رکورد قبلیرکورد بعدی

" Cyber resilience of systems and networks / "


Document Type : BL
Record Number : 865425
Title & Author : Cyber resilience of systems and networks /\ Alexander Kott, Igor Linkov, editors.
Publication Statement : Cham, Switzerland :: Springer,, [2019]
: , ©2019
Series Statement : Risk, systems and decisions
Page. NO : 1 online resource (475 pages) :: illustrations
ISBN : 3319774921
: : 9783319774923
: 3319774913
: 9783319774916
Bibliographies/Indexes : Includes bibliographical references and index.
Contents : Intro; Contents; Contributors; Chapter 1: Fundamental Concepts of Cyber Resilience: Introduction and Overview; 1 Motivation: Why Cyber Resilience?; 2 Resilience and Systems; 3 Resilience and Related Properties of Systems; 4 Costs of Cyber Resilience and Cyber Risk Management; 5 Assessment of Cyber Resilience; 6 Approaches to Improving Cyber Resilience; 7 Preview of the Book; References; Part I: Quantifying Cyber Resilience; Chapter 2: Metrics Based on the System Performance Perspective; 1 Introduction; 2 Ingredients of Quantitative Cyber Resiliency; 3 Challenges and Future Work; References
: 3.3 Educate/Train Employees About Resilience and Organizationś Resilience Plan (Matrix Location: Social/Plan and Prepare #2)3.4 Documentation of Certifications, Qualifications, and Pedigree of Critical Hardware and/or Software Providers (Matrix Locat ... ; 3.5 Identify and Coordinate with External Entities That May Influence or Be Influenced by Internal Cyberattacks (Establish Poi ... ; 3.6 Include Cybersecurity in Human Resources Practices (Matrix Location: Cognitive/Plan and Prepare #4); 3.7 Test Response and Recovery Plans (Matrix Location: Cognitive/Plan and Prepare #5)
: 3.8 Assessment of Network Structure and Interconnection to System Components and to the Environment (Matrix Location: Physical ... 3.9 Dedicate Cyber Resources to Defend Against Attack (Matrix Location: Physical/Absorb #3); 3.10 Review Critical Points of Physical and Information Failure in Order to Make Informed Decisions (Matrix Location: Cognitiv ... ; 3.11 Manage Public Relations and Repair Reputation After Events (Matrix Location: Social/Recover #1); 3.12 Voluntarily Share Information with External Stakeholders to Achieve Broader Cybersecurity Situational Awareness (Matrix L ...
: Chapter 3: Metrics Based on the Mission Risk Perspective1 Introduction; 2 Considerations for Measuring Resilience; 2.1 System Boundaries Matter; 2.2 System Performance, Performance Metrics, and Threshold Performance Minimums; 2.3 Analysis Timeframe; 2.4 Capacity to Withstand Incidents; 2.5 The Occurrence of Incidents Is Uncertain; 2.6 Scale of Deployment; 3 A Definition of Resilience; 3.1 Resilience Is; 4 Example of Estimating Mission Resilience; 5 Application of the Resilience Metric to Complex Systems; 6 Comparison with Previous Work and Definitions; 7 Discussion; 8 Summary; References
: Part II: Assessment and Analysis of Cyber ResilienceChapter 4: Frameworks and Best Practices; 1 Introduction; 2 Framework Review; 2.1 The Resilience Matrix Framework (See footnote 1); 2.2 The National Institute of Standards and Technologyś (NIST) Framework; 2.3 The Center on Local Government Research Framework; 2.4 Choosing a Framework and Adding Metrics; 3 Best Practices; 3.1 Understand and Manage Legal and Regulatory Requirements Regarding Cybersecurity, Including Privacy and Civil Liberties Obl ... ; 3.2 Establish a Cyber-Aware Culture (Matrix Location: Social/Plan and Prepare #6)
Abstract : "This book introduces fundamental concepts of cyber resilience, drawing expertise from academia, industry, and government. Resilience is defined as the ability to recover from or easily adjust to shocks and stresses. Unlike the concept of security -- which is often and incorrectly conflated with resilience -- resilience refers to the system's ability to recover or regenerate its performance after an unexpected impact produces a degradation in its performance. A clear understanding of distinction between security, risk and resilience is important for developing appropriate management of cyber threats. The book presents insightful discussion of the most current technical issues in cyber resilience, along with relevant methods and procedures. Practical aspects of current cyber resilience practices and techniques are described as they are now, and as they are likely to remain in the near term. The bulk of the material is presented in the book in a way that is easily accessible to non-specialists. Logical, consistent, and continuous discourse covering all key topics relevant to the field will be of use as teaching material as well as source of emerging scholarship in the field. A typical chapter provides introductory, tutorial-like material, detailed examples, in-depth elaboration of a selected technical approach, and a concise summary of key ideas."--
Subject : Computer networks-- Security measures.
Subject : Computer security.
Subject : Cyberspace-- Security measures.
Subject : Internet-- Security measures.
Subject : Computer networks-- Security measures.
Subject : Computer security.
Subject : Computer security.
Subject : COMPUTERS-- Security-- Networking.
Subject : Internet-- Security measures.
Subject : Reliability engineering.
Dewey Classification : ‭005.8‬
LC Classification : ‭TK5105.59‬‭.C929 2019‬
Added Entry : Kott, Alexander,1971-
: Linkov, Igor
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟