Cybercomplexity: A Macroscopic View of Cybersecurity Risk: Advanced Sciences and Technologies for Security Applications
Autor Carl S. Youngen Limba Engleză Paperback – 22 iul 2023
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 1144.48 lei 6-8 săpt. | |
Springer International Publishing – 22 iul 2023 | 1144.48 lei 6-8 săpt. | |
Hardback (1) | 1150.68 lei 6-8 săpt. | |
Springer International Publishing – 22 iul 2022 | 1150.68 lei 6-8 săpt. |
Din seria Advanced Sciences and Technologies for Security Applications
- 20% Preț: 927.80 lei
- 18% Preț: 732.75 lei
- Preț: 280.00 lei
- 20% Preț: 1264.35 lei
- 20% Preț: 987.57 lei
- 18% Preț: 786.06 lei
- 20% Preț: 984.29 lei
- 18% Preț: 962.47 lei
- 15% Preț: 699.16 lei
- 15% Preț: 699.16 lei
- 15% Preț: 640.22 lei
- 20% Preț: 1153.80 lei
- 17% Preț: 491.10 lei
- 15% Preț: 638.93 lei
- 20% Preț: 889.10 lei
- 20% Preț: 929.45 lei
- 15% Preț: 644.44 lei
- 5% Preț: 672.98 lei
- 20% Preț: 1044.08 lei
- 18% Preț: 778.23 lei
- 18% Preț: 1214.85 lei
- 20% Preț: 480.04 lei
- 15% Preț: 643.65 lei
- 18% Preț: 1215.32 lei
- Preț: 378.63 lei
- 15% Preț: 582.06 lei
- 20% Preț: 930.90 lei
- 20% Preț: 1068.42 lei
- 18% Preț: 729.16 lei
- 18% Preț: 1111.92 lei
- 24% Preț: 590.40 lei
- 18% Preț: 999.75 lei
- 24% Preț: 815.81 lei
- 24% Preț: 747.51 lei
- 20% Preț: 930.90 lei
- 18% Preț: 715.98 lei
- 15% Preț: 642.00 lei
- 18% Preț: 788.22 lei
- 18% Preț: 732.62 lei
- Preț: 385.29 lei
- 18% Preț: 772.29 lei
- 24% Preț: 749.10 lei
Preț: 1144.48 lei
Preț vechi: 1430.59 lei
-20% Nou
Puncte Express: 1717
Preț estimativ în valută:
219.19€ • 225.83$ • 183.61£
219.19€ • 225.83$ • 183.61£
Carte tipărită la comandă
Livrare economică 22 februarie-08 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783031069963
ISBN-10: 303106996X
Ilustrații: XXIX, 167 p. 69 illus., 18 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.29 kg
Ediția:1st ed. 2022
Editura: Springer International Publishing
Colecția Springer
Seria Advanced Sciences and Technologies for Security Applications
Locul publicării:Cham, Switzerland
ISBN-10: 303106996X
Ilustrații: XXIX, 167 p. 69 illus., 18 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.29 kg
Ediția:1st ed. 2022
Editura: Springer International Publishing
Colecția Springer
Seria Advanced Sciences and Technologies for Security Applications
Locul publicării:Cham, Switzerland
Cuprins
1. Risk Fundamentals.- 2. Cyber Security Fundamentals.- 3. Cyber security criteria.- 4. Root Causes of Cyber Security Risk.- 5. IT Environment Risk Factors.- 6. Identity Uncertainty.- 7. Communicator Integrity.- 8. Exploitation of Uncertainty in Identity.- 9. Root Cause Effects and the Exploitation of IT Risk Factors; Compromises of IT Integrity.- 10. Integrity Flaws and Exploitation of Human Vulnerabilities.
Notă biografică
Carl S. Young has held senior security-related positions in the US government, the financial sector, consulting, and academia. He is the author of four previous reference books on science applied to security risk management as well as numerous technical papers. He has been an adjunct professor at the John Jay College of Criminal Justice and is the co-founder of Consilience 360, a security risk consulting firm located in New York City. Mr. Young earned undergraduate and graduate degrees in mathematics and physics from the Massachusetts Institute of Technology (MIT).
Textul de pe ultima copertă
This book tackles the problem of complexity within IT environments, i.e., "Cybercomplexity," which is generally recognized as a principal source of cybersecurity risk. The book first defines complexity and simplifies its analysis by assuming a probabilistic approach to security risk management. It then proposes a simple model of cybercomplexity that is based on Shannon entropy, a basic concept in information theory. The key drivers of cybercomplexity emerge from this model, where these drivers reveal the scale-dependence of cybersecurity risk and explain why macroscopic security controls are required to address cybersecurity risk on an enterprise scale. The significant operational implications of cybercomplexity are also discussed, thereby providing both a theoretical framework and a practical guide to addressing this longstanding problem in cybersecurity risk management.
Caracteristici
Presents a genuinely risk-based characterization of cyber security risk Enables reasoning about cyber security risk from first principles A technology-agnostic approach to assessing and managing cyber security risk