|
Showing 1 - 4 of
4 matches in All Departments
Internet of Things (IoT) is an ecosystem comprised of heterogeneous
connected devices that communicate to deliver capabilities making
our living, cities, transport, energy, and other areas more
intelligent. This book delves into the different cyber-security
domains and their challenges due to the massive amount and the
heterogeneity of devices. This book introduces readers to the
inherent concepts of IoT. It offers case studies showing how IoT
counteracts the cyber-security concerns for domains. It provides
suggestions on how to mitigate cyber threats by compiling a
catalogue of threats that currently comprise the contemporary
threat landscape. It then examines different security measures that
can be applied to system installations or operational environment
and discusses how these measures may alter the threat
exploitability level and/or the level of the technical impact.
Professionals, graduate students, researchers, academicians, and
institutions that are interested in acquiring knowledge in the
areas of IoT and cyber-security, will find this book of interest.
Cyber-Security Threats, Actors, and Dynamic Mitigation provides
both a technical and state-of-the-art perspective as well as a
systematic overview of the recent advances in different facets of
cyber-security. It covers the methodologies for modeling attack
strategies used by threat actors targeting devices, systems, and
networks such as smart homes, critical infrastructures, and
industrial IoT. With a comprehensive review of the threat
landscape, the book explores both common and sophisticated threats
to systems and networks. Tools and methodologies are presented for
precise modeling of attack strategies, which can be used both
proactively in risk management and reactively in intrusion
prevention and response systems. Several contemporary techniques
are offered ranging from reconnaissance and penetration testing to
malware detection, analysis, and mitigation. Advanced machine
learning-based approaches are also included in the area of
anomaly-based detection, that are capable of detecting attacks
relying on zero-day vulnerabilities and exploits. Academics,
researchers, and professionals in cyber-security who want an
in-depth look at the contemporary aspects of the field will find
this book of interest. Those wanting a unique reference for various
cyber-security threats and how they are detected, analyzed, and
mitigated will reach for this book often.
The proceedings includes a selection of papers covering a range of
subjects focusing on topical areas of computer networks and
security with a specific emphasis of novel environments, ranging
from 5G and virtualised infrastructures to Internet of things,
smart environments and cyber security issues. Networking represents
the underlying core of current IT systems, providing the necessary
communication support for complex infrastructures. Recent years
have witnessed a number of novel concepts moving from theory to
large scale implementations, such as Software Defined Networking,
Network Function Virtualisation, 5G, smart environments, and IoT.
These concepts change fundamentally the paradigms used in
traditional networking, with a number of areas such as network
routing and system or business security having to adjust or
redesign to accommodate them. While the benefits are clear, through
the advent of new applications, use cases, improved user
interaction and experience, they also introduce new challenges for
generic network architectures, mobility, security, traffic
engineering.
The proceedings includes a selection of papers covering a range of
subjects focusing on topical areas of computer networks and
security with a specific emphasis of novel environments, ranging
from 5G and virtualised infrastructures to Internet of things,
smart environments and cyber security issues. Networking represents
the underlying core of current IT systems, providing the necessary
communication support for complex infrastructures. Recent years
have witnessed a number of novel concepts moving from theory to
large scale implementations, such as Software Defined Networking,
Network Function Virtualisation, 5G, smart environments, and IoT.
These concepts change fundamentally the paradigms used in
traditional networking, with a number of areas such as network
routing and system or business security having to adjust or
redesign to accommodate them. While the benefits are clear, through
the advent of new applications, use cases, improved user
interaction and experience, they also introduce new challenges for
generic network architectures, mobility, security, traffic
engineering.
|
You may like...
Higher
Michael Buble
CD
(1)
R172
R154
Discovery Miles 1 540
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|