网络安全保护关键基础设施免受网络攻击和网络战

ID:32299

大小:1.75 MB

页数:346页

时间:2023-01-28

金币:80

上传者:战必胜
www.crcpress.com
K23263
CYBERSECURITY
6000 Broken Sound Parkway, NW
Suite 300, Boca Raton, FL 33487
711 Third Avenue
New York, NY 10017
2 Park Square, Milton Park
Abingdon, Oxon OX14 4RN, UK
an informa business
www.crcpress.com
Protecting Critical Infrastructures
from Cyber Attack and Cyber Warfare
Edited by
Thomas A. Johnson
CYBERSECURITY
CYBERSECURITY
Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare
CYBERSECURITY
Johnson
The World Economic Forum regards the threat of cyber attack as one of the top ve global risks
confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of
the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt
critical services, and induce a wide range of damage is becoming more difcult to defend against.
This book examines the current cyber threat landscape and discusses the strategies being used by
governments and corporations to protect against these threats.
The book rst provides a historical reference, detailing the emergence of viruses, worms, malware,
and other cyber threats that created the need for the cybersecurity eld. It then discusses the
vulnerabilities of our critical infrastructures, the broad arsenal of cyber attack tools, and the various
engineering design issues involved in protecting our infrastructures. It goes on to cover cyber
intelligence tactics, recent examples of cyber conict and warfare, and the key issues in formulating
a national strategy to defend against cyber warfare.
The book also discusses how to assess and measure the cost of cybersecurity. It examines the
many associated cost factors and presents the results of several important industry-based economic
studies of security breaches that have occurred within many nations. The book concludes with a look
at future trends in cybersecurity. It discusses the potential impact of industry-wide transformational
changes, such as virtualization, social media, cloud computing, structured and unstructured data, big
data, and data analytics.
Features:
• Examines the threat spectrum of cyberspace attacks and cyber weapons
• Denes the arsenal of cyber tools and new sophisticated attacks
• Discusses the need for an architecture of cloud computing for cyber and counter intelligence
• Emphasizes the Department of Defense’s role and the expansion of new mission forces to
battle in cyberspace
• Covers the US and international legal aspects of cybersecurity
• Describes the difculty of calculating the costs of defending against cyber attacks
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭