Securing Critical Infrastructures

Автор: literator от 2-10-2021, 17:27, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Securing Critical InfrastructuresНазвание: Securing Critical Infrastructures
Автор: Professor Mohamed K. Kamara Ph.D.
Издательство: Xlibris US
Год: 2020
Страниц: 385
Язык: английский
Формат: pdf, epub
Размер: 10.2 MB

This book explains the modern techniques required to protect a cyber security critical infrastructure. Three fundamental techniques are presented, namely: network access control, physical access control, encryption and decryption techniques.

The purpose and significance of this book is to take a fresh look at the techniques, policies and procedures, guidelines, and standards that are commonly required to protect data and information in our cyber world today. These techniques and procedures are necessary in every step of securing organizational assets because of their interdependencies. This exploration includes several forms of encryptions and decryptions, policy implementations which are distinctive types of business rules that are documented for the purpose of security procedures, as well as physical and logical network control

Several years ago, the need for data protection was not considered as important, let alone critical. When systems were disintegrated (not networked), managers believed that hacking was impossible, even unthinkable. They were reluctant to spend money on infrastructure security. If told to do, the only question they would ask was “if the system is working, why do we have to secure it?” Data not taken seriously before the explosion of information-handling technologies such as Smart Phones, Two-Way Pagers, Mobile Computing, Personal Digital Assistants, Bluetooth and the integration of systems, along with the emergence of social media (Facebook, Twitter, WhatsApp, Instagram, Snap Chat, team-snap, and Musically) which increasingly reminded organizations about the need for cyber security due to frequent and ever-increasing hacking instances.

The book is divided into eighteen chapters.

• Chapter 1 addresses the concepts of access control in a cyber security infrastructure.

• Chapter 2 explains the concepts of Information Security Policies.

• Chapter 3 explores the concepts of the Potential Security Impact on Telecommunications Networks.

• Chapter 4 examines the concepts of Database Security and Business Impact.

• Chapter 5 describes the concepts of Cyber Security and the Healthcare Sector.

• Chapter 6 probes the concepts of the Cyber Threat on Satellites Supporting Critical Infrastructure.

• Chapter 7 covers the concepts of the Internet Vulnerabilities, Threats, and Risks that are overwhelmingly penetrating Cybersecurity Infrastructure without effective monitoring systems.

• Chapter 8 deals with the concepts of Cybersecurity Critical Infrastructure of the Financial Services Sector.

• Chapter 9 considers the concepts of Cyber-attacks on the Energy Sector.

• Chapter 10 explains the concepts of Cybersecurity on Petroleum Subsector.

• Chapter 11 clarifies the concepts of Encryption and Decryption Techniques in Cyber Security.

• Chapter 12 explicates the concepts of Windows Encrypted File System.

• Chapter 13 addresses how manufacturers of the automobiles fail to consider the security risks involved when connecting the vehicles to the internet.

• Chapter 14 evaluates The Active Cyber Defense Certainty Act.

• Chapter 15 depicts the problem behind Target data breach and its effects on the retail industry.

• Chapter 16 futurizes on the Unmanned Aerial Vehicles Cyber-Physical Security Vulnerabilities issues.

• Chapter 17 considers the issues encountering in Securing Electronic Voting Systems.

• Chapter 18 navigates Cloud Computing Vulnerabilities, Risks, and Threats.

In this book, the author is eclectic in the interest of the reader to understand the significance of cyber security and the growing number of related issues. The philosophy and principles underlying the techniques used for securing organizational assets provide the framework for this book. The author does not assume that readers of this book have prior knowledge of this subject or the art of critical infrastructure architecture.

Скачать Securing Critical Infrastructures








Нашел ошибку? Есть жалоба? Жми!
Пожаловаться администрации
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.