Browse Results

Showing 14,476 through 14,500 of 64,913 results

Cyber-security of SCADA and Other Industrial Control Systems (Advances in Information Security #66)

by Alexander Kott Edward J. M. Colbert

This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats? This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.

Cyber Security, Privacy and Networking: Proceedings of ICSPN 2021 (Lecture Notes in Networks and Systems #370)

by Dharma P. Agrawal Nadia Nedjah B. B. Gupta Gregorio Martinez Perez

This book covers selected high-quality research papers presented in the International Conference on Cyber Security, Privacy and Networking (ICSPN 2021), organized during 17-19 September 2021 in India in Online mode. The objectives of ICSPN 2021 is to provide a premier international platform for deliberations on strategies, recent trends, innovative approaches, discussions and presentations on the most recent cyber security, privacy and networking challenges and developments from the perspective of providing security awareness and its best practices for the real world. Moreover, the motivation to organize this conference is to promote research by sharing innovative ideas among all levels of the scientific community, and to provide opportunities to develop creative solutions to various security, privacy and networking problems.

Cyber-Security Threats, Actors, and Dynamic Mitigation

by Nicholas Kolokotronis Stavros Shiaeles

Cyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security. It covers the methodologies for modeling attack strategies used by threat actors targeting devices, systems, and networks such as smart homes, critical infrastructures, and industrial IoT. With a comprehensive review of the threat landscape, the book explores both common and sophisticated threats to systems and networks. Tools and methodologies are presented for precise modeling of attack strategies, which can be used both proactively in risk management and reactively in intrusion prevention and response systems. Several contemporary techniques are offered ranging from reconnaissance and penetration testing to malware detection, analysis, and mitigation. Advanced machine learning-based approaches are also included in the area of anomaly-based detection, that are capable of detecting attacks relying on zero-day vulnerabilities and exploits. Academics, researchers, and professionals in cyber-security who want an in-depth look at the contemporary aspects of the field will find this book of interest. Those wanting a unique reference for various cyber-security threats and how they are detected, analyzed, and mitigated will reach for this book often.

Cyber-Security Threats and Response Models in Nuclear Power Plants (SpringerBriefs in Computer Science)

by Carol Smidts Indrajit Ray Quanyan Zhu Pavan Kumar Vaddi Yunfei Zhao Linan Huang Xiaoxu Diao Rakibul Talukdar Michael C. Pietrykowski

This SpringerBrief presents a brief introduction to probabilistic risk assessment (PRA), followed by a discussion of abnormal event detection techniques in industrial control systems (ICS). It also provides an introduction to the use of game theory for the development of cyber-attack response models and a discussion on the experimental testbeds used for ICS cyber security research. The probabilistic risk assessment framework used by the nuclear industry provides a valid framework to understand the impacts of cyber-attacks in the physical world. An introduction to the PRA techniques such as fault trees, and event trees is provided along with a discussion on different levels of PRA and the application of PRA techniques in the context of cybersecurity. A discussion on machine learning based fault detection and diagnosis (FDD) methods and cyber-attack detection methods for industrial control systems are introduced in this book as well.A dynamic Bayesian networks based method that can be used to detect an abnormal event and classify it as either a component fault induced safety event or a cyber-attack is discussed. An introduction to the stochastic game formulation of the attacker-defender interaction in the context of cyber-attacks on industrial control systems to compute optimal response strategies is presented. Besides supporting cyber-attack response, the analysis based on the game model also supports the behavioral study of the defender and the attacker during a cyber-attack, and the results can then be used to analyze the risk to the system caused by a cyber-attack. A brief review of the current state of experimental testbeds used in ICS cybersecurity research and a comparison of the structures of various testbeds and the attack scenarios supported by those testbeds is included. A description of a testbed for nuclear power applications, followed by a discussion on the design of experiments that can be carried out on the testbed and the associated results is covered as well.This SpringerBrief is a useful resource tool for researchers working in the areas of cyber security for industrial control systems, energy systems and cyber physical systems. Advanced-level students that study these topics will also find this SpringerBrief useful as a study guide.

Cyber Security Using Modern Technologies: Artificial Intelligence, Blockchain and Quantum Cryptography

by Om Pal Vinod Kumar Rijwan Khan Bashir Alam Mansaf Alam

The main objective of this book is to introduce cyber security using modern technologies such as Artificial Intelligence, Quantum Cryptography, and Blockchain. This book provides in-depth coverage of important concepts related to cyber security. Beginning with an introduction to Quantum Computing, Post-Quantum Digital Signatures, and Artificial Intelligence for cyber security of modern networks and covering various cyber-attacks and the defense measures, strategies, and techniques that need to be followed to combat them, this book goes on to explore several crucial topics, such as security of advanced metering infrastructure in smart grids, key management protocols, network forensics, intrusion detection using machine learning, cloud computing security risk assessment models and frameworks, cyber-physical energy systems security, a biometric random key generator using deep neural network and encrypted network traffic classification. In addition, this book provides new techniques to handle modern threats with more intelligence. It also includes some modern techniques for cyber security, such as blockchain for modern security, quantum cryptography, and forensic tools. Also, it provides a comprehensive survey of cutting-edge research on the cyber security of modern networks, giving the reader a general overview of the field. It also provides interdisciplinary solutions to protect modern networks from any type of attack or manipulation. The new protocols discussed in this book thoroughly examine the constraints of networks, including computation, communication, and storage cost constraints, and verifies the protocols both theoretically and experimentally. Written in a clear and comprehensive manner, this book would prove extremely helpful to readers. This unique and comprehensive solution for the cyber security of modern networks will greatly benefit researchers, graduate students, and engineers in the fields of cryptography and network security.

Cyber Situational Awareness in Public-Private-Partnerships: Organisationsübergreifende Cyber-Sicherheitsvorfälle effektiv bewältigen

by Florian Skopik Tímea Páhi Maria Leitner

Digitale Dienste werden für unsere Gesellschaft immer wichtiger, daher gelangen sie auch stärker ins Visier von Wirtschaftskriminellen, Spionen, Terroristen oder staatsfeindlichen Gruppierungen. Wie schützen sich Unternehmen und Staaten vor solchen Cyber-Attacken? Ein wichtiger Grundstein ist die Schaffung von Behörden, wie sie die EU-Richtlinie über Maßnahmen zur Gewährleistung eines hohen gemeinsamen Sicherheitsniveaus von Netz- und Informationssystemen (NIS) vorsieht. Das Buch zeigt, wie sich die Zusammenarbeit von Unternehmen mit diesen NIS-Behörden gestaltet mit dem gemeinsamen Ziel, Cyber-Sicherheit zu etablieren und zu gewährleisten. Darüber hinaus legen die Autoren dar, wie sich die NIS-Richtlinie und die im Mai 2018 in Kraft getretene EU-Datenschutz-Grundverordnung (DSGVO) auf Security-Prozesse in Unternehmen auswirken können. Das Buch verknüpft technische, organisatorische und rechtliche Aspekte der Zusammenarbeit und spiegelt damit die Komplexität des Themas wider. Zugleich liefert es zahlreiche Vorschläge zur Umsetzung der EU-Richtlinie. Im Mittelpunkt steht dabei das Konzept der „Cyber Situational Awareness“ – das bewusste Erfassen der aktuellen Lage – und damit ein Instrument, mit dem sich die Reaktionsfähigkeit bei Cyber-Angriffen wesentlich erhöhen lässt. Folgende Themen werden erläutert: • Aufbau und Nutzung von Cyber Situational Awareness • Erstellung von Cyber-Lagebildern auf nationaler Ebene • Informations- und Datenquellen für Cyber-Lagebilder• Informationsaustausch zwischen Cyber-Lagezentren und Stakeholdern • Informations- und Meldepflichten von Unternehmen• Planspiel zur Bildung und Evaluierung von Cyber Situational Awareness

Cyber Space and Outer Space Security (River Publishers Series in Digital Security and Forensics)

by Karthikeyan Periyasami Polinpapilinho F. Katina Rajagopal Ramasamy

This book delves into cutting-edge research in cyberspace and outer space security, encompassing both theoretical and experimental aspects. It provides mitigation measures and strategies to address the identified challenges within. It covers a spectrum of topics including techniques and strategies for enhancing cyberspace security, combating ransomware attacks, and securing autonomous vehicles. Additionally, it explores security and surveillance systems involving autonomous vehicles, resilience schemes against security attacks using blockchain for autonomous vehicles, security analysis of autonomous drones (UAVs), the cybersecurity kill chain, the internet of drones (IoD), and cyberspace solutions to counteract attacks. The discussion extends to mitigation strategies against weaponized AI in cyber-attacks, countermeasures for both autonomous vehicles and cyberspace attacks, as well as the limitations and future prospects of artificial intelligence (AI) and data defense in aerospace cybersecurity.A network comprising nodes can establish both cyberspace and outer space platforms for data exchange. Cyberspace finds diverse applications, including commercial endeavors and military defense. The integration of autonomous vehicles, unmanned aircraft systems (UAS), and drones into outer space environments is facilitated through their connection to cyberspace. One illustrative example involves the utilization of blockchain-based secure drone systems for product delivery, leveraging the combined capabilities of cyberspace and outer space security technologies. This book elucidates the intricate dynamics between cyber operations and the expanding realm of autonomous outer cyberspace, presenting new security challenges arising from heightened complexity and emerging vulnerabilities.

Cyber Technologies and Emerging Sciences: ICCTES 2021 (Lecture Notes in Networks and Systems #467)

by Sudhanshu Maurya Sateesh K. Peddoju Badlishah Ahmad Ines Chihi

The book is a collection of best selected research papers presented at International Conference on Cyber-Technologies and Emerging Sciences (ICCTES 2021), organized by Graphic Era Hill University, Bhimtal Campus, Uttarakhand, India, during 17 – 18 December 2021. The book covers state-of-the-art applications, innovative methods, and analyze the unexplored and unsolved challenges to establish the relative solutions to advance the existing applications and theories of Cyber-Technologies and Emerging Sciences.

Cyber War: The Next Threat to National Security and What to Do About It

by Richard A. Clarke Robert Knake

Richard A. Clarke warned America once before about the havoc terrorism would wreak on our national security--and he was right. Now he warns us of another threat, silent but equally dangerous. Cyber War is a powerful book about technology, government, and military strategy; about criminals, spies, soldiers, and hackers. This is the first book about the war of the future--cyber war--and a convincing argument that we may already be in peril of losing it. Cyber War goes behind the "geek talk" of hackers and computer scientists to explain clearly and convincingly what cyber war is, how cyber weapons work, and how vulnerable we are as a nation and as individuals to the vast and looming web of cyber criminals. From the first cyber crisis meeting in the White House a decade ago to the boardrooms of Silicon Valley and the electrical tunnels under Manhattan, Clarke and coauthor Robert K. Knake trace the rise of the cyber age and profile the unlikely characters and places at the epicenter of the battlefield. They recount the foreign cyber spies who hacked into the office of the Secretary of Defense, the control systems for U.S. electric power grids, and the plans to protect America's latest fighter aircraft. Economically and militarily, Clarke and Knake argue, what we've already lost in the new millennium's cyber battles is tantamount to the Soviet and Chinese theft of our nuclear bomb secrets in the 1940s and 1950s. The possibilities of what we stand to lose in an all-out cyber war--our individual and national security among them-- are just as chilling. Powerful and convincing, Cyber War begins the critical debate about the next great threat to national security.

Cyber Warfare and the Laws of War

by Heather Harrison Dinniss

The information revolution has transformed both modern societies and the way in which they conduct warfare. Cyber Warfare and the Laws of War analyses the status of computer network attacks in international law and examines their treatment under the laws of armed conflict. The first part of the book deals with the resort to force by states and discusses the threshold issues of force and armed attack by examining the permitted responses against such attacks. The second part offers a comprehensive analysis of the applicability of international humanitarian law to computer network attacks. By examining the legal framework regulating these attacks, Heather Harrison Dinniss addresses the issues associated with this method of attack in terms of the current law and explores the underlying debates which are shaping the modern laws applicable in armed conflict.

Cyber Wars: Hacks that Shocked the Business World

by Charles Arthur

Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game changing hacks that make organizations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders and this book provides a deep insight into understanding how they work, how hackers think as well as giving invaluable advice on staying vigilant and avoiding the security mistakes and oversights that can lead to downfall. No organization is safe but by understanding the context within which we now live and what the hacks of the future might look like, you can minimize the threat. In Cyber Wars, you will learn how hackers in a TK Maxx parking lot managed to steal 94m credit card details costing the organization $1bn; how a 17 year old leaked the data of 157,000 TalkTalk customers causing a reputational disaster; how Mirai can infect companies' Internet of Things devices and let hackers control them; how a sophisticated malware attack on Sony caused corporate embarrassment and company-wide shut down; and how a phishing attack on Clinton Campaign Chairman John Podesta's email affected the outcome of the 2016 US election.

Cyberactivism: Online Activism in Theory and Practice (Routledge Studies In New Media And Cyberculture Ser.)

by Martha McCaughey Michael D. Ayers

Cyberactivism is a timely collection of essays examining the growing importance of online activism. The contributors show how online activists have not only incorporated recent technology as a tool for change, but also how they have changed the meaning of activism, what community means, and how they conceive of collective identity and democratic change. Topics addressed range from the Zapatista movement's use of the web to promote their cause globally to the establishment of alternative media sources like indymedia.org to the direct action of "hacktivists" who disrupt commercial computer networks. Cyberactivism is essential reading for anyone interested in understanding the impact of the Internet on politics today.

Cyberbiosecurity: A New Field to Deal with Emerging Threats

by Dov Greenbaum

Biocybersecurity applies cybersecurity research to the field of biology, and, to a lesser degree, applies biological principles to the field of cybersecurity. As biologists increasingly research, collaborate, and conduct research online, biocybersecurity has become crucial to protect against cyber threats. This book provides an overview of biocybersecurity through the lens of researchers in academia, industry professionals, and government, in both biology and cybersecurity fields. The book highlights emerging technologies, and identifies emerging threats connected with these technologies, while also providing a discussion of the legal implications involved.This book takes on a multidisciplinary approach, and appeals to both professionals and researchers in the synthetic biology, bioinformatics, and cybersecurity fields.

CyberBRICS: Cybersecurity Regulations in the BRICS Countries

by Luca Belli

This book stems from the CyberBRICS project, which is the first major attempt to produce a comparative analysis of Internet regulations in the BRICS countries – namely, Brazil, Russia, India, China, and South Africa. The project has three main objectives: 1) to map existing regulations; 2) to identify best practices; and 3) to develop policy recommendations in the various areas that compose cybersecurity governance, with a particular focus on the strategies adopted by the BRICS countries to date. Each study covers five essential dimensions of cybersecurity: data protection, consumer protection, cybercrime, the preservation of public order, and cyberdefense.The BRICS countries were selected not only for their size and growing economic and geopolitical relevance but also because, over the next decade, projected Internet growth is expected to occur predominantly in these countries. Consequently, the technology, policy and governance arrangements defined by the BRICS countries are likely to impact not only the 3.2 billion people living in them, but also the individuals and businesses that choose to utilize increasingly popular applications and services developed in BRICS countries according to BRICS standards. Researchers, regulators, start-up innovators and other Internet stakeholders will find this book a valuable guide to the inner workings of key cyber policies in this rapidly growing region.

Cybercomplexity: A Macroscopic View of Cybersecurity Risk (Advanced Sciences and Technologies for Security Applications)

by Carl S. Young

This book tackles the problem of complexity within IT environments, i.e., "Cybercomplexity," which is generally recognized as a principal source of cybersecurity risk. The book first defines complexity and simplifies its analysis by assuming a probabilistic approach to security risk management. It then proposes a simple model of cybercomplexity that is based on Shannon entropy, a basic concept in information theory. The key drivers of cybercomplexity emerge from this model, where these drivers reveal the scale-dependence of cybersecurity risk and explain why macroscopic security controls are required to address cybersecurity risk on an enterprise scale. The significant operational implications of cybercomplexity are also discussed, thereby providing both a theoretical framework and a practical guide to addressing this longstanding problem in cybersecurity risk management.

Cybercrime During the SARS-CoV-2 Pandemic: Evolutions, Adaptations, Consequences

by Daniel Ventre Hugo Loiseau

The SARS-CoV-2 pandemic has had an undeniable impact on cybercrime. The initial crisis quickly became a global catastrophe with multiple consequences in economics, health, and political and social fields. This book explores how this global emergency has influenced cybercrime. Indeed, since feeding off new vulnerabilities, thanks to the effects of the pandemic crisis in various states around the world, cybercrime has increased and evolved.In 2020, the world was already dealing with numerous tensions and the effects of the global crisis have therefore only tended to exacerbate the issues that relate to cybercrime. For example, radicalization and identity theft has found an environment in which they thrive: the Internet. Criminals have been able to adapt their modus operandi, their targets and their attack vectors. However, on the plus side, the response of law enforcement and public authorities, in terms of the legal, policing and policy side of cybercrime, has also been adapted in order to better combat the increase in this phenomenon.

Cyberdanger: Understanding and Guarding Against Cybercrime

by Eddy Willems

This book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world. The author first explains malware and its origins; he describes the extensive underground economy and the various attacks that cybercriminals have developed, including malware, spam, and hacking; he offers constructive advice on countermeasures for individuals and organizations; and he discusses the related topics of cyberespionage, cyberwarfare, hacktivism, and anti-malware organizations, and appropriate roles for the state and the media. The author has worked in the security industry for decades, and he brings a wealth of experience and expertise. In particular he offers insights about the human factor, the people involved on both sides and their styles and motivations. He writes in an accessible, often humorous way about real-world cases in industry, and his collaborations with police and government agencies worldwide, and the text features interviews with leading industry experts. The book is important reading for all professionals engaged with securing information, people, and enterprises. It’s also a valuable introduction for the general reader who wants to learn about cybersecurity.

Cyberdeterrence and Cyberwar

by Martin C. Libicki

Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.

Cyberfeminism and Artificial Life

by Sarah Kember

Cyberfeminism and Artificial Life examines the construction, manipulation and re-definition of life in contemporary technoscientific culture. It takes a critical political view of the concept of life as information, tracing this through the new biology and the discourse of genomics as well as through the changing discipline of artificial life and its manifestation in art, language, literature, commerce and entertainment. From cloning to computer games, and incorporating an analysis of hardware, software and 'wetware', Sarah Kember extends current understanding by demonstrating the ways in which this relatively marginal field connects with, and connects up global networks of information systems.Ultimately, this book aims to re-focus concern on the ethics rather than on the 'nature' of life-as-it-could-be.

Cybergefahr: Wie wir uns gegen Cyber-Crime und Online-Terror wehren können

by Eddy Willems

Man kann online wählen, Rechnungen bezahlen und Tickets kaufen - aber wie sicher ist das? Überall lauern Viren, Spam, Hackerangriffe und sogar Cyber-Spione. Wie kann man sich schützen und wie sollte man dem Phänomen Cyber-Crime begegnen? Der bekannte Security-Experte Eddy Willems gibt einen Überblick über Online-Gefahren und Möglichkeiten, sich vor ihnen zu schützen. Er erläutert spannend die Vergangenheit, Gegenwart und Zukunft des Cyber-Crime.

Cyberia (Cyberia #1)

by Chris Lynch

Zane lives in a completely wired world where every pet has a microchip that allows it to talk. Zane soon learns that the pets aren't actually saying what the chip is translating. They aren't happy that all animals have been domesticated, and they enlist Zane to help them fight back and ensure their freedom.

Cyberia #3: Prime Evil (Cyberia #3)

by Chris Lynch

From National Book Award nominee Chris Lynch, the third action-and-humor-filled futuristic series about talking pets who are tired of being pets ... and the boy who must help them. Zane and his animal comrades have foiled Dr. Gristle's terrible plots twice--he can't talk to animals, and he can't get at the heart of what makes them wild. Zane can talk to them. He can understand them. He almost is one. Almost. Zane keeps getting in Dr. Gristle's way though - and he's being sent as far out of the way as Gristle can get him. In fact, he's being sent right into the middle of a new plot of the bad doctor's--and in his new, utterly foreign surroundings, he's entirely too human.

Cyberlaw: The Law of the Internet and Information Technology

by Brian Craig

Featuring the most current exploration of cyberlaw, this book helps students understand the legal and policy issues associated with the Internet. Tackling a full range of legal topics, it includes discussion of jurisdiction, intellectual property, contracts, taxation, torts, computer crimes, online speech, defamation and privacy. <p><p>Chapters include recent, relevant cases, discussion questions and exercises at the end of each chapter. Using a consistent voice and clear explanations, the author covers the latest developments in cyberlaw-from cases to legislation to regulations.

Cybernetic Modeling for Bioreaction Engineering (Cambridge Series in Chemical Engineering)

by Doraiswami Ramkrishna Hyun-Seob Song

Uniquely focusing on dynamic modeling, this volume incorporates metabolic regulation as a survival mechanism for cells, by driving metabolism through optimal investment of its resources for control of enzyme synthesis and activity. Consequently, the models have a proven record of describing various uptake patterns of mixed carbon substrates that have become significant in modern applications of biomass for the production of bioenergy. The models accurately describe dynamic behavior of microbes in nutrient environments with mixtures of complementary substrates, such as carbon and nitrogen. Modeling of large metabolic networks (including prospects for extension to genome scale) is enabled by lumped hybrid cybernetic models with an unparalleled capacity to predict dynamic behavior of knockout strains. This is an invaluable, must-have reference for bio-researchers and practicing engineers.

Cybernetic Revolution and Global Aging: Humankind on the Way to Cybernetic Society, or the Next Hundred Years (World-Systems Evolution and Global Futures)

by Leonid Grinin Andrey Korotayev Anton Grinin

This book explores the global technological transformations that have shaped development of society for eons, from the emergence of Homo sapiens to the modern day. Looking at a potential future for all of this century and the beginning of the next, the book explores how society is changing as a result of the two most powerful trends: technological advances and global aging. It studies the forthcoming technological wave – the Cybernetic Revolution, which will encompass AI, medical technology and biotechnology, robotics, cognitive, nanotechnology etc. In turn, it shows why and how global aging will become one of the most powerful factors, influencing the evolution of society and the World System as a whole. Lastly, the book demonstrates how technological innovations can change the way people live and the society of the future, assessing both the new opportunities and threats posed by uncontrolled technological progress. Accordingly, it will appeal to social scientists, political scientists, economists and historians who are interested in technological transformations and their social and economic impacts.

Refine Search

Showing 14,476 through 14,500 of 64,913 results