Cyber security innovation for the digital economy : a case study of the Russian Federation /
Cyber Security Innovation for the Digital Economy considers possible solutions to the relatively new scientific-technical problem of developing innovative solutions in the field of cyber security for the Digital Economy. The solutions proposed are based on the results of exploratory studies conducte...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Denmark :
River Publishers,
[2018]
|
Colección: | River Publishers series in security and digital forensics.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Front Cover; Half Title Page; RIVER PUBLISHERS SERIES IN SECURITY AND DIGITAL FORENSICS; Copyright Page; Contents; Foreword; Preface; Acknowledgements; List of Figures; List of Tables; List of Abbreviations; Introduction; Chapter 1
- Relevance of Cyber Security Innovations; 1.1 Digital Transformation of State and Society; 1.1.1 State Program "Digital Economy"; 1.1.2 Main Information Infrastructure Development Objectives; 1.1.3 Implementation of the Long-Term Evolution (LTE) Technology; 1.1.4 IIoT/IoT Technologies Development; 1.2 Typical Cyber Security Threats
- 1.2.1 Possible Scenarios of Cyber-Attack on the Information Infrastructure1.2.2 Threats and Consequences of Wireless LAN IEEE 802.1x Implementation; 1.2.3 Cyber Security Threats of Corporate Digital and IP-ATX (Private Automatic Telephone Exchanges); 1.2.4 Threats and Security Profile of the Mobile Operating System OS Sailfish and Tizen; 1.3 Cyber Security Threats Monitoring Necessity; 1.3.1 Cyber Security Incidents Factual Account; 1.3.2 Need for Joint Initiatives of Society and States; 1.3.3 Capture the Flag Competition on Vulnerability Detection
- 1.3.4 Security Operations Center (SOC) Key RoleChapter 2
- MSSP/MDR National Operator Development; 2.1 Ultimate Opportunity of National MSSP/MDR Operators; 2.1.1 Relevance of MSSP/MDR Cyber Security Services; 2.1.2 MSSP/MDR Best Organization PracticeThe MSSP market dynamics in North Americ; 2.1.3 Sample of MSSP by AT 2.1.4 Sample of MSSP Model by UBIqube; 2.1.5 Feasible Technical Solutions; 2.2 Possible Ways of Providing Cyber Security Services; 2.2.1 Typical MSSR/MDR Services; 2.2.2 IS Sourcing Model Analysis; 2.2.3 The IS Sourcing Practice
- 2.2.4 Sample SLA Content for the Provision of Cyber Security Services2.2.5 Best Practices for Providing Cyber Security Service; 2.3 Development of National MSSP/MDR Based on Big Data; 2.3.1 Big Data Processing Requirements Analysis; 2.3.2 Best Big Data Processing Practice; 2.3.3 MSSP/MDR Subsystem Functionality for Big Data Processing; 2.3.4 Sensor Cloud Architecture Advantages; 2.4 New Methods of Cyber Security Knowledge Management; 2.4.1 Possible State of the Art; 2.4.2 Cyber Security MDM Principles; 2.4.3 MDM Cyber Security System Example
- Chapter 3
- Innovative Methods for Detecting Anomalies3.1 Justification of a New Method for Detecting Anomalies; 3.1.1 Analysis of the Existing Approaches to the TCP/IP Network Abnormal Functioning Detection; 3.1.2 Possible Statement of the Detecting Anomalies' Problem; 3.1.3 Definition of New Informative Features; 3.1.4 Detection of Anomalies Based on Dimensions; 3.1.5 Investigation of Properties of Invariants of Dimension; 3.2 The Main Provisions of the New Method for Detecting Anomalies; 3.2.1 The Main Hypotheses for Detecting Anomalies; 3.2.2 Control of Semantic Correctness Criteria