Browse Results

Showing 18,376 through 18,400 of 84,115 results

Cyber Criminology: Exploring Internet Crimes and Criminal Behavior

by K. Jaishankar

Victimization through the Internet is becoming more prevalent as cyber criminals have developed more effective ways to remain anonymous. And as more personal information than ever is stored on networked computers, even the occasional or non-user is at risk. A collection of contributions from worldwide experts and emerging researchers, Cyber Crimino

The Cyber Economy: Opportunities and Challenges for Artificial Intelligence in the Digital Workplace (Contributions to Economics)

by Elena G. Popkova Vladimir M. Filippov Alexander A. Chursin Julia V. Ragulina

The transition to Industry 4.0, and the subsequent ubiquitous digitalization and integration of artificial intelligence (AI) into the economic system, has set the stage for a fundamental change - one towards forming a cyber economy: a type of economy in which humans are economic subjects who interact with or are confronted with AI. This book examines these interactions and specifically analyzes the overall effects of digitalization on the workplace, and on the economic system of the future. Scholars from a diverse range of fields address both the challenges and opportunities of using AI in business sectors, as well as the role of people dealing with digital channels. In closing, the book discusses the need to, and options for, training and educating the labor force in the digital age.

Cyber Forensics: Examining Emerging and Hybrid Technologies

by Albert J. Marcella

Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to influence daily business decisions, the proactive use of cyber forensics to better assess the risks that the exploitation of these technologies pose to enterprise-wide operations is rapidly becoming a strategic business objective. This book moves beyond the typical, technical approach to discussing cyber forensics processes and procedures. Instead, the authors examine how cyber forensics can be applied to identifying, collecting, and examining evidential data from emerging and hybrid technologies, while taking steps to proactively manage the influence and impact, as well as the policy and governance aspects of these technologies and their effect on business operations. A world-class team of cyber forensics researchers, investigators, practitioners and law enforcement professionals have come together to provide the reader with insights and recommendations into the proactive application of cyber forensic methodologies and procedures to both protect data and to identify digital evidence related to the misuse of these data. This book is an essential guide for both the technical and non-technical executive, manager, attorney, auditor, and general practitioner who is seeking an authoritative source on how cyber forensics may be applied to both evidential data collection and to proactively managing today’s and tomorrow’s emerging and hybrid technologies. The book will also serve as a primary or supplemental text in both under- and post-graduate academic programs addressing information, operational and emerging technologies, cyber forensics, networks, cloud computing and cybersecurity.

Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition

by Albert Marcella Jr. Doug Menendez

Updating and expanding information on concealment techniques, new technologies, hardware, software, and relevant new legislation, this second edition details scope of cyber forensics to reveal and track legal and illegal activity. Designed as an introduction and overview to the field, the authors guide you step-by-step through the basics of investigation and introduce the tools and procedures required to legally seize and forensically evaluate a suspect machine. The book covers rules of evidence, chain of custody, standard operating procedures, and the manipulation of technology to conceal illegal activities and how cyber forensics can uncover them.

Cyber Fraud: Tactics, Techniques and Procedures

by Rick Howard

With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. Arguably one of the most important challenges of the 21st century, with millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. This volume explores the state of threats present in the cyber fraud underground. It discusses phishing/pharming, trojans/toolkits, direct threats, and pump-and-dump scams. By examining the operations of the cyber criminal, the book provides perspective into the general incentives, risks, and behavioral patterns of the fraudsters. Armed with this information, organizations and individuals are better able to develop countermeasures and crafting tactics to disrupt the fraud underground and secure their systems.

Cyber Infrastructure for the Smart Electric Grid (IEEE Press)

by Anurag K. Srivastava Venkatesh Venkataramanan Carl Hauser

Explore a thorough treatment of the foundations of smart grid sensing, communication, computation, and control As electric power systems undergo a transformative upgrade with the integration of advanced technologies to enable the smarter electric grid, professionals who work in the area require a new understanding of the evolving complexity of the grid. Cyber Infrastructure for the Smart Electric Grid delivers a comprehensive overview of the fundamental principles of smart grid operation and control, smart grid technologies, including sensors, communication networks, computation, data management, and cyber security, and the interdependencies between the component technologies on which a smart grid’s security depends. The book offers readers the opportunity to critically analyze the smart grid infrastructure needed to sense, communicate, compute, and control in a secure way. Readers of the book will be able to apply the interdisciplinary principles they’ve learned in the book to design and build secure smart grid infrastructure. Readers will also benefit from the inclusion of: A thorough introduction to the key skills required by engineers to manage the evolving complexity of the electric grid An exploration of the interdependencies of smart grid infrastructure required to sense, communicate, compute, control, and manage data securely Software modules in .exe format for demonstrations and exercises An examination of the fundamental principles of smart grid operation and control Perfect for professionals working in the electric utility industries at electric utilities, vendors, and the national labs, Cyber Infrastructure for the Smart Electric Grid will also earn a place in the libraries of senior undergraduate and graduate students studying electrical engineering and smart grids.

Cyber Investigations

by André Årnes

CYBER INVESTIGATIONS A classroom tested introduction to cyber investigations with real-life examples included Cyber Investigations provides an introduction to the topic, an overview of the investigation process applied to cyber investigations, a review of legal aspects of cyber investigations, a review of Internet forensics and open-source intelligence, a research-based chapter on anonymization, and a deep-dive in to multimedia forensics. The content is structured in a consistent manner, with an emphasis on accessibility for students of computer science, information security, law enforcement, and military disciplines. To aid in reader comprehension and seamless assimilation of the material, real-life examples and student exercises are provided throughout, as well as an Educational Guide for both teachers and students. The material has been classroom-tested and is a perfect fit for most learning environments. Written by a highly experienced author team with backgrounds in law enforcement, academic research, and industry, sample topics covered in Cyber Investigations include: The cyber investigation process, including developing an integrated framework for cyber investigations and principles for the integrated cyber investigation process (ICIP) Cyber investigation law, including reasonable grounds to open a criminal cyber investigation and general conditions for privacy-invasive cyber investigation methods Perspectives of internet and cryptocurrency investigations, including examples like the proxy seller, the scammer, and the disgruntled employee Internet of things (IoT) investigations, including types of events leading to IoT investigations and new forensic challenges in the field Multimedia forensics facilitates the understanding of the role of multimedia in investigations, including how to leverage similarity matching, content-based tracing, and media metadata. Anonymization networks discusses how such networks work, and how they impact investigations? It addresses aspects of tracing, monitoring, evidence acquisition, de-anonymization, and large investigations Based on research, teaching material, experiences, and student feedback over several years, Cyber Investigations is ideal for all students and professionals in the cybersecurity industry, providing comprehensive subject coverage from faculty, associates, and former students of cyber security and digital forensics at the Norwegian University of Science and Technology (NTNU).

Cyber Law and Ethics: Regulation of the Connected World

by Mark Grabowski Eric P. Robinson

A primer on legal issues relating to cyberspace, this textbook introduces business, policy and ethical considerations raised by our use of information technology. With a focus on the most significant issues impacting internet users and businesses in the United States of America, the book provides coverage of key topics such as social media, online privacy, artificial intelligence and cybercrime as well as emerging themes such as doxing, ransomware, revenge porn, data-mining, e-sports and fake news. The authors, experienced in journalism, technology and legal practice, provide readers with expert insights into the nuts and bolts of cyber law. Cyber Law and Ethics: Regulation of the Connected World provides a practical presentation of legal principles, and is essential reading for non-specialist students dealing with the intersection of the internet and the law.

Cyber Physical Energy Systems

by Shrddha Sagar T. Poongodi Rajesh Kumar Dhanaraj Sanjeevikumar Padmanaban

This book is essential for understanding the transformative integration of cyber-physical systems in smart grids, providing valuable insights that will shape the future of sustainable energy production and distribution. A novel modeling methodology that blends cyber and physical components is a significant advancement for future energy systems. A Cyber-Physical System (CPS) is an integrated component of physical microgrids that combines computers, wireless connections, and controls to create a holistic solution. As a result of cyber-physical systems, a new generation of engineering systems incorporating wireless communication has begun to emerge. Despite that there are various major CPS systems in use today, one of the most challenging sectors for implementation is the smart grid which aims to distribute dependable and efficient electric energy while maintaining a high level of global environmental sustainability. Smart grids incorporate advanced monitoring to ensure a secure, efficient energy supply, enhancing generator and distributor performance while offering consumers more choices. These systems aim to boost the capacity and responsiveness of energy production, transmission, distribution, and consumption. As renewable energy sources grow, traditional methods are being challenged, requiring cross-domain integration of energy systems and data. This book explores architectures and methods for integrating cutting-edge technology into the power grid for more sustainable energy production and distribution.

Cyber-Physical Laboratories in Engineering and Science Education

by Michael E. Auer Arthur Edwards Ton De Jong Abul K.M. Azad

This volume investigates a number of issues needed to develop a modular, effective, versatile, cost effective, pedagogically-embedded, user-friendly, and sustainable online laboratory system that can deliver its true potential in the national and global arenas. This allows individual researchers to develop their own modular systems with a level of creativity and innovation while at the same time ensuring continuing growth by separating the responsibility for creating online laboratories from the responsibility for overseeing the students who use them. The volume first introduces the reader to several system architectures that have proven successful in many online laboratory settings. The following chapters then describe real-life experiences in the area of online laboratories from both technological and educational points of view. The volume further collects experiences and evidence on the effective use of online labs in the context of a diversity of pedagogical issues. It also illustrates successful online laboratories to highlight best practices as case studies and describes the technological design strategies, implementation details, and classroom activities as well as learning from these developments. Finally the volume describes the creation and deployment of commercial products, tools and services for online laboratory development. It also provides an idea about the developments that are on the horizon to support this area.

Cyber-Physical Systems: Solutions to Pandemic Challenges

by Tushar Semwal

A Cyber-Physical System (CPS) is an integration of cyber components with their physical counterparts. A cyber unit could be either a software or hardware. Physical components are those objects, which are governed by the law of physics. CPS have transformed how we interact with the physical world, ranging from sensing the environmental parameters to controlling a complex manufacturing industry. The current pandemic has had catastrophic implications people all across the world in terms of health and economy. This book presents the significance and practicality of CPS in a pandemic situation. It provides a strong foundation to the CPS while also incorporating the latest theoretical advances and practical applications to alleviate the state of a pandemic. The book covers… Theoretical background and application-oriented overview of the different CPS models Impact of COVID-19 and similar pandemics on the engineering aspects of various industries and organisations Exciting and impactful CPS based solutions to the different pandemic situations Security and privacy in CPS when applied to critical and sensitive pandemic affected environment Describes the government-funded projects and work using CPS in real-world scenarios The book provides a unique and fresh exposure to CPS employed in a pandemic situation. It brings together researchers, practitioners, academics, experts, and industry professionals from around the world to share their knowledge and experience.

Cyber-Physical Systems and Control (Lecture Notes in Networks and Systems #95)

by Dmitry G. Arseniev Ludger Overmeyer Heikki Kälviäinen Branko Katalinić

This book presents the proceedings of the International Conference on Cyber-Physical Systems and Control (CPS&C'2019), held in Peter the Great St. Petersburg Polytechnic University, which is celebrating its 120th anniversary in 2019. The CPS&C'2019 was dedicated to the 35th anniversary of the partnership between Peter the Great St. Petersburg Polytechnic University and Leibniz University of Hannover. Cyber-physical systems (CPSs) are a new generation of control systems and techniques that help promote prospective interdisciplinary research. A wide range of theories and methodologies are currently being investigated and developed in this area to tackle various complex and challenging problems. Accordingly, CPSs represent a scientific and engineering discipline that is set to make an impact on future systems of industrial and social scale that are characterized by the deep integration of real-time processing, sensing, and actuation into logical and physical heterogeneous domains. The CPS&C'2019 brought together researchers and practitioners from all over the world and to discuss cross-cutting fundamental scientific and engineering principles that underline the integration of cyber and physical elements across all application fields. The participants represented research institutions and universities from Austria, Belgium, Bulgaria, China, Finland, Germany, the Netherlands, Russia, Syria, Ukraine, the USA, and Vietnam. These proceedings include 75 papers arranged into five sections, namely keynote papers, fundamentals, applications, technologies, and education and social aspects.

Cyber-Physical Systems and Control II (Lecture Notes in Networks and Systems #460)

by Dmitry G. Arseniev Nabil Aouf

The book contains selected research papers presented at the 2nd International Conference on Cyber-Physical Systems and Control (CPS&C’2021) which was held from 29 June to 2 July 2021 in St. Petersburg, Russia. The CPS&C’2021 Conference continues the series of international conferences that began in 2019 when the first International Conference on Cyber-Physical Systems and Control (CPS&C’2019) took place. Cyber-physical systems (CPSs) considered a modern and rapidly emerging generation of systems with integrated wide computational, information processing, and physical capabilities that can interact with humans through many new modalities and application areas of implementation. The book covers the latest advances, developments and achievements in new theories, algorithms, models, and applications of prospective problems associated with CPSs with an emphasis on control theory and related areas. The multidisciplinary fundamental scientific and engineering principles that underpin the integration of cyber and physical elements across all application areas are discussed in the book chapters. The materials of the book may be of interest to scientists and engineers working in the field of cyber-physical systems, systems analysis, control systems, computer technologies, and similar fields.

Cyber-Physical Systems in the Construction Sector

by Wesam Salah Alaloul

Cyber-Physical Systems (CPSs) are mechanisms for monitoring and controlling processes using computer-based algorithms. In the construction industry, CPSs help to increase the viability of construction projects by reducing costs, time and management effort. This book aims to develop the fundamental concepts of construction project management associated with the CPSs and their applications within the modern construction industry in alignment with the scope of the Fourth Industrial Revolution (IR4.0). The book has been structured in a systematic way for easy understanding by construction industry researchers and academic faculty. The first part of the book helps readers to develop a basic understanding of the fundamental concepts of construction project management and CPSs. Followed by the second part about the CPSs implementation framework and understanding the operational concepts associated with the notion of IoT and Digital Twins within the construction industry. The third part of the book describes modelling/simulation techniques to develop the customised CPSs for construction project management. The concluding part provides an in-depth review of applications of CPSs, associated threats and security.

Cyber-physische Produktionssysteme für die energieeffiziente Komponentenproduktion (AutoUni – Schriftenreihe #152)

by Ingo Labbus

Die vorliegende Dissertation präsentiert ein Konzept für den Einsatz cyber-physischer Produktionssysteme zur Steigerung der Energieeffizienz in der Komponentenproduktion. Das entwickelte Konzept integriert dafür Ansätze zu Datenmodellierung, -aufbereitung, und -analyse sowie Werkzeuge zur Planung energieeffizienter Produktionen. Dieses ermöglicht die Herstellung der Datendurchgängigkeit zwischen Planung und Betrieb der Produktion, erhöht die Transparenz über aktuelle Energiebedarfe sowie Einsparpotenziale und erleichtert so die Planung energieeffizienter Produktionen. Die Entwicklung und Anwendung des Konzeptes erfolgt am Beispiel der Fertigung von Komponenten für die Automobilproduktion.

Cyber Resilience (River Publishers Series In Security And Digital Forensics Ser.)

by Sergei Petrenko

Modern cyber systems acquire more emergent system properties, as far as their complexity increases: cyber resilience, controllability, self-organization, proactive cyber security and adaptability. Each of the listed properties is the subject of the cybernetics research and each subsequent feature makes sense only if there is a previous one.Cyber resilience is the most important feature of any cyber system, especially during the transition to the sixth technological stage and related Industry 4.0 technologies: Artificial Intelligence (AI), Cloud and foggy computing, 5G +, IoT/IIoT, Big Data and ETL, Q-computing, Blockchain, VR/AR, etc. We should even consider the cyber resilience as a primary one, because the mentioned systems cannot exist without it. Indeed, without the sustainable formation made of the interconnected components of the critical information infrastructure, it does not make sense to discuss the existence of 4.0 Industry cyber-systems. In case when the cyber security of these systems is mainly focused on the assessment of the incidents' probability and prevention of possible security threats, the cyber resilience is mainly aimed at preserving the targeted behavior and cyber systems' performance under the conditions of known (about 45 %) as well as unknown (the remaining 55 %) cyber attacks.This monograph shows that modern Industry 4.0. Cyber systems do not have the required cyber resilience for targeted performance under heterogeneous mass intruder cyber-attacks. The main reasons include a high cyber system structural and functional complexity, a potential danger of existing vulnerabilities and “sleep” hardware and software tabs, as well as an inadequate efficiency of modern models, methods, and tools to ensure cyber security, reliability, response and recovery.

Cyber Resilience Fundamentals (Studies in Systems, Decision and Control #520)

by Simon Tjoa Melisa Gafić Peter Kieseberg

This book provides readers with the necessary capabilities to meet the challenge of building and testing resilient IT services. Upon introducing the fundamentals of cyber resilience with important international standards and best practices, and the risk management process, the book covers in detail the cyber resilience management process. Here, it gives insights into the principles and design criteria to build cyber resilience in organizations, and to integrate it into operations to contribute to incident preparedness. Further, it describes measures for incident handling, including detection, containment, and post-incident handling, and analyses the most critical aspects of cyber resilience testing, such as auditing, exercising, and testing. Written for advanced undergraduate students attending information security and business continuity management courses, this book also addresses researchers and professionals in the broad field of IT Security and cyber resilience.

Cyber Security: Ein Einblick für Wirtschaftswissenschaftler (essentials)

by Sebastian Klipper

In diesem Buch erfahren Wirtschaftswissenschaftler, wie Firmen nach Hackerangriffen vom Markt verschwinden und wie Hacker Aktienkurse beeinflussen können. Lernen Sie, wie Homo oeconomicus beim Thema Cyber Security zum Homo carens securitate wird und wie es gelingt, mithilfe der wirtschaftswissenschaftlichen ,,Brille" (oder: Perspektive/Sicht) ganz neue Lösungsansätze und Sichtweisen im Kampf gegen Wirtschaftsspione, Hacker und Cyber-Kriminelle zu erkennen. Cyber Security bzw. IT-Sicherheit ist ein Zukunftsthema, an dem kaum jemand vorbeikommt. Dieses Buch beschreibt anhand aktueller Vorfälle - ohne technisches Grundwissen vorauszusetzen -, was Ökonomen wissen müssen, um sich am Gespräch über eines der wichtigsten Zukunftsthemen unserer Zeit beteiligen zu können.

Cyber Security: 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16–17, 2022, Revised Selected Papers (Communications in Computer and Information Science #1699)

by Wei Lu Yuqing Zhang Weiping Wen Hanbing Yan Chao Li

This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: ​​data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition.

Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021 (Lecture Notes on Data Engineering and Communications Technologies #73)

by Kavita Khanna Vania Vieira Estrela Joel José Puga Coelho Rodrigues

This book features high-quality research papers presented at the International Conference on Applications and Techniques in Cyber Security and Digital Forensics (ICCSDF 2021), held at The NorthCap University, Gurugram, Haryana, India, during April 3–4, 2021. This book discusses the topics ranging from information security to cryptography, mobile application attacks to digital forensics, and from cyber security to blockchain. The goal of the book is to provide 360-degree view of cybersecurity to the readers which include cyber security issues, threats, vulnerabilities, novel idea, latest technique and technology, and mitigation of threats and attacks along with demonstration of practical applications. This book also highlights the latest development, challenges, methodologies as well as other emerging areas in this field. It brings current understanding of common Web vulnerabilities while maintaining awareness and knowledge of contemporary standards, practices, procedures, and methods of Open Web Application Security Project. It also expounds how to recover information after a cybercrime.

Cyber Security and Digital Forensics: Select Proceedings of the International Conference, ReDCySec 2023 (Lecture Notes in Networks and Systems #896)

by Nihar Ranjan Roy Sudeep Tanwar Usha Batra

The book contains peer-reviewed papers from the International Conference on Recent Developments in Cyber Security organized by the Center for Cyber Security and Cryptology at Sharda University in June 2023. This volume focuses on privacy and secrecy of information, cryptography, applications and analysis, cyber threat intelligence and mitigation, cyber-physical systems, cyber threat intelligence, quantum cryptography and blockchain technologies and their application, etc. This book is a unique collection of chapters from different areas with a common theme and will be immensely useful to academic researchers and practitioners in the industry.

Cyber Security Cryptography and Machine Learning: Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings (Lecture Notes in Computer Science #11527)

by Shlomi Dolev Danny Hendler Sachin Lodha Moti Yung

This book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019, held in Beer-Sheva, Israel, in June 2019.The 18 full and 10 short papers presented in this volume were carefully reviewed and selected from 36 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.

Cyber Security in India: Education, Research and Training (IITK Directions #4)

by Sandeep Kumar Shukla Manindra Agrawal

This book of 'directions' focuses on cyber security research, education and training in India, and work in this domain within the Indian Institute of Technology Kanpur. IIT Kanpur's Computer Science and Engineering Department established an ‘Interdisciplinary Center for Cyber Security and Cyber Defense of Critical Infrastructures (C3I Center)’ in 2016 with funding from the Science and Engineering Research Board (SERB), and other funding agencies. The work at the center focuses on smart grid security, manufacturing and other industrial control system security; network, web and data security; cryptography, and penetration techniques. The founders are involved with various Indian government agencies including the Reserve Bank of India, National Critical Information Infrastructure Protection Center, UIDAI, CCTNS under home ministry, Ministry of IT and Electronics, and Department of Science & Technology. The center also testifies to the parliamentary standing committee on cyber security, and has been working with the National Cyber Security Coordinator's office in India. Providing glimpses of the work done at IIT Kanpur, and including perspectives from other Indian institutes where work on cyber security is starting to take shape, the book is a valuable resource for researchers and professionals, as well as educationists and policymakers.

Cyber Security Innovation for the Digital Economy: A Case Study of the Russian Federation (River Publishers Series In Security And Digital Forensics Ser.)

by Sergei Petrenko

Cyber Security Innovation for the Digital Economy considers possible solutions to the relatively new scientific-technical problem of developing innovative solutions in the field of cyber security for the Digital Economy. The solutions proposed are based on the results of exploratory studies conducted by the author in the areas of Big Data acquisition, cognitive information technologies (cogno-technologies), new methods of analytical verification of digital ecosystems on the basis of similarity invariants and dimensions, and “computational cognitivism,” involving a number of existing models and methods.In practice, this successfully allowed the creation of new entities - the required safe and trusted digital ecosystems - on the basis of the development of digital and cyber security technologies, and the resulting changes in their behavioral preferences. Here, the ecosystem is understood as a certain system of organizations, created around a certain Technological Platform that use its services to make the best offers to customers and access to them to meet the ultimate needs of clients - legal entities and individuals. The basis of such ecosystems is a certain technological platform, created on advanced innovative developments, including the open interfaces and code, machine learning, cloud technologies, Big Data collection and processing, artificial intelligence technologies, etc. The mentioned Technological Platform allows creating the best offer for the client both from own goods and services and from the offers of external service providers in real time.This book contains four chapters devoted to the following subjects:- Relevance of the given scientific-technical problems in the cybersecurity of Digital Economy- Determination of the limiting capabilities- Possible scientific and technical solutions- Organization of perspective research studies in the area of Digital Economy cyber security in Russia.

Cyber Situational Awareness in Public-Private-Partnerships: Organisationsübergreifende Cyber-Sicherheitsvorfälle effektiv bewältigen

by Florian Skopik Tímea Páhi Maria Leitner

Digitale Dienste werden für unsere Gesellschaft immer wichtiger, daher gelangen sie auch stärker ins Visier von Wirtschaftskriminellen, Spionen, Terroristen oder staatsfeindlichen Gruppierungen. Wie schützen sich Unternehmen und Staaten vor solchen Cyber-Attacken? Ein wichtiger Grundstein ist die Schaffung von Behörden, wie sie die EU-Richtlinie über Maßnahmen zur Gewährleistung eines hohen gemeinsamen Sicherheitsniveaus von Netz- und Informationssystemen (NIS) vorsieht. Das Buch zeigt, wie sich die Zusammenarbeit von Unternehmen mit diesen NIS-Behörden gestaltet mit dem gemeinsamen Ziel, Cyber-Sicherheit zu etablieren und zu gewährleisten. Darüber hinaus legen die Autoren dar, wie sich die NIS-Richtlinie und die im Mai 2018 in Kraft getretene EU-Datenschutz-Grundverordnung (DSGVO) auf Security-Prozesse in Unternehmen auswirken können. Das Buch verknüpft technische, organisatorische und rechtliche Aspekte der Zusammenarbeit und spiegelt damit die Komplexität des Themas wider. Zugleich liefert es zahlreiche Vorschläge zur Umsetzung der EU-Richtlinie. Im Mittelpunkt steht dabei das Konzept der „Cyber Situational Awareness“ – das bewusste Erfassen der aktuellen Lage – und damit ein Instrument, mit dem sich die Reaktionsfähigkeit bei Cyber-Angriffen wesentlich erhöhen lässt. Folgende Themen werden erläutert: • Aufbau und Nutzung von Cyber Situational Awareness • Erstellung von Cyber-Lagebildern auf nationaler Ebene • Informations- und Datenquellen für Cyber-Lagebilder• Informationsaustausch zwischen Cyber-Lagezentren und Stakeholdern • Informations- und Meldepflichten von Unternehmen• Planspiel zur Bildung und Evaluierung von Cyber Situational Awareness

Refine Search

Showing 18,376 through 18,400 of 84,115 results