opportunity to record the obituary
announcement of the tentative “hot-brick” engine, previously referred to, designed to work on the
Metropolitan Railway. It appeared in the railway newspapers during the early months of 1865, and was
to the following effect: “Metropolitan Railway. One locomotive engine for sale, either entire or in parts.
For particulars apply to the Locomotive Superintendent, Bishop’s Road, Paddington.”
Reference must here be made to Mr. Sturrock’s system of steam tenders, as adopted by him to work
the heavy coal and goods trains on the Great Northern Railway. In addition to the usual engine, the
pistons of a pair of cylinders, 12in. diameter, with a stroke of 17in. actuated the centre axle of the
tender, and the six tender wheels were coupled by outside rods. The tender wheels were 4ft. 6in.
diameter. The steam tenders weighed about 35 tons, with water and coal, and of this weight over 13
tons was on the driving wheels. After use in the tender cylinders, the exhaust steam was condensed in
the tender tank. Forty-six of these steam tenders were constructed, and some are still running, but as
simple tenders, the propelling apparatus having been done away with many years ago. Fig. 85a
represents a Great Northern engine fitted with one of Sturrock’s patent steam tenders.
Mr. Robert Sinclair, whilst locomotive superintendent of the Great Eastern Railway, only designed one
type of tank engine, and Neilson and Co. constructed the first of this class in 1864. Twenty of the class
were built, being originally intended to work the Enfield Town Branch, but in later years these engines
were used on the North Woolwich line. The engines (Fig. 86a) were supported by eight wheels, the
leading and trailing being 3ft. 7in. diameter, and the driving and back coupled 5ft. 6in. diameter. The
cylinders were outside, 15in. diameter, and 22in. stroke. The leading and trailing wheels were fitted with
the Bissell truck, referred to in the advertisement just quoted. So that although the whole wheel base
was 17ft. 4in., the rigid base—that of the coupled wheels—was only 6ft. The boiler was 13ft. 6in. long,
and the water was carried in the tanks beneath the boiler and between the frames. An enclosed cab
with front and rear spectacle plates was provided.
The general arrangements of the “Little Wonder” may be described as follows. The boiler was
double, having two fire-boxes united back to back with two distinct barrels and sets of flue-tubes, and
consequently a chimney at each end. A bogie was placed under each barrel, and each bogie had two
pairs of wheels coupled together, worked independently by a pair of steam-cylinders to each bogie.
Thus a total wheel base of 19ft. 1in. in length was covered by the bogies; each bogie had a 5ft. wheel
base, and the distance between the centres of the bogies was 14ft. 1in. The four cylinders were 8³/
₁₆in. in diameter, and had a stroke of 13in.; the wheels were 2ft. 4in. in diameter. The combined grate
area was 11 sq. ft., and the heating surface 730 sq. ft. Fairlie’s system of double engines soon came
into repute for working steep gradients, and many very powerful engines were and are still constructed
on his system for use on foreign railways. Fairlie, in conjunction with Samuels, adapted his system to a
species of combined locomotive and carriage, and, in 1869, one was constructed for working on the
London, Chatham, and Dover Railway between Swanley Junction and Sevenoaks. Seven passenger
compartments were provided in this vehicle, accommodation comprising seats for 16 first-class and 50
second-class passengers; its total length was 43ft., and weight, empty, 13½ tons. The leading end was
supported by the engine bogie, and the trailing end by an ordinary bogie truck. Curves of only 50ft.
radius were easily passed over by the combination vehicle.
Leaving Fairlie and his combinations, both of locomotives and carriages, and also of double
locomotives, we now glance at a class of tank engines designed by Cudworth for working the trains
between Cannon Street and Charing Cross upon the opening of the former terminus in 1866. These
engines were seven in number, and were constructed at the Canada Works. They were of the “coupled
in front” pattern, with a trailing bogie. The cylinders were inside, 15in. diameter and 20in. stroke. The
coupled wheels were 5ft. 6in. diameter. Outside frames were employed, and also compensation beams
both to the coupled and bogie wheels. The coal bunker, with water-tank under, was of exceptional
length. It was always a puzzle to the writer as to how a stout driver could manage to squeeze through
the narrow entrances to the foot-plate, especially as these apertures were situate at the side of the fire-
box; but evidently the “trick was done” by following the axiom, “Where there’s a will there’s a way,” and
doubtless the drivers, if asked, would have replied, “It’s very easy if you only know the way.” These
South Eastern Railway locomotives were numbered 235 to 241.
Mr. Wm. Gowan, locomotive superintendent of the Great North of Scotland Railway, designed a class
of engine, which Neilson and Co. constructed. The design was stated to be that of a “goods”
locomotive, but upon examination we find the engines in question to be no other than the popular four-
coupled behind, with a leading bogie and outside cylinders. The latter were arranged in a horizontal
position immediately below the frames. The coupled wheels were 5ft. 6½in. diameter, with underhung
springs connected by means of an equalising lever-beam. The bogie wheels were 3ft. in diameter, with
a base of 6ft. Inside bearings were supplied to the bogie axles. The boiler barrel measured 10ft. 10⅛in.
between the tube-plates, its external diameter was 4ft. 1in., and it contained 206 tubes of 1¾in.
diameter. The engine was fitted with D. K. Clarke’s system of smoke-consuming apparatus, previously
described. The fire-box was of the raised pattern, and the steam dome was placed on it. The engine
weighed 39 tons 13 cwt., and the tender 27 tons, in working order.
In general appearance this “goods” engine resembled in a remarkable degree the London and South
Western Railway express passenger engines as built by Mr. Adams. The tender was carried on six
wheels.
Fig. 85b represents Beattie’s standard design of goods engine for the L. and S.W.R. in 1866, the
wheels were 5ft. 1in. diameter, the cylinders being inside, and having a diameter of 17in., the stroke
24in. Beyer, Peacock and Co. were the builders. Fig. 86b represents an engine of this class as rebuilt
some years later at Nine Elms Works.
In 1868 Mr. W. Adams placed upon the North London Railway the first locomotive constructed from a
design which has, in its broad features and general outline, ever since been a model of simplicity,
attractiveness, and utility, showing, as the design does, what engines constructed to work important
local traffic should be like.
Fig. 85b.—BEATTIE’S STANDARD GOODS ENGINE, L. & S.W.R., 1866
In its original form there were some points that need alteration, as they certainly spoilt the general
symmetrical effect of an otherwise artistic appearance. We may as well allude to these defects at once,
and then proceed to detail the locomotive.
The first of such blots on the design was the placing of a cylindrical sand-box on the top of the boiler
barrel, between the chimney and the dome. To show that such a position for this useful appendage was
not necessary, we mention that only the driving wheels were supplied with sand from this unsightly
excrescence, the supply of sand for the trailing wheels (for use when running bunker in front) being
placed in an unobtrusive position. If the latter sand-boxes could thus be located, why was it necessary
to place that for the leading wheels in so conspicuous a position? This example of awkward location of
so useful an adjunct is further emphasised when we remember that these engines run just as frequently
bunker first as chimney first. Further, in consequence of the position of this sand-box, the rod for
working the sand valves was carried along the top of the boiler barrel, several inches above its surface,
thus still more detracting from the symmetry of the design. The other feature we wish to allude to, is
the shape of the dome cover, the whole of which was of a needlessly ugly contour. Then, again, in later
years an enclosed cab was added, the back and front of which, being of sheet-iron, extending to the
extreme of the coal bunker, and with no return sides, has given a rather toy-like appearance to these
otherwise fine locomotives. We are glad to be able to mention that when these engines were rebuilt,
the objectionable sand-box was removed, and a more pleasing form of steam dome provided, but this
improvement was in a great measure negatived by the black enamelled iron which is now used for the
cover in place of the bright brass formerly employed for the purpose.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebooknice.com