|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBSCO_on1078998071 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
181215s2018 dk a ob 001 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d MERUC
|d N$T
|d OCLCF
|d YDX
|d AJB
|d WAU
|d UKAHL
|d OCLCQ
|d OCLCO
|d ESU
|d K6U
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1078935721
|
020 |
|
|
|a 8770220212
|
020 |
|
|
|a 9788770220217
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000068475236
|
035 |
|
|
|a (OCoLC)1078998071
|z (OCoLC)1078935721
|
043 |
|
|
|a e-ru---
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Petrenko, Sergei,
|e author.
|
245 |
1 |
0 |
|a Cyber security innovation for the digital economy :
|b a case study of the Russian Federation /
|c Sergei Petrenko.
|
264 |
|
1 |
|a Denmark :
|b River Publishers,
|c [2018]
|
300 |
|
|
|a 1 online resource (xxxii, 458 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a River Publishers Series in Security and Digital Forensics
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Online resource; title from PDF title page (EBSCO, Febrary 1, 2019).
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Front Cover; Half Title Page; RIVER PUBLISHERS SERIES IN SECURITY AND DIGITAL FORENSICS; Copyright Page; Contents; Foreword; Preface; Acknowledgements; List of Figures; List of Tables; List of Abbreviations; Introduction; Chapter 1 -- Relevance of Cyber Security Innovations; 1.1 Digital Transformation of State and Society; 1.1.1 State Program "Digital Economy"; 1.1.2 Main Information Infrastructure Development Objectives; 1.1.3 Implementation of the Long-Term Evolution (LTE) Technology; 1.1.4 IIoT/IoT Technologies Development; 1.2 Typical Cyber Security Threats
|
505 |
8 |
|
|a 1.2.1 Possible Scenarios of Cyber-Attack on the Information Infrastructure1.2.2 Threats and Consequences of Wireless LAN IEEE 802.1x Implementation; 1.2.3 Cyber Security Threats of Corporate Digital and IP-ATX (Private Automatic Telephone Exchanges); 1.2.4 Threats and Security Profile of the Mobile Operating System OS Sailfish and Tizen; 1.3 Cyber Security Threats Monitoring Necessity; 1.3.1 Cyber Security Incidents Factual Account; 1.3.2 Need for Joint Initiatives of Society and States; 1.3.3 Capture the Flag Competition on Vulnerability Detection
|
505 |
8 |
|
|a 1.3.4 Security Operations Center (SOC) Key RoleChapter 2 -- MSSP/MDR National Operator Development; 2.1 Ultimate Opportunity of National MSSP/MDR Operators; 2.1.1 Relevance of MSSP/MDR Cyber Security Services; 2.1.2 MSSP/MDR Best Organization PracticeThe MSSP market dynamics in North Americ; 2.1.3 Sample of MSSP by AT 2.1.4 Sample of MSSP Model by UBIqube; 2.1.5 Feasible Technical Solutions; 2.2 Possible Ways of Providing Cyber Security Services; 2.2.1 Typical MSSR/MDR Services; 2.2.2 IS Sourcing Model Analysis; 2.2.3 The IS Sourcing Practice
|
505 |
8 |
|
|a 2.2.4 Sample SLA Content for the Provision of Cyber Security Services2.2.5 Best Practices for Providing Cyber Security Service; 2.3 Development of National MSSP/MDR Based on Big Data; 2.3.1 Big Data Processing Requirements Analysis; 2.3.2 Best Big Data Processing Practice; 2.3.3 MSSP/MDR Subsystem Functionality for Big Data Processing; 2.3.4 Sensor Cloud Architecture Advantages; 2.4 New Methods of Cyber Security Knowledge Management; 2.4.1 Possible State of the Art; 2.4.2 Cyber Security MDM Principles; 2.4.3 MDM Cyber Security System Example
|
505 |
8 |
|
|a Chapter 3 -- Innovative Methods for Detecting Anomalies3.1 Justification of a New Method for Detecting Anomalies; 3.1.1 Analysis of the Existing Approaches to the TCP/IP Network Abnormal Functioning Detection; 3.1.2 Possible Statement of the Detecting Anomalies' Problem; 3.1.3 Definition of New Informative Features; 3.1.4 Detection of Anomalies Based on Dimensions; 3.1.5 Investigation of Properties of Invariants of Dimension; 3.2 The Main Provisions of the New Method for Detecting Anomalies; 3.2.1 The Main Hypotheses for Detecting Anomalies; 3.2.2 Control of Semantic Correctness Criteria
|
500 |
|
|
|a 3.2.3 Sufficient Condition for the Criteria Fulfillment
|
520 |
|
|
|a Cyber Security Innovation for the Digital Economy considers possible solutions to the relatively new scientific-technical problem of developing innovative solutions in the field of cyber security for the Digital Economy. The solutions proposed are based on the results of exploratory studies conducted by the author in the areas of Big Data acquisition, cognitive information technologies (cogno-technologies), new methods of analytical verification of digital ecosystems on the basis of similarity invariants and dimensions, and "computational cognitivism," involving a number of existing models and methods. In practice, this successfully allowed the creation of new entities - the required safe and trusted digital ecosystems - on the basis of the development of digital and cyber security technologies, and the resulting changes in their behavioral preferences. Here, the ecosystem is understood as a certain system of organizations, created around a certain Technological Platform that use its services to make the best offers to customers and access to them to meet the ultimate needs of clients - legal entities and individuals. The basis of such ecosystems is a certain technological platform, created on advanced innovative developments, including the open interfaces and code, machine learning, cloud technologies, Big Data collection and processing, artificial intelligence technologies, etc. The mentioned Technological Platform allows creating the best offer for the client both from own goods and services and from the offers of external service providers in real time. This book contains four chapters devoted to the following subjects: * Relevance of the given scientific-technical problems in the cybersecurity of Digital Economy * Determination of the limiting capabilities * Possible scientific and technical solutions * Organization of perspective research studies in the area of Digital Economy cyber security in Russia
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security
|z Russia (Federation)
|v Case studies.
|
650 |
|
0 |
|a Electronic commerce
|x Data processing
|x Security measures
|z Russia (Federation)
|v Case studies.
|
650 |
|
0 |
|a Business enterprises
|x Technological innovations
|x Security measures
|z Russia (Federation)
|v Case studies.
|
650 |
|
6 |
|a Sécurité informatique
|z Russie
|v Études de cas.
|
650 |
|
6 |
|a Commerce électronique
|z Russie
|x Informatique
|x Sécurité
|x Mesures
|v Études de cas.
|
650 |
|
6 |
|a Entreprises
|x Innovations
|z Russie
|x Sécurité
|x Mesures
|v Études de cas.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
651 |
|
7 |
|a Russia (Federation)
|2 fast
|0 (OCoLC)fst01262050
|
655 |
|
7 |
|a Case studies.
|2 fast
|0 (OCoLC)fst01423765
|
776 |
0 |
8 |
|i Print version:
|a Petrenko, Sergei.
|t Cyber Security Innovation for the Digital Economy : A Case Study of the Russian Federation.
|d Aalborg : River Publishers, ©2018
|
830 |
|
0 |
|a River Publishers series in security and digital forensics.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1982635
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH35692813
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1982635
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 18105779
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15890386
|
994 |
|
|
|a 92
|b IZTAP
|