<p><p>This book brings together the essential methodologies required to understand the advancement of digital technologies into digital transformation, as well as to protect them against cyber threat vulnerabilities (in this context cybersecurity attack ontology is included, modeling different types
Cybersecurity in Digital Transformation: Scope and Applications
✍ Scribed by Dietmar P.F. Möller
- Publisher
- Springer
- Year
- 2021
- Tongue
- English
- Leaves
- 126
- Series
- SpringerBriefs on Cyber Security Systems and Networks
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This book brings together the essential methodologies required to understand the advancement of digital technologies into digital transformation, as well as to protect them against cyber threat vulnerabilities (in this context cybersecurity attack ontology is included, modeling different types of adversary knowledge). It covers such essential methodologies as CIA Triad, Security Risk, Likelihood, and Consequence Level, Threat Attack Profiling, Threat Intelligence, Threat Lifecycle and more.
The idea behind digital transformation is to use digital technologies not only to replicate an existing process in a digital form, but to use digital technology to transform that process into something intelligent (where anything is connected with everything at any time and accessible and controlled and designed advanced). Against this background, cyber threat attacks become reality, using advanced digital technologies with their extreme interconnected capability which call for sophisticated cybersecurity protecting digital technologies of digital transformation.
Scientists, advanced-level students and researchers working in computer science, electrical engineering and applied mathematics will find this book useful as a reference guide. Professionals working in the field of big data analytics or digital/intelligent manufacturing will also find this book to be a valuable tool.
✦ Table of Contents
Foreword
Preface
Acronyms
Contents
Chapter 1: Introduction to Digital Transformation
1.1 Digital Transformation
1.2 Cybersecurity
1.3 Fourth Technological Wave
1.4 Circular Economy
References
Chapter 2: Introduction to Cybersecurity
2.1 Introduction
2.2 CIA Triad
2.3 Cyber Threat Attacks and Cyber Threat Intentions
2.4 Security Risk, Likelihood, and Consequence Level
2.5 Risk Matrix
2.6 Cyber Threat Attack Types
References
Chapter 3: Threat Intelligence
3.1 Introduction
3.2 Threat Intelligence Methodological Approach
3.3 Known-Knowns, Known-Unknowns, Unknown-Unknowns
3.4 Digital Forensic and Threat Intelligence Platforms
3.5 Threat Attack Profiling, Threat Intelligence, and Threat Lifecycle
3.6 Threat Intelligence Sharing and Management Platforms
References
Chapter 4: Intrusion Detection and Prevention
4.1 Intrusion Detection
4.1.1 Anomaly Intrusion Detection
4.1.2 Misuse Intrusion Detection
4.1.3 Disadvantages of Anomaly and Misuse Intrusion Detection
4.1.4 Specification-Based Intrusion Detection
4.1.5 Intrusion Type Characteristics and Detection
4.1.6 Intrusion Detection System Architecture
4.2 Intrusion Prevention
4.2.1 Intrusion Prevention System
4.2.2 Intrusion Prevention System Architecture
4.3 Intrusion Detection and Prevention Architecture
4.4 Intrusion Detection Capability Metric
4.5 Intrusion Detection and Prevention Methods
References
Chapter 5: Machine Learning and Deep Learning
5.1 Introduction to Machine Learning
5.2 Types of Machine Learning
5.2.1 Comparison of Machine Learning Methods
5.3 Machine Learning and Intrusion Detection
5.4 Introduction to Deep Learning
5.4.1 Deep Learning Methods Used in Cybersecurity
References
Chapter 6: Attack Models and Scenarios
6.1 Introduction
6.2 Attack Models and Scenarios
6.3 Adversary Behavior Modeling
6.3.1 Adversary Attack Behavior Modeling
6.3.2 Adversary Cyber Threat Simulation Modeling
References
Chapter 7: Cybersecurity Ontology
7.1 Introduction
7.2 Ontology Types
7.3 Cybersecurity Ontology
References
Chapter 8: Cybersecurity Leadership
8.1 Introduction
8.2 Roadmap to Cybersecurity Leadership
8.3 Digital Master
References
📜 SIMILAR VOLUMES
In today’s digital transformation environments, a rigorous cybersecurity approach to effective risk management ― including contingency planning, outlining immediate actions, preparing post-breach responses ― is central to defending organizations’ interconnected computer systems, networks, and infras
<p><span>In today’s digital transformation environments, a rigorous cybersecurity approach to effective risk management ― including contingency planning, outlining immediate actions, preparing post-breach responses ― is central to defending organizations’ interconnected computer systems, networks, a
In today’s digital transformation environments, a rigorous cybersecurity approach to effective risk management — including contingency planning, outlining immediate actions, preparing post-breach responses — is central to defending organizations’ interconnected computer systems, networks, and infras
<span>This book states that intelligent digital transformation is the process of using artificial intelligence techniques in digital technologies such as machine learning, natural language processing, automation and robotics to transform existing non-digital business processes and services to meet w