توضیحاتی در مورد کتاب Understanding Cyber Threats and Attacks
نام کتاب : Understanding Cyber Threats and Attacks
عنوان ترجمه شده به فارسی : درک تهدیدها و حملات سایبری
سری :
نویسندگان : Ph.d. Mishra, Bimal Kumar (editor), Ph.d. Piqueira, Jose R. C. (editor)
ناشر : Nova Science Pub Inc
سال نشر :
تعداد صفحات : 258
ISBN (شابک) : 9781536183368 , 1536183369
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 27 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Contents\nPreface\nChapter 1\nCyber Threats for the Oil and Gas Sector in an Age of Connected Production\n Abstract\n 1. Introduction\n 2. History of Cyber Incidents and Threats to ICS in the Oil and Gas Sector\n 3. Cyber Vulnerabilities in Industrial Control Systems\n 3.1. Main Causes of Cybersecurity Breaches in ICS\n 3.2. Risks for ICS in the Oil and Gas Sector\n 4. Cybersecurity Management in the Oil and Gas Industry\n 4.1. Addressing Cyber Threats: Assessment and Mitigation Strategies\n Conclusion\n References\nChapter 2\nExploring the Delayed and Optimally Controlled Dynamics of Malicious Objects in Computer Network\nChapter 3\nCyber Threats and Attacks in Smart Energy Networks\n Abstract\n 1. Introduction\n 2. Smart Energy Systems\n 3. Cyber-Security Concerns for Smart Energy Systems\n 3.1. Cyber Vulnerabilities and Impacts on energy Grids\n 3.2. Cyber-Interdependency\n 4. Cyber-Security Concerns for Communication Infrastructure in Smart Energy Grids\n 4.1. SCADA (Supervisory Control and Data Acquisition)\n 4.2. AMI (Advanced Metering Infrastructure)\n 4.3. Customer Energy Management System\n 4.4. Other Communication Infrastructure\n 5. Cyber-Security Requirements\n 5.1. Integrity\n 5.2. Availability\n 5.3. Confidentiality\n 6. Cyber-Attack Mitigation Techniques for Smart Energy Systems\n 6.1. TCP/IP Protocol\n 6.2. Blockchain Technology\n 6.3. Self-Organising Architecture\n 6.4. Security Control Suggested by the National Institute of Standard and Technology\n 7. Real World Cyber-Attacks and Incidents on Energy Systems\n 7.1. Blackout in Italy\n 7.2. Blackout in Ukraine\n 7.3. Cyber-Attack on Gas Pipeline in the USA\n Conclusion\n References\nChapter 4\nA Twofold Mathematical Model to Study the Malware Attack of Compromised IoT Botnet on Targeted Networks\n Abstract\n Introduction\n Literature Review\n Hipothesis And Model Formulation\n Mathematical Analysis of the Model\n Basic Reproduction Number\n Existence and Local Stability of Equilibrium\n Local Stability of the Infection-Free Equilibrium\n Local Stability of the Endemic Equilibrium\n Numerical Simulations and Discussion\n Summary\n References\nChapter 5\nA Survey on Compartmental Models in Computer Viruses\n Abstract\n Introduction\n Computers and Epidemiology\n Participants\n Some Compartimental Models\n Review for Models of Computer Virus Spread\n Conclusion\n Conflict of Interests\n References\nChapter 6\nRethinking Cybersecurity as a Group Phenomenon: Impact of Shared Mental Models on Cybersecurity Decisions within Communities of Practice\n Abstract\n 1. Introduction\n 2. Research\n 3. Methodology\n 3.1. Case Study Participants\n 3.2. Recruitment\n 3.3. Study Procedure\n 3.4. Data Collection\n 3.5. Data Analysis\n 4. Results\n Organizational Context of Cybersecurity\n 4.1. Technical Professional (TP) CoP\n Shared Security Belief Themes\n Security Decisions\n 4.2. Accounting and Finance CoP\n Shared Security Belief Themes\n Shared Security Decisions\n 4.3. Healthcare\n Shared Security Belief Themes\n 5. Discussion\n Conclusion\n References\nChapter 7\nAuditing National Cybersecurity Strategies in Order to Protect Nation-States’ Cyber Assets\n Abstract\n 1. Introduction\n 2. About Our Research\n 2.1. National Cybersecurity Strategies (NCSS)\n 2.2. The National CyberSecurity Strategy Model (NCSSM)\n 2.2.1. Input\n 2.2.2. The Pillars\n 2.2.3. Outcomes\n 2.3. The CyberSecurity Audit Model (CSAM)\n 2.3.1. Overview\n 2.3.2. Resources\n 2.3.3. Domains\n 2.3.4. Sub-Domains\n 2.3.5. Controls\n 2.3.6. Checklists\n 2.3.7. Guideline Assessment\n 2.3.8. Evaluation Scorecard\n 2.4. How to Audit any National Cybersecurity Strategy (NCSS) Using the CSAM\n 2.5. Overall Nation State CyberSecurity Readiness (NSCSR)\n Conclusion and Further Research\n References\n Biographical Sketch\nChapter 8\nEffect of Vaccination on the Attack of Malicious Objects in Wireless Network\n Abstract\n Nomenclature\n 1. Introduction\n 2. Hypothesis and Model Formulation\n 3. E-Epidemic Model of Worm Spread in Wireless Sensor Network\n 4. Existence and Stability of Equilibrium\n 4.1. SIRV Model, Its Equilibrium Points and Stability\n 4.2. SIV Model, Its Equilibrium Points and Stability\n 4.2.1. Theorem 1\n 4.2.2. Theorem 2\n 5. Numerical Simulation\n Conclusion\n References\nChapter 9\nMathematical Model on Cyberattack Behavior in E-Commerce\n Abstract\n Introduction\n Methods\n Basic Terminologies\n Susceptible Consumer Class\n Vulnerable Consumer Class\n Aggrieved Consumer Class\n Recovered Consumer Class\n Nomenclature\n Hypothesis and Model Formulation\n Model Formulation\n Existence and Stability of Equilibrium\n The Basic Reproduction Number\n Local and Global Stability\n Numerical Simulations and Discussion\n Conclusion\n References\nChapter 10\nUnderstanding Cyber Threats and Cyber Attacks on Satellites\n Abstract\n Introduction\n 2. Small Satellites\n 3. Vulnerabilities\n 4. Security Is Moving Target\n 5. What the Industry Needs to Do Moving Forward\n 6. New Space Companies and the Cyber Question\n 6.1. Cyber Attacks\n 7. Cyber Defense\n 8. Cyber Attacks on Satellites\n Conclusion\n References\nAbout the Editors\nIndex\nBlank Page