Cargando…

Cyber Resilience

Cyber resilience is the most important feature of any cyber system, especially during the transition to the sixth technological stage and related Industry 4.0 technologies: Artificial Intelligence (AI), Cloud and foggy computing, 5G +, IoT/IIoT, Big Data and ETL, Q-computing, Blockchain, VR/AR, etc....

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Petrenko, Sergei
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Aalborg : River Publishers, 2019.
Colección:River Publishers Series in Security and Digital Forensics Ser.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 4500
001 EBOOKCENTRAL_on1125113013
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 191116s2019 xx o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCQ  |d MERUC  |d N$T  |d OCLCF  |d OCLCQ  |d K6U  |d OCLCO  |d OCLCQ  |d EBLCP  |d OCLCQ  |d OCLCO  |d OCLCQ 
020 |a 8770221154 
020 |a 9788770221153  |q (electronic bk.) 
029 1 |a AU@  |b 000069393470 
035 |a (OCoLC)1125113013 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8 
049 |a UAMI 
100 1 |a Petrenko, Sergei. 
245 1 0 |a Cyber Resilience 
260 |a Aalborg :  |b River Publishers,  |c 2019. 
300 |a 1 online resource (494 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a River Publishers Series in Security and Digital Forensics Ser. 
588 0 |a Print version record. 
505 0 |a Front Cover; Half Title; Series Page -- RIVER PUBLISHERS SERIES IN SECURITY AND DIGITAL FORENSICS; Title Page; Copyright Page; Contents; Foreword; Preface; Acknowledgements; List of Figures; List of Tables; List of Abbreviations; Glossary; Introduction; Chapter 1 -- Cyber Resilience Concept; 1.1 Cyber Security Threat Landscape; 1.1.1 APT Attack Research Results; 1.1.2 Known Attacker Methods; 1.1.3 Process Control System Cyber Security Threat; 1.2 Problem of the "Digital Bombs" Neutralization; 1.2.1 "Digital Bombs" Detection Problem; 1.2.2 Program Faults Detection Methods 
505 8 |a 1.2.3 Introducing a Passport System for Programs1.2.4 "Digital Bombs" Neutralization Method; 1.3 Problem Statement of the Cyber Resilience Control; 1.3.1 Basic Definitions and Concepts of the Cyber Resilience; 1.3.2 Considering Trends and Prospects for Digital Transformation; 1.3.3 Mathematical Formulation of the Cyber Resilience Control Problem; Chapter 2 -- Cyber Risk Management; 2.1 Best Practices of Cyber Risk Management; 2.1.1 History of Cyber Risk Management Standards; 2.1.2 Methodological Recommendations for the Cyber Risks Management; 2.1.3 Method for Subjective Probability 
505 8 |a 2.2 Cyber Resiliency Metric Development2.2.1 Possible Cyber Resiliency Metrics; 2.2.2 Predicate Functions; 2.2.3 Verification of Program Schemes; 2.3 Examples of Cyber Risk Management; 2.3.1 Example of Developing a Corporate Cyber Risk Management Methodology; 2.3.2 BIA Example -- Business Impact Analysis; 2.3.3 Toolkit for Cyber Risk Control; Chapter 3 -- Enterprise Cyber Resilience Program; 3.1 Business Continuity Management; 3.1.1 Business Continuity Management Practice; 3.1.2 Main Stages of BCM Life Cycle; 3.1.3 BCP/DRP Plan Development Recommendations 
505 8 |a 3.2 Business Resilience Project Management3.2.1 Preparing a Business Resilience Project Plan; 3.2.2 Development of Predictive Models; 3.2.3 Development of the Dynamic Profiles; 3.3 Creating a Cyber Resilient Infrastructure; 3.3.1 Audit of Cyber Resilience Management System; 3.3.2 Designing a Cyber-Resilient Infrastructure; 3.3.3 Intellectual Cyber Resilience Orchestration; Conclusion; References; Index; About the Author; Back Cover 
520 |a Cyber resilience is the most important feature of any cyber system, especially during the transition to the sixth technological stage and related Industry 4.0 technologies: Artificial Intelligence (AI), Cloud and foggy computing, 5G +, IoT/IIoT, Big Data and ETL, Q-computing, Blockchain, VR/AR, etc. We should even consider the cyber resilience as a primary one, because the mentioned systems cannot exist without it. Indeed, without the sustainable formation mad. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 7 |a Computer security  |2 fast 
655 0 |a Electronic books. 
776 0 8 |i Print version:  |a Petrenko, Sergei.  |t Cyber Resilience.  |d Aalborg : River Publishers, ©2019  |z 9788770221160 
830 0 |a River Publishers Series in Security and Digital Forensics Ser. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=30251876  |z Texto completo 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5963879  |z Texto completo 
936 |a BATCHLOAD 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL30251876 
938 |a EBSCOhost  |b EBSC  |n 2277642 
994 |a 92  |b IZTAP