Cyber Resilience
Cyber resilience is the most important feature of any cyber system, especially during the transition to the sixth technological stage and related Industry 4.0 technologies: Artificial Intelligence (AI), Cloud and foggy computing, 5G +, IoT/IIoT, Big Data and ETL, Q-computing, Blockchain, VR/AR, etc....
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Aalborg :
River Publishers,
2019.
|
Colección: | River Publishers Series in Security and Digital Forensics Ser.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_on1125113013 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr |n|---||||| | ||
008 | 191116s2019 xx o 000 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d OCLCQ |d MERUC |d N$T |d OCLCF |d OCLCQ |d K6U |d OCLCO |d OCLCQ |d EBLCP |d OCLCQ |d OCLCO |d OCLCQ | ||
020 | |a 8770221154 | ||
020 | |a 9788770221153 |q (electronic bk.) | ||
029 | 1 | |a AU@ |b 000069393470 | |
035 | |a (OCoLC)1125113013 | ||
050 | 4 | |a QA76.9.A25 | |
082 | 0 | 4 | |a 005.8 |
049 | |a UAMI | ||
100 | 1 | |a Petrenko, Sergei. | |
245 | 1 | 0 | |a Cyber Resilience |
260 | |a Aalborg : |b River Publishers, |c 2019. | ||
300 | |a 1 online resource (494 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a River Publishers Series in Security and Digital Forensics Ser. | |
588 | 0 | |a Print version record. | |
505 | 0 | |a Front Cover; Half Title; Series Page -- RIVER PUBLISHERS SERIES IN SECURITY AND DIGITAL FORENSICS; Title Page; Copyright Page; Contents; Foreword; Preface; Acknowledgements; List of Figures; List of Tables; List of Abbreviations; Glossary; Introduction; Chapter 1 -- Cyber Resilience Concept; 1.1 Cyber Security Threat Landscape; 1.1.1 APT Attack Research Results; 1.1.2 Known Attacker Methods; 1.1.3 Process Control System Cyber Security Threat; 1.2 Problem of the "Digital Bombs" Neutralization; 1.2.1 "Digital Bombs" Detection Problem; 1.2.2 Program Faults Detection Methods | |
505 | 8 | |a 1.2.3 Introducing a Passport System for Programs1.2.4 "Digital Bombs" Neutralization Method; 1.3 Problem Statement of the Cyber Resilience Control; 1.3.1 Basic Definitions and Concepts of the Cyber Resilience; 1.3.2 Considering Trends and Prospects for Digital Transformation; 1.3.3 Mathematical Formulation of the Cyber Resilience Control Problem; Chapter 2 -- Cyber Risk Management; 2.1 Best Practices of Cyber Risk Management; 2.1.1 History of Cyber Risk Management Standards; 2.1.2 Methodological Recommendations for the Cyber Risks Management; 2.1.3 Method for Subjective Probability | |
505 | 8 | |a 2.2 Cyber Resiliency Metric Development2.2.1 Possible Cyber Resiliency Metrics; 2.2.2 Predicate Functions; 2.2.3 Verification of Program Schemes; 2.3 Examples of Cyber Risk Management; 2.3.1 Example of Developing a Corporate Cyber Risk Management Methodology; 2.3.2 BIA Example -- Business Impact Analysis; 2.3.3 Toolkit for Cyber Risk Control; Chapter 3 -- Enterprise Cyber Resilience Program; 3.1 Business Continuity Management; 3.1.1 Business Continuity Management Practice; 3.1.2 Main Stages of BCM Life Cycle; 3.1.3 BCP/DRP Plan Development Recommendations | |
505 | 8 | |a 3.2 Business Resilience Project Management3.2.1 Preparing a Business Resilience Project Plan; 3.2.2 Development of Predictive Models; 3.2.3 Development of the Dynamic Profiles; 3.3 Creating a Cyber Resilient Infrastructure; 3.3.1 Audit of Cyber Resilience Management System; 3.3.2 Designing a Cyber-Resilient Infrastructure; 3.3.3 Intellectual Cyber Resilience Orchestration; Conclusion; References; Index; About the Author; Back Cover | |
520 | |a Cyber resilience is the most important feature of any cyber system, especially during the transition to the sixth technological stage and related Industry 4.0 technologies: Artificial Intelligence (AI), Cloud and foggy computing, 5G +, IoT/IIoT, Big Data and ETL, Q-computing, Blockchain, VR/AR, etc. We should even consider the cyber resilience as a primary one, because the mentioned systems cannot exist without it. Indeed, without the sustainable formation mad. | ||
590 | |a eBooks on EBSCOhost |b EBSCO eBook Subscription Academic Collection - Worldwide | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
650 | 0 | |a Computer security. | |
650 | 2 | |a Computer Security | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a Computer security |2 fast | |
655 | 0 | |a Electronic books. | |
776 | 0 | 8 | |i Print version: |a Petrenko, Sergei. |t Cyber Resilience. |d Aalborg : River Publishers, ©2019 |z 9788770221160 |
830 | 0 | |a River Publishers Series in Security and Digital Forensics Ser. | |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=30251876 |z Texto completo |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5963879 |z Texto completo |
936 | |a BATCHLOAD | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL30251876 | ||
938 | |a EBSCOhost |b EBSC |n 2277642 | ||
994 | |a 92 |b IZTAP |