𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Understanding Cyber Threats and Attacks

✍ Scribed by Ph.d. Mishra, Bimal Kumar (editor), Ph.d. Piqueira, Jose R. C. (editor)


Publisher
Nova Science Pub Inc
Tongue
English
Leaves
258
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Nowadays, the Internet has become all pervasive in the daily life around the world, transforming the old telephone set into a small multipurpose computer. Consequently, human life has radically changed. Our dependence on computer networks became undeniable and together with it, harmful programs or malwares, developed to damage machines or to steal information, represent permanent threat to individuals and society. In computer science a new work research line emerged: cyber-security, which includes developing models, routines and software to protect machines and networks from malicious programs. This new discipline has attracted researchers to develop ideas for protecting people and corporations. Cyber-security is the object of this book, that presents hints about how the community is working to manage these threats: Mathematical models based on epidemiology studies, control of malwares and virus propagation, protection of essential service plants to assure reliability, the direct impact of virus and malwares over human activities and behavior, Government entities which are highly concerned with the necessary preventive actions.

✦ Table of Contents


Contents
Preface
Chapter 1
Cyber Threats for the Oil and Gas Sector in an Age of Connected Production
Abstract
1. Introduction
2. History of Cyber Incidents and Threats to ICS in the Oil and Gas Sector
3. Cyber Vulnerabilities in Industrial Control Systems
3.1. Main Causes of Cybersecurity Breaches in ICS
3.2. Risks for ICS in the Oil and Gas Sector
4. Cybersecurity Management in the Oil and Gas Industry
4.1. Addressing Cyber Threats: Assessment and Mitigation Strategies
Conclusion
References
Chapter 2
Exploring the Delayed and Optimally Controlled Dynamics of Malicious Objects in Computer Network
Chapter 3
Cyber Threats and Attacks in Smart Energy Networks
Abstract
1. Introduction
2. Smart Energy Systems
3. Cyber-Security Concerns for Smart Energy Systems
3.1. Cyber Vulnerabilities and Impacts on energy Grids
3.2. Cyber-Interdependency
4. Cyber-Security Concerns for Communication Infrastructure in Smart Energy Grids
4.1. SCADA (Supervisory Control and Data Acquisition)
4.2. AMI (Advanced Metering Infrastructure)
4.3. Customer Energy Management System
4.4. Other Communication Infrastructure
5. Cyber-Security Requirements
5.1. Integrity
5.2. Availability
5.3. Confidentiality
6. Cyber-Attack Mitigation Techniques for Smart Energy Systems
6.1. TCP/IP Protocol
6.2. Blockchain Technology
6.3. Self-Organising Architecture
6.4. Security Control Suggested by the National Institute of Standard and Technology
7. Real World Cyber-Attacks and Incidents on Energy Systems
7.1. Blackout in Italy
7.2. Blackout in Ukraine
7.3. Cyber-Attack on Gas Pipeline in the USA
Conclusion
References
Chapter 4
A Twofold Mathematical Model to Study the Malware Attack of Compromised IoT Botnet on Targeted Networks
Abstract
Introduction
Literature Review
Hipothesis And Model Formulation
Mathematical Analysis of the Model
Basic Reproduction Number
Existence and Local Stability of Equilibrium
Local Stability of the Infection-Free Equilibrium
Local Stability of the Endemic Equilibrium
Numerical Simulations and Discussion
Summary
References
Chapter 5
A Survey on Compartmental Models in Computer Viruses
Abstract
Introduction
Computers and Epidemiology
Participants
Some Compartimental Models
Review for Models of Computer Virus Spread
Conclusion
Conflict of Interests
References
Chapter 6
Rethinking Cybersecurity as a Group Phenomenon: Impact of Shared Mental Models on Cybersecurity Decisions within Communities of Practice
Abstract
1. Introduction
2. Research
3. Methodology
3.1. Case Study Participants
3.2. Recruitment
3.3. Study Procedure
3.4. Data Collection
3.5. Data Analysis
4. Results
Organizational Context of Cybersecurity
4.1. Technical Professional (TP) CoP
Shared Security Belief Themes
Security Decisions
4.2. Accounting and Finance CoP
Shared Security Belief Themes
Shared Security Decisions
4.3. Healthcare
Shared Security Belief Themes
5. Discussion
Conclusion
References
Chapter 7
Auditing National Cybersecurity Strategies in Order to Protect Nation-States’ Cyber Assets
Abstract
1. Introduction
2. About Our Research
2.1. National Cybersecurity Strategies (NCSS)
2.2. The National CyberSecurity Strategy Model (NCSSM)
2.2.1. Input
2.2.2. The Pillars
2.2.3. Outcomes
2.3. The CyberSecurity Audit Model (CSAM)
2.3.1. Overview
2.3.2. Resources
2.3.3. Domains
2.3.4. Sub-Domains
2.3.5. Controls
2.3.6. Checklists
2.3.7. Guideline Assessment
2.3.8. Evaluation Scorecard
2.4. How to Audit any National Cybersecurity Strategy (NCSS) Using the CSAM
2.5. Overall Nation State CyberSecurity Readiness (NSCSR)
Conclusion and Further Research
References
Biographical Sketch
Chapter 8
Effect of Vaccination on the Attack of Malicious Objects in Wireless Network
Abstract
Nomenclature
1. Introduction
2. Hypothesis and Model Formulation
3. E-Epidemic Model of Worm Spread in Wireless Sensor Network
4. Existence and Stability of Equilibrium
4.1. SIRV Model, Its Equilibrium Points and Stability
4.2. SIV Model, Its Equilibrium Points and Stability
4.2.1. Theorem 1
4.2.2. Theorem 2
5. Numerical Simulation
Conclusion
References
Chapter 9
Mathematical Model on Cyberattack Behavior in E-Commerce
Abstract
Introduction
Methods
Basic Terminologies
Susceptible Consumer Class
Vulnerable Consumer Class
Aggrieved Consumer Class
Recovered Consumer Class
Nomenclature
Hypothesis and Model Formulation
Model Formulation
Existence and Stability of Equilibrium
The Basic Reproduction Number
Local and Global Stability
Numerical Simulations and Discussion
Conclusion
References
Chapter 10
Understanding Cyber Threats and Cyber Attacks on Satellites
Abstract
Introduction
2. Small Satellites
3. Vulnerabilities
4. Security Is Moving Target
5. What the Industry Needs to Do Moving Forward
6. New Space Companies and the Cyber Question
6.1. Cyber Attacks
7. Cyber Defense
8. Cyber Attacks on Satellites
Conclusion
References
About the Editors
Index
Blank Page


πŸ“œ SIMILAR VOLUMES


Cyber-Physical Attacks: A Growing Invisi
✍ George Loukas πŸ“‚ Library πŸ“… 2015 πŸ› Butterworth-Heinemann 🌐 English

<p><i>Cyber-Physical Attacks:Β A Growing Invisible Threat</i>Β presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building’s lights, make a car veer off the road,Β  or a drone land in enemy hands. In essence, it details the ways cyber-physical attack

Cyber-physical attacks: a growing invisi
✍ Loukas, George πŸ“‚ Library πŸ“… 2015 πŸ› Butterworth-Heinemann is an imprint of Elsevier 🌐 English

"Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are re

Collaborative cyber threat intelligence
✍ Florian Skopik πŸ“‚ Library πŸ“… 2018 πŸ› Auerbach Publications;CRC Press 🌐 English

<P>Threat intelligence is a surprisingly complex topic that goes far beyond the obvious technical challenges of collecting, modelling and sharing technical indicators. Most books in this area focus mainly on technical measures to harden a system based on threat intel data and limit their scope to si

Cyber Threat!: How to Manage the Growing
✍ MacDonnell Ulsch πŸ“‚ Library πŸ“… 2014 πŸ› Wiley 🌐 English

Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nations most highly respected

Cyber Threat!: How to Manage the Growing
✍ MacDonnell Ulsch πŸ“‚ Library πŸ“… 2014 πŸ› Wiley 🌐 English

Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected