Cyber Security: Analytics, Technology and Automation
Introduction
Cyber security is the application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks. It aims to reduce the risk of cyber attacks and protect against the unauthorized exploitation of systems, networks, and technologies.
Cyber Threats
Physical threats include:
• Natural disasters (e.g. earthquake, tsunami, volcanic eruption, flood).
• Environmental disasters (e.g. nuclear fallout, oil spill, toxic chemical
discharges).
• Widespread technical disruptions (especially those in ITC systems).
• Conventional warfare with kinetic weapon systems.
• Terrorist strikes with kinetic weapon systems, and
• Civil unrest (violence, sabotage).
Economic threats include:
• Deep national depression.
• Deep global depression.
• Disruption in national or global financing markets, and
• Sudden global shortage of goods and services.
Threats in cyberspace can be classified in many ways. The threat landscape is a list of threats containing information about threat agents and attack vectors. By exploiting weaknesses/vulnerabilities, threats may lead to a loss or takeover of assets.
Getting Started with Raspberry Pi
advertisement
Table of Contents
Part I Cyber World Today
- Phenomena in the Cyber World
- Cyber World as a Social System
- Citizens in Cyber World—Despatches from the Virtual “Clinic”
- Powers and Fundamental Rights in Cyber Security
Part II Cyber Security Threats, Legality and Strategy
- Coder, Hacker, Soldier, Spy
- Cyber Warfare
- Deception in the Cyber-World
- Legal Framework of Cyber Security
- Finnish Cyber Security Strategy and Implementation
Part III Cyber Security Technology
- Clustering-Based Protocol Classification
- via Dimensionality Reduction
- Timing and Side Channel Attacks
- Knowledge Discovery from Network Logs
- Trusted Computing and DRM
Part IV Cyber Security and Automation
- Cyber Security and Protection of ICS Systems:
- An Australian Example
- Towards Dependable Automation
- Specialized Honeypots for SCADA Systems
Cyber Security: Analytics, Technology and Automation
ReplyDelete