Adaptive security and cyber assurance for risk-based decision making:
This book explores adaptive security techniques through CyberAssurance for risk-based decision making in the context of software-based systems and discusses ways to achieve it. It identifies a discipline termed CyberAssurance, which considers the interactions of assurance-enhancing technology, syste...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA, USA
IGI Global
[2023]
|
Schriftenreihe: | Advances in systems analysis, software engineering, and high performance computing (ASASEHPC) book series
|
Schlagworte: | |
Online-Zugang: | DE-898 DE-83 DE-91 DE-706 DE-1050 Volltext |
Zusammenfassung: | This book explores adaptive security techniques through CyberAssurance for risk-based decision making in the context of software-based systems and discusses ways to achieve it. It identifies a discipline termed CyberAssurance, which considers the interactions of assurance-enhancing technology, system architecture, and the development life cycle. It looks at trust-enhancing technology in some detail, articulating a strategy based on three main prongs: building software that behaves securely (high-confidence design techniques), executing software in a protected environment (containment), and monitoring software execution for malicious behavior (detection). Applying these three prongs in combination in the proper architectural and life cycle contexts provides the best risk strategy methods for increasing our trust in software-based for Internet of Things (IoT), Cloud, and Edge systems. |
Beschreibung: | 1 Online-Ressource (xiii, 243 Seiten) Illustrationen, Diagramme |
ISBN: | 9781668477687 |
DOI: | 10.4018/978-1-6684-7766-3 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV048933915 | ||
003 | DE-604 | ||
005 | 20241212 | ||
007 | cr|uuu---uuuuu | ||
008 | 230509s2023 xx a||| o|||| 00||| eng d | ||
020 | |a 9781668477687 |9 978-1-6684-7768-7 | ||
024 | 7 | |a 10.4018/978-1-6684-7766-3 |2 doi | |
035 | |a (ZDB-98-IGB)00309585 | ||
035 | |a (OCoLC)1379389593 | ||
035 | |a (DE-599)BVBBV048933915 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-83 |a DE-898 |a DE-706 |a DE-1050 | ||
082 | 0 | |a 005.8 | |
084 | |a WIR 523 |2 stub | ||
084 | |a DAT 000 |2 stub | ||
100 | 1 | |a Brooks, Tyson T. |0 (DE-588)1128104415 |4 aut | |
245 | 1 | 0 | |a Adaptive security and cyber assurance for risk-based decision making |c Tyson T. Brooks |
264 | 1 | |a Hershey PA, USA |b IGI Global |c [2023] | |
300 | |a 1 Online-Ressource (xiii, 243 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in systems analysis, software engineering, and high performance computing (ASASEHPC) book series | |
520 | |a This book explores adaptive security techniques through CyberAssurance for risk-based decision making in the context of software-based systems and discusses ways to achieve it. It identifies a discipline termed CyberAssurance, which considers the interactions of assurance-enhancing technology, system architecture, and the development life cycle. It looks at trust-enhancing technology in some detail, articulating a strategy based on three main prongs: building software that behaves securely (high-confidence design techniques), executing software in a protected environment (containment), and monitoring software execution for malicious behavior (detection). Applying these three prongs in combination in the proper architectural and life cycle contexts provides the best risk strategy methods for increasing our trust in software-based for Internet of Things (IoT), Cloud, and Edge systems. | ||
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Management information systems |x Security measures | |
650 | 4 | |a Computer crimes |x Risk assessment | |
650 | 4 | |a Adaptive computing systems | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-1-6684-7766-3 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-1-6684-7767-0 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-6684-7766-1 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-6684-7766-3 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034197810 | |
966 | e | |u https://doi.org/10.4018/978-1-6684-7766-3 |l DE-898 |p ZDB-98-IGB |q FHR_PDA_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-7766-3 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-7766-3 |l DE-91 |p ZDB-98-IGB |q TUM_Paketkauf_2023 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-7766-3 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-7766-3 |l DE-1050 |p ZDB-98-IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818715324366716928 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Brooks, Tyson T. |
author_GND | (DE-588)1128104415 |
author_facet | Brooks, Tyson T. |
author_role | aut |
author_sort | Brooks, Tyson T. |
author_variant | t t b tt ttb |
building | Verbundindex |
bvnumber | BV048933915 |
classification_tum | WIR 523 DAT 000 |
collection | ZDB-98-IGB |
ctrlnum | (ZDB-98-IGB)00309585 (OCoLC)1379389593 (DE-599)BVBBV048933915 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Wirtschaftswissenschaften |
discipline_str_mv | Informatik Wirtschaftswissenschaften |
doi_str_mv | 10.4018/978-1-6684-7766-3 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV048933915</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20241212</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230509s2023 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781668477687</subfield><subfield code="9">978-1-6684-7768-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-6684-7766-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)00309585</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1379389593</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048933915</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-1050</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">WIR 523</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Brooks, Tyson T.</subfield><subfield code="0">(DE-588)1128104415</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Adaptive security and cyber assurance for risk-based decision making</subfield><subfield code="c">Tyson T. Brooks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiii, 243 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in systems analysis, software engineering, and high performance computing (ASASEHPC) book series</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book explores adaptive security techniques through CyberAssurance for risk-based decision making in the context of software-based systems and discusses ways to achieve it. It identifies a discipline termed CyberAssurance, which considers the interactions of assurance-enhancing technology, system architecture, and the development life cycle. It looks at trust-enhancing technology in some detail, articulating a strategy based on three main prongs: building software that behaves securely (high-confidence design techniques), executing software in a protected environment (containment), and monitoring software execution for malicious behavior (detection). Applying these three prongs in combination in the proper architectural and life cycle contexts provides the best risk strategy methods for increasing our trust in software-based for Internet of Things (IoT), Cloud, and Edge systems.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Risk assessment</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Adaptive computing systems</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-1-6684-7766-3</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-1-6684-7767-0</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-6684-7766-1</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-6684-7766-3</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034197810</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-7766-3</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHR_PDA_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-7766-3</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-7766-3</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUM_Paketkauf_2023</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-7766-3</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-7766-3</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048933915 |
illustrated | Illustrated |
index_date | 2024-07-03T21:57:51Z |
indexdate | 2024-12-17T19:01:33Z |
institution | BVB |
isbn | 9781668477687 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034197810 |
oclc_num | 1379389593 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-83 DE-898 DE-BY-UBR DE-706 DE-1050 |
owner_facet | DE-91 DE-BY-TUM DE-83 DE-898 DE-BY-UBR DE-706 DE-1050 |
physical | 1 Online-Ressource (xiii, 243 Seiten) Illustrationen, Diagramme |
psigel | ZDB-98-IGB ZDB-98-IGB FHR_PDA_IGB ZDB-98-IGB TUB_EBS_IGB ZDB-98-IGB TUM_Paketkauf_2023 |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | IGI Global |
record_format | marc |
series2 | Advances in systems analysis, software engineering, and high performance computing (ASASEHPC) book series |
spelling | Brooks, Tyson T. (DE-588)1128104415 aut Adaptive security and cyber assurance for risk-based decision making Tyson T. Brooks Hershey PA, USA IGI Global [2023] 1 Online-Ressource (xiii, 243 Seiten) Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier Advances in systems analysis, software engineering, and high performance computing (ASASEHPC) book series This book explores adaptive security techniques through CyberAssurance for risk-based decision making in the context of software-based systems and discusses ways to achieve it. It identifies a discipline termed CyberAssurance, which considers the interactions of assurance-enhancing technology, system architecture, and the development life cycle. It looks at trust-enhancing technology in some detail, articulating a strategy based on three main prongs: building software that behaves securely (high-confidence design techniques), executing software in a protected environment (containment), and monitoring software execution for malicious behavior (detection). Applying these three prongs in combination in the proper architectural and life cycle contexts provides the best risk strategy methods for increasing our trust in software-based for Internet of Things (IoT), Cloud, and Edge systems. Computer networks Security measures Management information systems Security measures Computer crimes Risk assessment Adaptive computing systems Erscheint auch als Druck-Ausgabe, Hardcover 978-1-6684-7766-3 Erscheint auch als Druck-Ausgabe, Paperback 978-1-6684-7767-0 Erscheint auch als Druck-Ausgabe 1-6684-7766-1 https://doi.org/10.4018/978-1-6684-7766-3 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Brooks, Tyson T. Adaptive security and cyber assurance for risk-based decision making Computer networks Security measures Management information systems Security measures Computer crimes Risk assessment Adaptive computing systems |
title | Adaptive security and cyber assurance for risk-based decision making |
title_auth | Adaptive security and cyber assurance for risk-based decision making |
title_exact_search | Adaptive security and cyber assurance for risk-based decision making |
title_exact_search_txtP | Adaptive security and cyber assurance for risk-based decision making |
title_full | Adaptive security and cyber assurance for risk-based decision making Tyson T. Brooks |
title_fullStr | Adaptive security and cyber assurance for risk-based decision making Tyson T. Brooks |
title_full_unstemmed | Adaptive security and cyber assurance for risk-based decision making Tyson T. Brooks |
title_short | Adaptive security and cyber assurance for risk-based decision making |
title_sort | adaptive security and cyber assurance for risk based decision making |
topic | Computer networks Security measures Management information systems Security measures Computer crimes Risk assessment Adaptive computing systems |
topic_facet | Computer networks Security measures Management information systems Security measures Computer crimes Risk assessment Adaptive computing systems |
url | https://doi.org/10.4018/978-1-6684-7766-3 |
work_keys_str_mv | AT brookstysont adaptivesecurityandcyberassuranceforriskbaseddecisionmaking |