Buch, Englisch, 234 Seiten, HC runder Rücken kaschiert, Format (B × H): 160 mm x 241 mm, Gewicht: 559 g
Reihe: EAI/Springer Innovations in Communication and Computing
Buch, Englisch, 234 Seiten, HC runder Rücken kaschiert, Format (B × H): 160 mm x 241 mm, Gewicht: 559 g
Reihe: EAI/Springer Innovations in Communication and Computing
ISBN: 978-3-030-69173-8
Verlag: Springer International Publishing
This book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents. The authors discuss cybersecurity incident planning, starting from a draft response plan, to assigning responsibilities, to use of external experts, to equipping organization teams to address incidents, to preparing communication strategy and cyber insurance. They also discuss classifications and methods to detect cybersecurity incidents, how to organize the incident response team, how to conduct situational awareness, how to contain and eradicate incidents, and how to cleanup and recover. The book shares real-world experiences and knowledge from authors from academia and industry.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Technische Wissenschaften Elektronik | Nachrichtentechnik Nachrichten- und Kommunikationstechnik
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Computerkriminalität & Hacking
- Sozialwissenschaften Psychologie Psychologische Disziplinen Wirtschafts-, Arbeits- und Organisationspsychologie
Weitere Infos & Material
Introduction.- By Failing to Prepare – You are preparing to Fail.- Authentication Methods and Applications.- Design of Blockchain Polynomial Digests to Secure Method Authentication.- Need of Cybersecurity for ERP Systems.- IoT – Architecture Vulnerabilities and Security Measures.- Cybersecurity Advanced Persistent Threat Attacks.- Securing Deep Learning Neural Networks.- Three Tier Architecture to Mitigate DDoS attacks on Hybrid Cloud Environments.- Conclusion.