Cybersecurity: protecting critical infrastructures from cyber attack and cyber warfare
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Boca Raton [u.a.]
CRC Press
2015
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Klappentext |
Beschreibung: | XVI, 347 S. graph. Darst. 24 cm |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV042578361 | ||
003 | DE-604 | ||
005 | 20170508 | ||
007 | t | ||
008 | 150524s2015 d||| |||| 00||| eng d | ||
020 | |z 9781482239225 |c hardback |9 978-1-4822-3922-5 | ||
020 | |z 1482239221 |c hardback |9 1-4822-3922-1 | ||
035 | |a (OCoLC)911203509 | ||
035 | |a (DE-599)BVBBV042578361 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-703 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Cybersecurity |b protecting critical infrastructures from cyber attack and cyber warfare |c ed. by Thomas A. Johnson |
264 | 1 | |a Boca Raton [u.a.] |b CRC Press |c 2015 | |
300 | |a XVI, 347 S. |b graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 0 | 1 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Johnson, Thomas J. |d 1960- |e Sonstige |0 (DE-588)137168373 |4 oth | |
856 | 4 | 2 | |m Digitalisierung UB Bayreuth - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028011783&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Bayreuth - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028011783&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
999 | |a oai:aleph.bib-bvb.de:BVB01-028011783 |
Datensatz im Suchindex
_version_ | 1804174734732034048 |
---|---|
adam_text | Contents
Ñ
Preface ix
Acknowledgments xi
Editor ft ft ft
Xlll
Contributors XV
1 Historical Reference Points in the Computer
Industry and Emerging Challenges in Cybersecurity 1
THOMAS A. JOHNSON
2 Critical Infrastructures, Key Assets:
A Target-Rich Environment 33
THOMAS A. JOHNSON
3 Protection and Engineering Design Issues in
Critical Infrastructures 67
FRED COHEN
4 Cyber Intelligence, Cyber Conflicts, and
Cyber Warfare 155
THOMAS A. JOHNSON
5 Cybersecurity: A Primer of U.S. and
International Legal Aspects 199
JULIE LOWRIE
6 Economic Cost of Cybersecurity 255
THOMAS A. JOHNSON
7 Cybersecurity Threat Landscape and Future
Trends 287
THOMAS A. JOHNSON
Index 327
Vil
CYBERSECURITY
CYBERSEGURITY
Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare
The World Economic Forum regards the threat of cyber attack as one of the top five global risks
confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of
the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt
critical services, and induce a wide range of damage is becoming more difficult to defend against.
This book examines the current cyber threat landscape and discusses the strategies being used by
governments and corporations to protect against these threats.
The book first provides a historical reference, detailing the emergence of viruses, worms, malware,
and other cyber threats that created the need for the cybersecurity field. It then discusses the
vulnerabilities of our critical infrastructures, the broad arsenal of cyber attack tools, and the various
engineering design issues involved in protecting our infrastructures. It goes on to cover cyber
intelligence tactics, recent examples of cyber conflict and warfare, and the key issues in formulating
a national strategy to defend against cyber warfare.
The book also discusses how to assess and measure the cost of cybersecurity. It examines the
many associated cost factors and presents the results of several important industry-based economic
studies of security breaches that have occurred within many nations. The book concludes with a look
at future trends in cybersecurity. It discusses the potential impact of industry-wide transformational
changes, such as virtualization, social media, cloud computing, structured and unstructured data, big
data, and data analytics.
Features:
• Examines the threat spectrum of cyberspace attacks and cyber weapons
• Defines the arsenal of cyber tools and new sophisticated attacks
• Discusses the need for an architecture of cloud computing for cyber and counter intelligence
• Emphasizes the Department of Defense’s role and the expansion of new mission forces to
battle in cyberspace
• Covers the US and international legal aspects of cybersecurity
• Describes the difficulty of calculating the costs of defending against cyber attacks
ISBN: 170-1-14022-3*122-5
|
any_adam_object | 1 |
author_GND | (DE-588)137168373 |
building | Verbundindex |
bvnumber | BV042578361 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)911203509 (DE-599)BVBBV042578361 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01958nam a2200397 c 4500</leader><controlfield tag="001">BV042578361</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170508 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">150524s2015 d||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781482239225</subfield><subfield code="c">hardback</subfield><subfield code="9">978-1-4822-3922-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1482239221</subfield><subfield code="c">hardback</subfield><subfield code="9">1-4822-3922-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)911203509</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042578361</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-703</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity</subfield><subfield code="b">protecting critical infrastructures from cyber attack and cyber warfare</subfield><subfield code="c">ed. by Thomas A. Johnson</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton [u.a.]</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVI, 347 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Johnson, Thomas J.</subfield><subfield code="d">1960-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)137168373</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bayreuth - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028011783&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bayreuth - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028011783&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028011783</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV042578361 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:05:06Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028011783 |
oclc_num | 911203509 |
open_access_boolean | |
owner | DE-12 DE-703 |
owner_facet | DE-12 DE-703 |
physical | XVI, 347 S. graph. Darst. 24 cm |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | CRC Press |
record_format | marc |
spelling | Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare ed. by Thomas A. Johnson Boca Raton [u.a.] CRC Press 2015 XVI, 347 S. graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Computersicherheit (DE-588)4274324-2 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Computerkriminalität (DE-588)4010452-7 s Information warfare (DE-588)4461975-3 s Computersicherheit (DE-588)4274324-2 s DE-604 Johnson, Thomas J. 1960- Sonstige (DE-588)137168373 oth Digitalisierung UB Bayreuth - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028011783&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung UB Bayreuth - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028011783&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Klappentext |
spellingShingle | Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare Computersicherheit (DE-588)4274324-2 gnd Information warfare (DE-588)4461975-3 gnd Computerkriminalität (DE-588)4010452-7 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4461975-3 (DE-588)4010452-7 (DE-588)4143413-4 |
title | Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare |
title_auth | Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare |
title_exact_search | Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare |
title_full | Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare ed. by Thomas A. Johnson |
title_fullStr | Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare ed. by Thomas A. Johnson |
title_full_unstemmed | Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare ed. by Thomas A. Johnson |
title_short | Cybersecurity |
title_sort | cybersecurity protecting critical infrastructures from cyber attack and cyber warfare |
title_sub | protecting critical infrastructures from cyber attack and cyber warfare |
topic | Computersicherheit (DE-588)4274324-2 gnd Information warfare (DE-588)4461975-3 gnd Computerkriminalität (DE-588)4010452-7 gnd |
topic_facet | Computersicherheit Information warfare Computerkriminalität Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028011783&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028011783&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT johnsonthomasj cybersecurityprotectingcriticalinfrastructuresfromcyberattackandcyberwarfare |