๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Introduction to the Cyber Ranges

โœ Scribed by Bishwajeet Pandey, Shabeer Ahmad


Publisher
CRC Press
Year
2022
Tongue
English
Leaves
205
Series
Chapman & Hall/CRC Cyber-Physical Systems
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Table of Contents


Cover
Half Title
Series Page
Title Page
Copyright Page
Contents
Preface
About the Authors
List of Abbreviations
Glossary
1. Introduction
1.1. CSA
1.2. Definition
1.3. Need of CRs
1.3.1. Use Cases of CRs
1.3.2. Merits of CRs Training
1.4. CRaaS
1.5. On-Premise CR
1.6. Types of CRs
1.7. Conclusions
References
2. Architectural Design and Tools of Cyber Ranges
2.1. Architectural Modules and Their Functions
2.1.1. Portal
2.1.2. Run-Time Environments
2.1.2.1. Emulation-Based Tools
2.1.2.2. Simulation-Based Tools
2.1.2.3. Traffic Generation Tools
2.1.2.4. Management Tools
References
3. Motivations for Construction of Cyber Ranges
3.1. IT and OT Infrastructures
3.1.1. Cybersecurity Challenges to OT/IT Systems
3.1.2. Cybersecurity Implementations in OT/IT Systems
3.1.2.1. Asset Management
3.1.2.2. Governance
3.1.2.3. Risk Assessment
3.1.2.4. Cyber-Risk Awareness
3.1.2.5. Cybersecurity Maintenance
3.1.2.6. Cyber-Risk Detection
3.1.2.7. Mitigation of Cyber Risk
3.1.2.8. Cyber-Risk Analyses
3.1.3. Need of CRs for WSS
3.1.4. Need of CRs for Logistic Systems
3.1.5. Need of CRs for Maritime Systems
3.1.6. Need of CRs for O&G Industries
3.1.7. Need of CRs for Power Systems
3.2. Cyberattacks
3.2.1. Cyberattacks on Critical Infrastructures
3.2.2. Cyberthreats to Critical Infrastructures
References
4. Types of Cyber Ranges
4.1. Hybrid CRs
4.1.1. EVA
4.1.2. DIATEAM CR
4.1.3. CRATE
4.2. Physical CRs
4.2.1. SCADA Testbeds
4.2.2. SWAT
4.2.3. WADI
4.3. Virtual CRs
4.3.1. CYRA
4.3.2. GISOO
4.4. CRaaS
References
5. Roles of Cyber Ranges: Testing, Training, and Research
5.1. CRs for Testing
5.1.1. Penetration Testing
5.1.2. Software Testing
5.1.3. Security Testing
5.1.3.1. Threat Model Testing
5.1.3.2. Web Security Testing
5.2. CRs for Training
5.2.1. How to Use CRs for Trainings
5.2.2. Cybersecurity Awareness Trainings
5.2.3. Incident Response Trainings
5.3. CRs for Research
References
6. Cybersecurity Exercises and Teams Definition
6.1. Need of CEs
6.2. Life Cycle of a CE
6.3. Steps in Designing of a CE
6.4. Different Kinds of Approaches
6.5. Common Features of a CE
6.6. Types of CEs
6.6.1. Examples of CEs
6.7. Teams Definition
6.8. Conclusions
References
7. Simulation and Emulation Environments
7.1. Emulation Environment
7.1.1. Need for Emulation Environment
7.1.2. Types of Emulation Models
7.1.3. Emulators
7.1.3.1. Dummynet
7.1.3.2. NetEm
7.1.3.3. NIST Net
7.2. Simulation Environment
7.2.1. Need for Simulation Environment
7.2.2. Simulators
7.2.2.1. NS2
7.2.2.2. NS3
7.2.2.3. OMNET++
7.2.2.4. QualNet
References
8. Designing a Cyber Range
8.1. Planning Phase
8.1.1. Security Challenges Supported by the CR
8.1.2. Components for CR
8.1.3. Defining CR Teams
8.2. Architectural Considerations
8.3. Implementation Phase
8.3.1. IaC
References
9. Military Cyber Ranges
9.1. Need of MCRs
9.2. Simulation-Based MCRs
9.2.1. SIMTEX
9.2.1.1. Introduction
9.2.1.2. Origin
9.2.1.3. Architecture
9.2.1.4. Evolution
9.2.2. CAAJED
9.2.2.1. Introduction
9.2.2.2. Origin
9.2.2.3. Architecture
9.2.2.4. Evolution
9.2.3. SAST
9.2.3.1. Introduction
9.2.3.2. Origin
9.2.3.3. Architecture
9.2.3.4. Evolution
9.2.4. StealthNet
9.2.4.1. Introduction
9.2.4.2. Origin
9.2.4.3. Architecture
9.2.4.4. Evolution
9.2.5. Comparison of Simulation-Based MCRs
9.3. Emulation-Based MCRs
9.3.1. NCR
9.3.1.1. Introduction
9.3.1.2. Origin
9.3.1.3. Architecture
9.3.1.4. Evolution
9.3.2. JIOR
9.3.2.1. Introduction
9.3.2.2. Origin
9.3.2.3. Architecture
9.3.2.4. Evolution
9.3.3. DoD CSR
9.3.3.1. Introduction
9.3.3.2. Origin
9.3.3.3. Architecture
9.3.3.4. Evolution
9.3.4. Comparison of Emulation-Based MCRs
9.4. MACRs
9.4.1. USMA IWAR
9.4.1.1. Introduction
9.4.1.2. Origin
9.4.1.3. Architecture
9.4.1.4. Evolution
9.4.2. Estonian CR
9.4.2.1. Introduction
9.4.2.2. Origin
9.4.2.3. Architecture
9.4.2.4. Evolution
9.4.3. KYPO Czech
9.4.3.1. Introduction
9.4.3.2. Origin
9.4.3.3. Architecture
9.4.3.4. Evolution
9.4.4. Comparison of MACRs
References
10. Existing Cyber Ranges in Academic Sector
10.1. Simulation-Based ACRs
10.1.1. SECUSIM
10.1.1.1. Introduction
10.1.1.2. Terminologies
10.1.1.3. Architecture
10.1.2. RINSE
10.1.2.1. Introduction
10.1.2.2. Architectural and Business Influences
10.1.2.3. Architecture
10.1.3. netEngine
10.1.3.1. Introduction
10.1.3.2. Architecture
10.1.4. OPNET CR
10.1.4.1. Introduction
10.1.4.2. Architecture
10.1.4.3. Simulation Workflow
10.1.5. Concordia Consortium
10.1.5.1. KYPO CR
10.1.5.2. TELECOM Nancy CR
10.1.5.3. RISE CR
10.1.5.4. Airbus CR
10.1.5.5. CODE CR
10.1.6. Comparison of Simulation-Based ACRs
10.2. Emulation-Based ACRs
10.2.1. VCSTC
10.2.1.1. Introduction
10.2.1.2. Architecture
10.2.2. LARIAT
10.2.2.1. Introduction
10.2.2.2. Architecture
10.2.3. Emulab
10.2.3.1. Introduction
10.2.3.2. Architecture
10.2.4. DETER
10.2.4.1. Introduction
10.2.4.2. DETERlab
10.2.4.3. Architecture
10.2.5. Virginia CR
10.2.5.1. Introduction
10.2.5.2. Architecture
10.2.6. Comparison of Emulation-Based ACRs
References
Index


๐Ÿ“œ SIMILAR VOLUMES


Introduction to the Cyber Ranges (Chapma
โœ Bishwajeet Pandey, Shabeer Ahmad ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Chapman & Hall ๐ŸŒ English

<p><span>Introduction to the Cyber Ranges</span><span> provides a comprehensive, integrative, easy-to-comprehend overview of different aspects involved in the cybersecurity arena. It expands on various concepts like cyber situational awareness, simulation and emulation environments, and cybersecurit

Introduction to the Cyber Ranges (Chapma
โœ Bishwajeet Pandey, Shabeer Ahmad ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Chapman & Hall ๐ŸŒ English

<p><span>Introduction to the Cyber Ranges</span><span> provides a comprehensive, integrative, easy-to-comprehend overview of different aspects involved in the cybersecurity arena. It expands on various concepts like cyber situational awareness, simulation and emulation environments, and cybersecurit

Introduction to Cyber Forensic Psycholog
โœ Majeed Khader, Loo Seng Neo, Whistine Xiau Ting Chai ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› World Scientific Pub Co Inc ๐ŸŒ English

This edited book, Introduction to Cyber Forensic Psychology: Understanding the Mind of the Cyber Deviant Perpetrators, is the first of its kind in Singapore, which explores emerging cybercrimes and cyber enabled crimes.Utilising a forensic psychology perspective to examine the mind of the cyber devi

Introduction to Cyber Forensic Psycholog
โœ Majeed Khader, Whistine Xiau Ting Chai, Loo Seng Neo, Khader (editor), Majeed (e ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› World Scientific Publishing Co ๐ŸŒ English

<p>This edited book, <em>Introduction to Cyber Forensic Psychology: Understanding the Mind of the Cyber Deviant Perpetrators</em>, is the first of its kind in Singapore, which explores emerging cybercrimes and cyber enabled crimes.Utilising a forensic psychology perspective to examine the mind of th