Cargando…

Cyber security innovation for the digital economy : a case study of the Russian Federation /

Cyber Security Innovation for the Digital Economy considers possible solutions to the relatively new scientific-technical problem of developing innovative solutions in the field of cyber security for the Digital Economy. The solutions proposed are based on the results of exploratory studies conducte...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Petrenko, Sergei (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Denmark : River Publishers, [2018]
Colección:River Publishers series in security and digital forensics.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBSCO_on1078998071
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 181215s2018 dk a ob 001 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d MERUC  |d N$T  |d OCLCF  |d YDX  |d AJB  |d WAU  |d UKAHL  |d OCLCQ  |d OCLCO  |d ESU  |d K6U  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 1078935721 
020 |a 8770220212 
020 |a 9788770220217  |q (electronic bk.) 
029 1 |a AU@  |b 000068475236 
035 |a (OCoLC)1078998071  |z (OCoLC)1078935721 
043 |a e-ru--- 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Petrenko, Sergei,  |e author. 
245 1 0 |a Cyber security innovation for the digital economy :  |b a case study of the Russian Federation /  |c Sergei Petrenko. 
264 1 |a Denmark :  |b River Publishers,  |c [2018] 
300 |a 1 online resource (xxxii, 458 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a River Publishers Series in Security and Digital Forensics 
504 |a Includes bibliographical references and index. 
588 0 |a Online resource; title from PDF title page (EBSCO, Febrary 1, 2019). 
588 0 |a Print version record. 
505 0 |a Front Cover; Half Title Page; RIVER PUBLISHERS SERIES IN SECURITY AND DIGITAL FORENSICS; Copyright Page; Contents; Foreword; Preface; Acknowledgements; List of Figures; List of Tables; List of Abbreviations; Introduction; Chapter 1 -- Relevance of Cyber Security Innovations; 1.1 Digital Transformation of State and Society; 1.1.1 State Program "Digital Economy"; 1.1.2 Main Information Infrastructure Development Objectives; 1.1.3 Implementation of the Long-Term Evolution (LTE) Technology; 1.1.4 IIoT/IoT Technologies Development; 1.2 Typical Cyber Security Threats 
505 8 |a 1.2.1 Possible Scenarios of Cyber-Attack on the Information Infrastructure1.2.2 Threats and Consequences of Wireless LAN IEEE 802.1x Implementation; 1.2.3 Cyber Security Threats of Corporate Digital and IP-ATX (Private Automatic Telephone Exchanges); 1.2.4 Threats and Security Profile of the Mobile Operating System OS Sailfish and Tizen; 1.3 Cyber Security Threats Monitoring Necessity; 1.3.1 Cyber Security Incidents Factual Account; 1.3.2 Need for Joint Initiatives of Society and States; 1.3.3 Capture the Flag Competition on Vulnerability Detection 
505 8 |a 1.3.4 Security Operations Center (SOC) Key RoleChapter 2 -- MSSP/MDR National Operator Development; 2.1 Ultimate Opportunity of National MSSP/MDR Operators; 2.1.1 Relevance of MSSP/MDR Cyber Security Services; 2.1.2 MSSP/MDR Best Organization PracticeThe MSSP market dynamics in North Americ; 2.1.3 Sample of MSSP by AT 2.1.4 Sample of MSSP Model by UBIqube; 2.1.5 Feasible Technical Solutions; 2.2 Possible Ways of Providing Cyber Security Services; 2.2.1 Typical MSSR/MDR Services; 2.2.2 IS Sourcing Model Analysis; 2.2.3 The IS Sourcing Practice 
505 8 |a 2.2.4 Sample SLA Content for the Provision of Cyber Security Services2.2.5 Best Practices for Providing Cyber Security Service; 2.3 Development of National MSSP/MDR Based on Big Data; 2.3.1 Big Data Processing Requirements Analysis; 2.3.2 Best Big Data Processing Practice; 2.3.3 MSSP/MDR Subsystem Functionality for Big Data Processing; 2.3.4 Sensor Cloud Architecture Advantages; 2.4 New Methods of Cyber Security Knowledge Management; 2.4.1 Possible State of the Art; 2.4.2 Cyber Security MDM Principles; 2.4.3 MDM Cyber Security System Example 
505 8 |a Chapter 3 -- Innovative Methods for Detecting Anomalies3.1 Justification of a New Method for Detecting Anomalies; 3.1.1 Analysis of the Existing Approaches to the TCP/IP Network Abnormal Functioning Detection; 3.1.2 Possible Statement of the Detecting Anomalies' Problem; 3.1.3 Definition of New Informative Features; 3.1.4 Detection of Anomalies Based on Dimensions; 3.1.5 Investigation of Properties of Invariants of Dimension; 3.2 The Main Provisions of the New Method for Detecting Anomalies; 3.2.1 The Main Hypotheses for Detecting Anomalies; 3.2.2 Control of Semantic Correctness Criteria 
500 |a 3.2.3 Sufficient Condition for the Criteria Fulfillment 
520 |a Cyber Security Innovation for the Digital Economy considers possible solutions to the relatively new scientific-technical problem of developing innovative solutions in the field of cyber security for the Digital Economy. The solutions proposed are based on the results of exploratory studies conducted by the author in the areas of Big Data acquisition, cognitive information technologies (cogno-technologies), new methods of analytical verification of digital ecosystems on the basis of similarity invariants and dimensions, and "computational cognitivism," involving a number of existing models and methods. In practice, this successfully allowed the creation of new entities - the required safe and trusted digital ecosystems - on the basis of the development of digital and cyber security technologies, and the resulting changes in their behavioral preferences. Here, the ecosystem is understood as a certain system of organizations, created around a certain Technological Platform that use its services to make the best offers to customers and access to them to meet the ultimate needs of clients - legal entities and individuals. The basis of such ecosystems is a certain technological platform, created on advanced innovative developments, including the open interfaces and code, machine learning, cloud technologies, Big Data collection and processing, artificial intelligence technologies, etc. The mentioned Technological Platform allows creating the best offer for the client both from own goods and services and from the offers of external service providers in real time. This book contains four chapters devoted to the following subjects: * Relevance of the given scientific-technical problems in the cybersecurity of Digital Economy * Determination of the limiting capabilities * Possible scientific and technical solutions * Organization of perspective research studies in the area of Digital Economy cyber security in Russia 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer security  |z Russia (Federation)  |v Case studies. 
650 0 |a Electronic commerce  |x Data processing  |x Security measures  |z Russia (Federation)  |v Case studies. 
650 0 |a Business enterprises  |x Technological innovations  |x Security measures  |z Russia (Federation)  |v Case studies. 
650 6 |a Sécurité informatique  |z Russie  |v Études de cas. 
650 6 |a Commerce électronique  |z Russie  |x Informatique  |x Sécurité  |x Mesures  |v Études de cas. 
650 6 |a Entreprises  |x Innovations  |z Russie  |x Sécurité  |x Mesures  |v Études de cas. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
651 7 |a Russia (Federation)  |2 fast  |0 (OCoLC)fst01262050 
655 7 |a Case studies.  |2 fast  |0 (OCoLC)fst01423765 
776 0 8 |i Print version:  |a Petrenko, Sergei.  |t Cyber Security Innovation for the Digital Economy : A Case Study of the Russian Federation.  |d Aalborg : River Publishers, ©2018 
830 0 |a River Publishers series in security and digital forensics. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1982635  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH35692813 
938 |a EBSCOhost  |b EBSC  |n 1982635 
938 |a YBP Library Services  |b YANK  |n 18105779 
938 |a YBP Library Services  |b YANK  |n 15890386 
994 |a 92  |b IZTAP