<p><span>CYBER SECURITY AND NETWORK SECURITY</span></p><p><span>Written and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other professionals.
The Cyber Security Network Guide
✍ Scribed by Fiedelholtz
- Publisher
- Springer
- Year
- 2020
- Tongue
- English
- Leaves
- 104
- Series
- Studies in Systems, Decision and Control, 274
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
✦ Table of Contents
Preface
Acknowledgements
Introduction
Chapter 1 Pre-incident Planning and Analysis
Chapter 2 Incident Detection and Characterization
Chapter 3 Vulnerability/Consequence Analysis
Chapter 4 Incident Response and Recovery
Chapter 5 Cloud Architecture
Chapter 6 Lessons Learned
Contents
List of Figures
1 Pre-incident Planning and Analysis
1.1 Steady-State and Continuous Monitoring
2 Incident Detection and Characterization
2.1 Detection
2.2 Threat Analysis
2.3 Malware Analysis
2.4 Cyber Incident Threat Information Process
References
3 Vulnerability/Consequence Analysis
3.1 Information Sharing
3.2 Vulnerability/Consequence Analysis
3.2.1 Collect Cyber Data
3.2.2 Physical Analysis of Cyber Controlled/Reliant Systems
3.3 Dependency/Interdependency Analysis
3.3.1 Identify Internal Impacts
3.3.2 Identify External Impacts
3.4 Analysis Reporting
References
4 Incident Response and Recovery
4.1 Information Sharing
4.1.1 Cyber Incident Response
4.1.2 Notify Authority of Cyber Operation Center
4.1.3 Review and Provide Feedback from the Cyber Operational Center
4.1.4 Coordinate for Cyber-Physical Analysis
4.1.5 Produce and Share Analysis
4.1.6 Provide Situational Awareness
4.2 Mitigation Activities
4.2.1 Identify and Review Physical System Configuration
4.2.2 Estimate Recovery of the Systems
4.2.3 Develop and Implement Courses of Action
4.3 Response and Recovery
4.3.1 Describe Resiliency of the Infrastructure in Question to Determine Response and Recovery Action Plans
4.3.2 Identify Constraints and/or Limitations of the Response and Recovery Action Plans
4.3.3 Project Timeframe for Response and Recovery Plans
4.3.4 Local, State, Regional, and National Consequences
4.3.5 Qualitative/Quantitative Likelihood and Consequence of Disruption Event Response
4.3.6 Product Distribution
4.4 Cyber-Physical Digital Media Analysis
References
5 Cloud Architecture
5.1 Cloud Service Models
5.2 Deployment Models
5.3 Amazon Web Services (AWS) Cloud Models
5.4 Azure Microsoft Web Services Cloud Models
6 Lessons Learned
Reference
Appendix A Cyber Network Hardware and Software Operating Procedure (SOP)
Appendix B Cyber-Physical Mapping Framework Analysis Process Matrix
Appendix C OWASP Top Ten Cyber Attacks
Appendix D Structured Threat Information EXpression (STIX™)
D.1 STIX™
D.2 CybOX™
D.3 TAXII™
Appendix E Open Systems Interconnection (OSI) Reference Model
E.1 Physical Layer
E.2 Data Link Layer
E.3 Network Layer
E.4 Transport Layer
E.5 Session Layer
E.6 Presentation Layer
E.7 Application Layer
E.8 The User
Appendix F Cybersecurity Toolsa
Appendix G Acronyms and Abbreviations
Appendix H Glossary of Termsa
References
📜 SIMILAR VOLUMES
There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyz