𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Cyber-Security Threats, Actors, and Dynamic Mitigation

✍ Scribed by Nicholas Kolokotronis and Stavros Shiaeles


Publisher
CRC Press
Year
2021
Tongue
English
Leaves
392
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Cyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security. It covers the methodologies for modeling attack strategies used by threat actors targeting devices, systems, and networks such as smart homes, critical infrastructures, and industrial IoT.

With a comprehensive review of the threat landscape, the book explores both common and sophisticated threats to systems and networks. Tools and methodologies are presented for precise modeling of attack strategies, which can be used both proactively in risk management and reactively in intrusion prevention and response systems. Several contemporary techniques are offered ranging from reconnaissance and penetration testing to malware detection, analysis, and mitigation. Advanced machine learning-based approaches are also included in the area of anomaly-based detection, that are capable of detecting attacks relying on zero-day vulnerabilities and exploits.

Academics, researchers, and professionals in cyber-security who want an in-depth look at the contemporary aspects of the field will find this book of interest. γ€€Those wanting a unique reference for various cyber-security threats and how they are detected, analyzed, and mitigated will reach for this book often.

✦ Table of Contents


Cover
Half Title
Title Page
Copyright Page
Dedication
Contents
Preface
Acknowledgments
Editors
Contributors
Chapter 1: Profiles of Cyber-Attackers and Attacks
Chapter 2: Reconnaissance
Chapter 3: System Threats
Chapter 4: Cryptography Threats
Chapter 5: Network Threats
Chapter 6: Malware Detection and Mitigation
Chapter 7: Dynamic Risk Management
Chapter 8: Attack Graph Generation
Chapter 9: Intelligent Intrusion Response
Index


πŸ“œ SIMILAR VOLUMES


Security Threat Mitigation and Response:
✍ Dale Tesch, Greg Abelar πŸ“‚ Library πŸ“… 2006 πŸ› Cisco Press 🌐 English

We got a MARS box at my work, so I grabbed this book to get up to snuff. It was a very annoying and frustrating book. The first 1/3 of the book seemed to be semi-marketing fluff, and actually prompted me to note "hahaha" in one of the margins. In about a decade of working through technical books,

Security threat mitigation and response
✍ Tesch, Dale;Abelar, Greg πŸ“‚ Library πŸ“… 2006;2007 πŸ› Cisco Press 🌐 English

Identify, manage, and counter security threats with the Cisco Security Monitoring, Analysis, and Response System. While it is commonly understood that deploying network security devices is critical to the well-being of an organization's systems and data, all too often companies assume that simply ha

Be Cyber Secure : Tales, Tools and Threa
✍ Jonathan Reuvid πŸ“‚ Library πŸ“… 2021 πŸ› Legend Business Books 🌐 English

This important edition focuses on the human factor in training, cautionary tales of breaches that occurred through human error, while also identifying storytelling as an effective tool in cyber eduction. Topics include: Addressing management issues Approaches to cyber defence Innovative tools for th

The Complete Guide to Defense in Depth:
✍ Akash Mukherjee πŸ“‚ Library πŸ“… 2024 πŸ› Packt Publishing Pvt Ltd 🌐 English

Gain comprehensive insights to safeguard your systems against advanced threats and maintain resilient security posture Key Features Develop a comprehensive understanding of advanced defense strategies to shape robust security programs Evaluate the effectiveness of a security strategy through th