Buch, Englisch, 226 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 499 g
Buch, Englisch, 226 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 499 g
ISBN: 978-0-367-62617-4
Verlag: CRC Press
The threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing attack surface with a diversity of attack vectors, a clear asymmetry between attackers and defenders, billions of connected IoT devices, mostly reactive detection and mitigation approaches, and finally big data challenges. The clear asymmetry of attacks and the enormous amount of data are additional arguments to make it necessary to rethink cybersecurity approaches in terms of reducing the attack surface, to make the attack surface dynamic, to automate the detection, risk assessment, and mitigation, and to investigate the prediction and prevention of attacks with the utilization of emerging technologies like blockchain, artificial intelligence and machine learning.
This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. The issues that are discussed and analyzed include smart connected cars, unmanned ships, 5G/6G connectivity, blockchain, agile incident response, hardware assisted security, ransomware attacks, hybrid threats and cyber skills gap. Both theoretical analysis and experimental evaluation of state-of-the-art techniques are presented and discussed. Prospective readers can be benefitted in understanding the future implications of novel technologies and proposed security solutions and techniques. Graduate and postgraduate students, research scholars, academics, cybersecurity professionals, and business leaders will find this book useful, which is planned to enlighten both beginners and experienced readers.
Zielgruppe
Academic, Postgraduate, Professional, and Undergraduate Advanced
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Software Engineering
- Sozialwissenschaften Politikwissenschaft Regierungspolitik Innen-, Bildungs- und Bevölkerungspolitik
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Schadprogramme (Viren, Trojaner etc.)
- Mathematik | Informatik EDV | Informatik Digital Lifestyle Internet, E-Mail, Social Media
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz
- Wirtschaftswissenschaften Finanzsektor & Finanzdienstleistungen Finanzsektor & Finanzdienstleistungen: Allgemeines
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Wirtschaftswissenschaften Betriebswirtschaft Management Risikomanagement
Weitere Infos & Material
1. The Evolution of Hardware-Assisted Security
2. Cybersecurity of the Unmanned Ship
3. Agile Incident Response in Industrial Control
4. Multi-Stage Threat Modeling and Security
5. Blockchain Technology for 6G Communication Networks
6. Securing Components on a 5G Core
7. RF Jamming Attacks and Countermeasures in Wireless Vehicular Networks
8. Smart Cars and Over-the-Air Updates
9. Emerging Malware Threats: The Case of Ransomware
10. Holistic Immunization: A Comprehensive Model to Tackle Hybrid Threats in the Cyber Domain
11. The Cyber Skills Gap