Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама




Название: Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE)
Автор: Andrew A. Bochman and Sarah Freeman
Издательство: CRC Press
Год: 2021
Формат: PDF
Страниц: 315
Размер: 34,45 МБ
Язык: English

Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern.
It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways current approaches do not. The most pressing threat is cyber-enabled sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable.
Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination that follows. Chapter 4 describes how to prepare for an engagement, and chapters 5-8 address each of the four phases. The CCE phase chapters take the reader on a more granular walkthrough of the methodology with examples from the field, phase objectives, and the steps to take in each phase. Concluding chapter 9 covers training options and looks towards a future where these concepts are scaled more broadly.







ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!







Автор: ak5812 22-12-2020, 06:13 | Напечатать |
 
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.





С этой публикацией часто скачивают:

    Cyber Resilience Cyber Resilience Название: Cyber Resilience (River Publishers Series in Security and Digital Forensics) Автор: Sergei Petrenko Издательство: River Publishers Год:...

    Cyber Strategy: Risk-Driven Security and Resiliency Cyber Strategy: Risk-Driven Security and Resiliency Название: Cyber Strategy: Risk-Driven Security and Resiliency Автор: Carol A. Siegel, Mark Sweeney Издательство: CRC Press Год: 2020 Формат: True...

    Cyber Arms: Security in Cyberspace Cyber Arms: Security in Cyberspace Название: Cyber Arms: Security in Cyberspace Автор: Stanislav Abaimov, Maurizio Martellini Издательство: CRC Press Год: 2020 Страниц: 254 Язык:...

    Cybersecurity and Decision Makers: Data Security and Digital Trust Cybersecurity and Decision Makers: Data Security and Digital Trust Название: Cybersecurity and Decision Makers: Data Security and Digital Trust Автор: Marie De Freminville Издательство: Wiley-ISTE Год: 2020...

    Cyber-Security and Information Warfare Cyber-Security and Information Warfare Название: Cyber-Security and Information Warfare (Cybercrime and Cybersecurity Research) Автор: Nicholas J. Daras (Editor) Издательство: Nova Science...

    Research Methods for Cyber Security Research Methods for Cyber Security Название: Research Methods for Cyber Security Автор: Thomas W. Edgar, David O. Manz Издательство: Syngress ISBN: 0128053496 Год: 2017 Страниц:...

    A Guide To Cyber Security A Guide To Cyber Security Название: A Guide To Cyber Security Автор: Ms Amrita Mitra Издательство: CreateSpace Independent Publishing Platform ISBN: 1727359526 Год: 2018 ...

    Cyber Security Policy Guidebook Cyber Security Policy Guidebook Название: Cyber Security Policy Guidebook Автор: Jennifer L. Bayuk; Jason Healey; Paul Rohmeyer; Marcus Sachs; Jeffrey Schmidt; Joseph Weiss...

    Handbook on Securing Cyber-Physical Critical Infrastructure Handbook on Securing Cyber-Physical Critical Infrastructure Название: Handbook on Securing Cyber-Physical Critical Infrastructure Автор: Sajal K Das and Krishna Kant Издательство: Morgan Kaufmann Год: 2012...

    Cybersecurity - Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare Cybersecurity - Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare Название: Cybersecurity - Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare Автор: Thomas A. Johnson Издательство: CRC Press...

Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.


 MirKnig.Su  ©2024     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности