Buch, Englisch, 392 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 549 g
Buch, Englisch, 392 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 549 g
ISBN: 978-0-367-74587-5
Verlag: CRC Press
Cyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security. It covers the methodologies for modeling attack strategies used by threat actors targeting devices, systems, and networks such as smart homes, critical infrastructures, and industrial IoT.
With a comprehensive review of the threat landscape, the book explores both common and sophisticated threats to systems and networks. Tools and methodologies are presented for precise modeling of attack strategies, which can be used both proactively in risk management and reactively in intrusion prevention and response systems. Several contemporary techniques are offered ranging from reconnaissance and penetration testing to malware detection, analysis, and mitigation. Advanced machine learning-based approaches are also included in the area of anomaly-based detection, that are capable of detecting attacks relying on zero-day vulnerabilities and exploits.
Academics, researchers, and professionals in cyber-security who want an in-depth look at the contemporary aspects of the field will find this book of interest. Those wanting a unique reference for various cyber-security threats and how they are detected, analyzed, and mitigated will reach for this book often.
Zielgruppe
Professional, Professional Practice & Development, and Undergraduate Advanced
Autoren/Hrsg.
Fachgebiete
- Technische Wissenschaften Maschinenbau | Werkstoffkunde Produktionstechnik Fertigungstechnik
- Technische Wissenschaften Technik Allgemein Industrial Engineering
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Kybernetik, Systemtheorie, Komplexe Systeme
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Rechtswissenschaften Strafrecht Rechtsmedizin, Forensik
Weitere Infos & Material
1. Cyber–attackers’ profiling. 2. Reconnaissance. 3. System threats. 4. Cryptography threats. 5. Network threats. 6. Malware detection and mitigation. 7. Dynamic risk management. 8. Attack graph generation. 9. Intelligent intrusion response.