Theoretical cybersecurity: principles and advanced concepts

There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text aimed at encouraging abstract an...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Oakley, Jacob G. (VerfasserIn), Butler, Michael (VerfasserIn), York, Wayne (VerfasserIn), Puckett, Matthew (VerfasserIn), Sewell, J. Louis (VerfasserIn)
Format: Buch
Sprache:English
Veröffentlicht: New York Apress [2022]
Schlagworte:
Zusammenfassung:There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text aimed at encouraging abstract and intellectual exploration of cybersecurity from the philosophical and speculative perspective. Technological innovation is certainly necessary, as it furthers the purveying of goods and services for cybersecurity producers in addition to securing the attack surface of cybersecurity consumers where able. The issue is that the industry, sector, and even academia are largely technologically focused. There is not enough work done to further the trade—the craft of cybersecurity. This book frames the cause of this and other issues, and what can be done about them.
Potential methods and directions are outlined regarding how the industry can evolve to embrace theoretical cybersecurity innovation as it pertains to the art, as much as to the science. To do this, a taxonomy of the cybersecurity body of work is laid out to identify how the influences of the industry’s past and present constrain future innovation. Then, cost-benefit analysis and right-sizing of cybersecurity roles and responsibilities—as well as defensible experimentation concepts—are presented as the foundation for moving beyond some of those constraining factors that limit theoretical cybersecurity innovation.
Lastly, examples and case studies demonstrate future-oriented topics for cybersecurity theorization such as game theory, infinite-minded methodologies, and strategic cybersecurity implementations.What you’ll learn- The current state of the cybersecurity sector and how it constrains theoretical innovationHow to understand attacker and defender cost benefit - The detect, prevent, and accept paradigm- How to build your own cybersecurity box- Supporting cybersecurity innovation through defensible experimentation- How to implement strategic cybersecurity- Infinite vs finite game play in cybersecurityWho This Book Is ForThis book is for both practitioners of cybersecurity and those who are required to, or choose to, employ such services, technology, or capabilities
Beschreibung:Chapter 1. Introduction to Strategic Cybersecurity; Discuss what strategic cybersecurity is; Discussion on how it is not cybersecurity strategy; ; Chapter 2. No one cares about cybersecurity; Real motivations; Consequences; How can cybersecurity help them in spite of themselves?; ; Chapter 3. Cost-Benefit & Cybersecurity; Cost-Benefit to the defender; Cost-Benefit to the attacker; ; Chapter 4. What is the box that is cybersecurity?; Where do we draw the line?; What are areas that should be abandoned; What are areas that should be explored; ; Chapter 5. The detect, prevent, accept paradigm; Outline the paradigm; Case studies; ; Chapter 6. Building your own cybersecurity box; What is out of the cyber domain: sim swapping, go daddy; What is likely to be your attacker; What is likely to be your loss; ; Chapter 7. Cybersecurity as a material ; Capability Analysis; Sourcing; Test and evaluation; Utilization; Deprecation; Failure analysis; ; Chapter 8. Cybersecurity as infrastructure; A comparison to electricity; How do we get there and what will it mean?; ; Chapter 9. Strategic Defensive Security; Detect; Identify; Monitor; Hunt; ; Chapter 10. Strategic Offensive Security; Penetration testing; Red Teaming; Reverse Red Teaming; ; Chapter 11. Strategic Assurance; Frameworks; Auditing; Case study; ; Chapter 12. Strategic cybersecurity in commercial sectors; The approach; Case study; ; Chapter 13. Strategic cybersecurity in accountable sectors; Healthcare approach; Case study; Financial approach; Case study; ; Chapter 14. Strategic Magic; AI; ML; Block Chain; ; Chapter 15. Looking Forward; Where is the theory-craft?; We need new ideas and paradigms as much as we need new technology; Why is it difficult for academia to evolve cybersecurity?; Especially offensive cybersecurity; What is wrong with cybersecurity currently in academics; Degree programs; Unrealistic expectations; Potential solutions; Why does industry often lack an academic approach?
Beschreibung:xvi, 213 Seiten Illustrationen 361 grams
ISBN:9781484282991

Es ist kein Print-Exemplar vorhanden.

Fernleihe Bestellen Achtung: Nicht im THWS-Bestand!