Cyber Security: Analytics, Technology and Automation

advertisement

Cyber Security: Analytics, Technology and Automation

Cyber Security: Analytics, Technology and Automation
Cyber Security: Analytics, Technology and Automation

Introduction

    Cyber security is the application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks. It aims to reduce the risk of cyber attacks and protect against the unauthorized exploitation of systems, networks, and technologies.

Cyber Threats

Physical threats include:

• Natural disasters (e.g. earthquake, tsunami, volcanic eruption, flood).

• Environmental disasters (e.g. nuclear fallout, oil spill, toxic chemical

discharges).

• Widespread technical disruptions (especially those in ITC systems).

• Conventional warfare with kinetic weapon systems.

• Terrorist strikes with kinetic weapon systems, and

• Civil unrest (violence, sabotage).

Economic threats include:

• Deep national depression.

• Deep global depression.

• Disruption in national or global financing markets, and

• Sudden global shortage of goods and services.

    Threats in cyberspace can be classified in many ways. The threat landscape is a list of threats containing information about threat agents and attack vectors. By exploiting weaknesses/vulnerabilities, threats may lead to a loss or takeover of assets.

 Getting Started with Raspberry Pi

advertisement

Table of Contents

Part I Cyber World Today

  • Phenomena in the Cyber World 
  • Cyber World as a Social System 
  • Citizens in Cyber World—Despatches from the Virtual “Clinic”
  • Powers and Fundamental Rights in Cyber Security

Part II Cyber Security Threats, Legality and Strategy

  • Coder, Hacker, Soldier, Spy
  • Cyber Warfare 
  • Deception in the Cyber-World 
  • Legal Framework of Cyber Security
  • Finnish Cyber Security Strategy and Implementation

Part III Cyber Security Technology

  • Clustering-Based Protocol Classification
  • via Dimensionality Reduction 
  • Timing and Side Channel Attacks
  • Knowledge Discovery from Network Logs 
  • Trusted Computing and DRM 

Part IV Cyber Security and Automation

  • Cyber Security and Protection of ICS Systems:
  • An Australian Example 
  • Towards Dependable Automation
  • Specialized Honeypots for SCADA Systems
Download full PDF in Comment section

advertisement

1 Comments

Previous Post Next Post