𝔖 Scriptorium
✦   LIBER   ✦

📁

Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices

✍ Scribed by Dietmar P.F. Möller


Publisher
Springer
Year
2023
Tongue
English
Leaves
432
Series
Advances in Information Security, 103
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


In today’s digital transformation environments, a rigorous cybersecurity approach to effective risk management ― including contingency planning, outlining immediate actions, preparing post-breach responses ― is central to defending organizations’ interconnected computer systems, networks, and infrastructure resources from malicious cyber-attacks.

Specifically, cybersecurity technologies, processes, and practices need to be generalized and applied to intrusion detection and prevention measures. This entails analyzing profiles of cyber-attackers and building cyber-attack models for behavior simulation that can effectively counter such attacks. This comprehensive volume aims to cover all essential aspects of cybersecurity in digital transformation and to provide a framework for considering the many objectives and requirements involved. In addition to introducing theoretical foundations, the work also offers practical techniques for defending against malicious cybercriminals.

Topics and features:

  • Explores cybersecurity’s impact on the dynamics of interconnected, complex cyber- and physical systems, infrastructure resources, and networks
  • Provides numerous examples of applications and best practices
  • Considers methods that organizations can use to assess their cybersecurity awareness and/or strategy
  • Describes anomaly intrusion detection, a key tool in thwarting both malware and theft (whether by insiders or external parties) of corporate data
  • Addresses cyber-attacker profiles, cyber-attack models and simulation, cybersecurity ontology, access-control mechanisms, and policies for handling ransomware attacks
  • Discusses the NIST Cybersecurity Framework, MITRE Adversarial Tactics, Techniques and Common Knowledge, CIS Critical Security Controls, and the ISA/IEC 62442 Cybersecurity Standard

Gathering all the relevant information, this practical guide is eminently suitable as a self-study resource for engineers, scientists, computer scientists, and chief information officers. Further, with its many examples of best practices, it can serve as an excellent text for graduate-level courses and research into cybersecurity.

Dietmar P. F. Möller, a retired full professor, is affiliated with the Institute for Mathematics at Clausthal University of Technology, Germany.  He was an author of several other Springer titles, including Guide to Automotive Connectivity and Cybersecurity.


✦ Table of Contents


Foreword
Preface
Contents
Chapter 1: Cybersecurity in Digital Transformation
1.1 Digital Transformation
1.2 Emerging Technologies in Digital Transformation
1.2.1 Artificial Intelligence
1.2.2 Additive Manufacturing
1.2.3 Augmented Reality
1.2.4 Autonomous Robots
1.2.5 Big Data and Analytics
1.2.6 Blockchain
1.2.7 Cloud Computing and Services
1.2.8 Edge- and Fog Computing
1.2.9 Internet of Things
1.2.10 Industrial Internet of Things
1.2.11 Fiber Optics
1.2.12 Machine Learning
1.2.13 Machine-to-Machine Communication
1.2.14 Network-as-a-Service
1.2.15 Network Virtualization
1.2.16 Network Function Virtualization
1.2.17 Simulation and the Digital Twin
1.2.18 Software Defined Network
1.2.19 Wireless Sensor Networks
1.2.20 5G and 6G
1.3 Challenges in Digital Transformation
1.4 Applications in Digital Transformation
1.5 Leadership in Digital Transformation
1.6 Cybersecurity
1.6.1 Introduction to Cybersecurity
1.6.2 CIA Triad
1.6.3 Cybersecurity Is Still Paramount
1.7 Digital Transformation and Circular Economy
1.8 Exercises
1.8.1 Digital Transformation
1.8.2 Cybersecurity
1.8.3 Circular Economy
References
Chapter 2: Threats and Threat Intelligence
2.1 Threats
2.1.1 Threat Events and Threat Intensions
2.1.2 Threat Event Types
2.1.3 Cybersecurity Residual Risk Rating, Likelihood, and Consequence Levels
2.1.4 Cybersecurity Risk Management and Quantifying Cybersecurity Risk
2.2 Threat Intelligence
2.2.1 Problem of Known-Knowns, Known-Unknowns, and Unknown-Unknowns
2.2.2 Digital Forensic and Threat Intelligence Platforms
2.2.3 Threat Event Profiling, Threat Intelligence, Threat Lifecycle
2.2.4 Threat Intelligence Sharing and Management Platforms
2.3 Exercises
2.3.1 Threats
2.3.2 Threat Intelligence
References
Chapter 3: Intrusion Detection and Prevention
3.1 Intrusion Detection
3.1.1 Significant Intrusion Detection Methods
3.1.2 Anomaly-Based Intrusion Detection
3.1.3 Misuse-Based Intrusion Detection
3.1.4 Disadvantages of Anomaly and Misuse Intrusion Detection
3.1.5 Specification-Based Intrusion Detection
3.1.6 Intrusion Type Characteristics and Detection
3.1.7 Intrusion Detection System Architecture
3.2 Pre-processing in Intrusion Detection Systems
3.3 Intrusion Detection Capability Metric
3.4 Intrusion Prevention
3.4.1 Intrusion Prevention System
3.4.2 Intrusion Prevention System Architecture
3.5 Intrusion Detection and Prevention System Architecture
3.6 Intrusion Detection and Prevention Methods
3.7 Exercises
3.7.1 Intrusion Detection
3.7.2 Intrusion Prevention
References
Chapter 4: Cyberattacker Profiles, Cyberattack Models and Scenarios, and Cybersecurity Ontology
4.1 Introduction
4.1.1 Cyberattacker Profiles
4.2 Cyberattack Models and Scenarios
4.2.1 Modeling Formalisms
4.2.2 Generic Cyberattack Models
4.2.3 Generic Intent-Based Cyberattacker Models
4.3 Cyberattacker Behavior Modeling
4.3.1 Generic Cyberattacker Behavior Modeling
4.3.2 Cyberattacker Simulation Model
4.4 Cybersecurity Ontology
4.4.1 Introduction to Ontology
4.4.1.1 Ontology Types
4.4.2 Cybersecurity Ontology
4.4.2.1 Generic Cybersecurity Data Space Ontology Framework
4.4.2.2 Cyberattack Ontology Model
4.5 Exercises
References
Chapter 5: NIST Cybersecurity Framework and MITRE Cybersecurity Criteria
5.1 Cybersecurity Frameworks
5.1.1 CIS Critical Security Controls
5.1.2 ISA/IEC 62443-Cybersecurity Standard
5.1.3 MITRE Adversarial Tactics, Techniques, and Common Knowledge
5.1.4 NIST 800-53
5.1.5 NIST Cybersecurity Framework
5.2 NIST Cybersecurity Framework Critical Infrastructure
5.2.1 NIST CSF Critical Infrastructure Best Practice Example
5.3 MITRE Cybersecurity Criteria
5.4 MITRE Cybersecurity Taxonomy
5.5 Exercises
5.5.1 NIST CSF
5.5.2 MITRE ATT&CK
References
Chapter 6: Ransomware Attacks and Scenarios: Cost Factors and Loss of Reputation
6.1 Introduction
6.2 Ransomware Attacks
6.2.1 Introduction in Ransomware Attack Scenarios
6.2.2 Ransomware Attacks on Operational Technology Systems
6.3 Costs of a Ransomware Attack
6.3.1 Recovery Point Objective in Disaster Recovery
6.3.2 Recovery Time Objective in Disaster Recovery
6.3.3 Design of Recovery Point Objective and Recovery Time Objective in Disaster Recovery
6.4 Loss of Reputation and Its Prevention
6.5 Exercises
References
Chapter 7: Cybersecurity Maturity Models and SWOT Analysis
7.1 Introduction
7.2 Maturity Index and Maturity Models
7.2.1 Maturity Index
7.2.2 Maturity Models
7.2.3 Maturity Models After ISO 9004:2008
7.3 Cybersecurity Maturity Models
7.4 Cybersecurity Maturity Best Practice Model Example
7.5 SWOT Analysis
7.5.1 Introduction to SWOT Analysis
7.5.2 SWOT Analysis Best Practice Examples
7.5.2.1 Company Analysis
7.5.2.2 Cybersecurity SWOT Analysis
7.6 Exercises
7.6.1 Maturity Models
7.6.2 SWOT Analysis
References
Chapter 8: Machine Learning and Deep Learning
8.1 Introduction
8.1.1 Classical Machine Learning Techniques
8.1.1.1 Supervised Machine Learning
8.1.1.2 Unsupervised Machine Learning
8.1.1.3 Reinforcement Machine Learning
8.1.1.4 Comparison of Machine Learning Methods
8.2 Machine Learning and Cybersecurity
8.2.1 Machine Learning Examples in Cybersecurity
8.2.1.1 Machine Learning-Based Intrusion Detection in Industrial Applications
8.2.1.2 Machine Learning-Based Intrusion Detection Using Feature Learning
8.2.1.3 Machine Learning-Based Intrusion Detection of Unknown Cyberattacks
8.3 Introduction to Deep Learning
8.3.1 Classification of Deep Learning Methods
8.3.2 Deep Bayesian Neural Network
8.3.3 Deep Learning-Based Intrusion Detection System
8.4 Deep Learning Method Example in Cybersecurity
8.5 Exercises
8.5.1 Machine Learning
8.5.2 Deep Learning
References
Glossary
Index


📜 SIMILAR VOLUMES


Guide to Cybersecurity in Digital Transf
✍ Dietmar P. F. Möller 📂 Library 📅 2023 🏛 Springer 🌐 English

In today’s digital transformation environments, a rigorous cybersecurity approach to effective risk management ― including contingency planning, outlining immediate actions, preparing post-breach responses ― is central to defending organizations’ interconnected computer systems, networks, and infras

Guide to Cybersecurity in Digital Transf
✍ Dietmar P.F. Möller 📂 Library 📅 2023 🏛 Springer Nature 🌐 English

In today’s digital transformation environments, a rigorous cybersecurity approach to effective risk management — including contingency planning, outlining immediate actions, preparing post-breach responses — is central to defending organizations’ interconnected computer systems, networks, and infras

Guide to Automotive Connectivity and Cyb
✍ Dietmar P.F. Möller, Roland E. Haas 📂 Library 📅 2019 🏛 Springer International Publishing 🌐 English

<p><p>This comprehensive text/reference presents an in-depth review of the state of the art of automotive connectivity and cybersecurity with regard to trends, technologies, innovations, and applications. The text describes the challenges of the global automotive market, clearly showing where the mu

Cybersecurity in Digital Transformation:
✍ Dietmar P.F. Möller 📂 Library 📅 2021 🏛 Springer 🌐 English

<p>This book brings together the essential methodologies required to understand the advancement of digital technologies into digital transformation, as well as to protect them against cyber threat vulnerabilities (in this context cybersecurity attack ontology is included, modeling different types of

Cybersecurity in Digital Transformation:
✍ Dietmar P.F. Möller 📂 Library 📅 2020 🏛 Springer International Publishing;Springer 🌐 English

<p><p>This book brings together the essential methodologies required to understand the advancement of digital technologies into digital transformation, as well as to protect them against cyber threat vulnerabilities (in this context cybersecurity attack ontology is included, modeling different types