Description |
1 online resource (xxxii, 458 pages) : illustrations. |
Physical Medium |
polychrome |
Description |
text file |
Series |
River Publishers Series in Security and Digital Forensics
|
|
River Publishers series in security and digital forensics.
|
Bibliography |
Includes bibliographical references and index. |
Contents |
Front Cover; Half Title Page; RIVER PUBLISHERS SERIES IN SECURITY AND DIGITAL FORENSICS; Copyright Page; Contents; Foreword; Preface; Acknowledgements; List of Figures; List of Tables; List of Abbreviations; Introduction; Chapter 1 -- Relevance of Cyber Security Innovations; 1.1 Digital Transformation of State and Society; 1.1.1 State Program "Digital Economy"; 1.1.2 Main Information Infrastructure Development Objectives; 1.1.3 Implementation of the Long-Term Evolution (LTE) Technology; 1.1.4 IIoT/IoT Technologies Development; 1.2 Typical Cyber Security Threats |
|
1.2.1 Possible Scenarios of Cyber-Attack on the Information Infrastructure1.2.2 Threats and Consequences of Wireless LAN IEEE 802.1x Implementation; 1.2.3 Cyber Security Threats of Corporate Digital and IP-ATX (Private Automatic Telephone Exchanges); 1.2.4 Threats and Security Profile of the Mobile Operating System OS Sailfish and Tizen; 1.3 Cyber Security Threats Monitoring Necessity; 1.3.1 Cyber Security Incidents Factual Account; 1.3.2 Need for Joint Initiatives of Society and States; 1.3.3 Capture the Flag Competition on Vulnerability Detection |
|
1.3.4 Security Operations Center (SOC) Key RoleChapter 2 -- MSSP/MDR National Operator Development; 2.1 Ultimate Opportunity of National MSSP/MDR Operators; 2.1.1 Relevance of MSSP/MDR Cyber Security Services; 2.1.2 MSSP/MDR Best Organization PracticeThe MSSP market dynamics in North Americ; 2.1.3 Sample of MSSP by AT 2.1.4 Sample of MSSP Model by UBIqube; 2.1.5 Feasible Technical Solutions; 2.2 Possible Ways of Providing Cyber Security Services; 2.2.1 Typical MSSR/MDR Services; 2.2.2 IS Sourcing Model Analysis; 2.2.3 The IS Sourcing Practice |
|
2.2.4 Sample SLA Content for the Provision of Cyber Security Services2.2.5 Best Practices for Providing Cyber Security Service; 2.3 Development of National MSSP/MDR Based on Big Data; 2.3.1 Big Data Processing Requirements Analysis; 2.3.2 Best Big Data Processing Practice; 2.3.3 MSSP/MDR Subsystem Functionality for Big Data Processing; 2.3.4 Sensor Cloud Architecture Advantages; 2.4 New Methods of Cyber Security Knowledge Management; 2.4.1 Possible State of the Art; 2.4.2 Cyber Security MDM Principles; 2.4.3 MDM Cyber Security System Example |
|
Chapter 3 -- Innovative Methods for Detecting Anomalies3.1 Justification of a New Method for Detecting Anomalies; 3.1.1 Analysis of the Existing Approaches to the TCP/IP Network Abnormal Functioning Detection; 3.1.2 Possible Statement of the Detecting Anomalies' Problem; 3.1.3 Definition of New Informative Features; 3.1.4 Detection of Anomalies Based on Dimensions; 3.1.5 Investigation of Properties of Invariants of Dimension; 3.2 The Main Provisions of the New Method for Detecting Anomalies; 3.2.1 The Main Hypotheses for Detecting Anomalies; 3.2.2 Control of Semantic Correctness Criteria |
Note |
3.2.3 Sufficient Condition for the Criteria Fulfillment |
Local Note |
eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America |
Subject |
Computer security -- Russia (Federation) -- Case studies.
|
|
Computer security. |
|
Russia (Federation) |
Genre/Form |
Case studies.
|
Subject |
Electronic commerce -- Data processing -- Security measures -- Russia (Federation) -- Case studies.
|
|
Electronic commerce. |
|
Security systems. |
|
Business enterprises -- Technological innovations -- Security measures -- Russia (Federation) -- Case studies.
|
|
Business enterprises -- Technological innovations. |
Genre/Form |
Electronic books.
|
|
Case studies.
|
Other Form: |
Print version: Petrenko, Sergei. Cyber Security Innovation for the Digital Economy : A Case Study of the Russian Federation. Aalborg : River Publishers, ©2018 |
ISBN |
8770220212 |
|
9788770220217 (electronic book) |
|