top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Corporate cybersecurity : identifying risks and the bug bounty program / / John Jackson
Corporate cybersecurity : identifying risks and the bug bounty program / / John Jackson
Autore Jackson John (Cybersecurity professional)
Pubbl/distr/stampa Hoboken, New Jersey ; ; Chichester, England : , : John Wiley & Sons, Ltd., , [2022]
Descrizione fisica 1 online resource (273 pages)
Disciplina 658.478
Soggetto topico Business enterprises - Computer networks - Security measures
Penetration testing (Computer security)
Cyberspace - Security measures
ISBN 1-119-78253-8
1-119-78256-2
1-119-78254-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910829852403321
Jackson John (Cybersecurity professional)  
Hoboken, New Jersey ; ; Chichester, England : , : John Wiley & Sons, Ltd., , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CRC : proceedings of the 2018 Cyber Resilience Conference : Putrajaya, Malaysia, November 13 - 15, 2018 / / editors, Khairul Akram Zainol Abidin, Masnizah Mohd, Zarina Shukur ; sponsored by IEEE
CRC : proceedings of the 2018 Cyber Resilience Conference : Putrajaya, Malaysia, November 13 - 15, 2018 / / editors, Khairul Akram Zainol Abidin, Masnizah Mohd, Zarina Shukur ; sponsored by IEEE
Pubbl/distr/stampa Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2018
Descrizione fisica 1 online resource (824 pages)
Disciplina 005.8
Soggetto topico Computer networks - Security measures
Cyberspace - Security measures
ISBN 1-5386-7541-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910309759303321
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CRC : proceedings of the 2018 Cyber Resilience Conference : Putrajaya, Malaysia, November 13 - 15, 2018 / / editors, Khairul Akram Zainol Abidin, Masnizah Mohd, Zarina Shukur ; sponsored by IEEE
CRC : proceedings of the 2018 Cyber Resilience Conference : Putrajaya, Malaysia, November 13 - 15, 2018 / / editors, Khairul Akram Zainol Abidin, Masnizah Mohd, Zarina Shukur ; sponsored by IEEE
Pubbl/distr/stampa Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2018
Descrizione fisica 1 online resource (824 pages)
Disciplina 005.8
Soggetto topico Computer networks - Security measures
Cyberspace - Security measures
ISBN 1-5386-7541-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996575620303316
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Crisis and escalation in cyberspace / / Martin C. Libicki
Crisis and escalation in cyberspace / / Martin C. Libicki
Autore Libicki Martin C
Pubbl/distr/stampa Santa Monica, CA : , : RAND, Project Air Force, , 2012
Descrizione fisica 1 online resource (279 p.)
Disciplina 358.4/141
Soggetto topico Information warfare - United States
Escalation (Military science)
Cyberspace - Security measures
Crisis management - Government policy - United States
Cyberterrorism - Prevention
Conflict management
Soggetto genere / forma Electronic books.
ISBN 0-8330-7679-5
0-8330-7680-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Avoiding crises by creating norms -- Narratives, dialogues, and signaling -- Escalation management -- Strategic stability -- Conclusions and recommendations for the Air Force -- Introduction -- Some hypothetical crises -- Mutual mistrust is likely to characterize a cyber crisis -- States may have room for maneuver in a cyber crisis -- A note on methodology -- Purpose and organization -- Avoiding crises by creating norms -- What kind of norms might be useful? -- Enforce laws against hacking -- Disassociate from freelance hackers -- Discourage commercial espionage -- Be careful about the obligation to suppress cyber traffic -- How do we enforce norms? -- Confidence-building measures -- Norms for victims of cyberattacks -- Norms for war? -- Deception -- Military necessity and collateral damage -- Proportionality -- Reversibility -- Conclusions -- Narratives, dialogue, and signals -- Narratives to promote control -- A narrative framework for cyberspace -- Victimization, attribution, retaliation, and aggression -- Victimization -- Attribution -- Retaliation -- Aggression -- Emollients: narratives to walk back a crisis -- We did nothing -- Well, at least not on our orders -- It was an accident -- This is nothing new -- At least it does not portend anything -- Broader considerations -- Signals -- Ambiguity in signaling -- Signaling resolve -- Signaling that cyber combat is not kinetic combat -- Conclusions -- Escalation management -- Motives for escalation -- Does escalation matter? -- Escalation risks -- Escalation risks in phase -- Escalation risks for contained local conflicts -- Escalation risks for uncontained conflicts -- Managing proxy cyberattacks -- What hidden combatants imply for horizontal escalation -- Managing overt proxy conflict -- The difficulties of tit-for-tat management -- The importance of pre-planning -- Disjunctions among effort, effect, and perception -- Inadvertent escalation -- Escalation into kinetic warfare -- Escalation into economic warfare -- Sub rosa escalation -- Managing the third-party problem -- The need for a clean shot -- Inference and narrative -- Command and control -- Commanders -- Those they command -- Conclusions -- Implications for strategic stability -- Translating sources of cold war instability to cyberspace -- What influence can cyberwar have if nuclear weapons exist? -- Can cyberwar disarm another state's nuclear capabilities? -- Can cyberwar disarm another states cyberwarriors? -- Does cyberwar lend itself to alert-reaction cycles? -- Are cyberdefenses inherently destabilizing? -- Would a cyberspace arms races be destabilizing? -- Misperception as a source of crisis -- Side takes great exception to cyberespionage -- Defenses are misinterpreted as preparations for war -- Too much confidence in attribution -- Too much confidence in or fear of pre-emption -- Supposedly risk-free cyberattacks -- Neutrality -- Conclusions -- Can cyber crises be managed? -- A. Distributed denial-of-service attacks -- B. Overt, obvious, and covert cyberattacks and responses -- Can good cyberdefenses discourage attacks? -- Bibliography -- Figures -- Figure 1: Alternative postures for a master cyber narrative -- Figure 2: Sources of imprecision in tit for tat -- Figure 3: An inadvertent path to mutual escalation -- Figure A-1: Configuring networks to limit the damage of DDoS attacks -- Table -- Overt, obvious, and covert cyberattacks and responses.
Record Nr. UNINA-9910219977703321
Libicki Martin C  
Santa Monica, CA : , : RAND, Project Air Force, , 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber blockades
Cyber blockades
Autore Russell Alison Lawlor
Pubbl/distr/stampa Washington, District of Columbia, : Georgetown University Press, 2014
Descrizione fisica 1 online resource (190 p.)
Disciplina 327.1/17
Altri autori (Persone) RussellAlison Lawlor
Soggetto topico Cyberterrorism
Cyberterrorism - Prevention
Cyberspace - Security measures
Computer security
Cyberkrig
Computer sikkerhed
ISBN 1-62616-113-5
Classificazione 355.424
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents -- List of tables and figures -- Acknowledgments -- List of abbreviations and acronyms -- Networks of power in the information society -- Theorizing about cyberspace -- Evolution of blockades in different domains -- Cyber attacks on estonia -- The Georgia-Russia war -- Comparing cyber blockades -- Conclusion -- Glossary -- Bibliography -- Index.
Record Nr. UNINA-9910787038503321
Russell Alison Lawlor  
Washington, District of Columbia, : Georgetown University Press, 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber blockades
Cyber blockades
Autore Russell Alison Lawlor
Pubbl/distr/stampa Washington, District of Columbia, : Georgetown University Press, 2014
Descrizione fisica 1 online resource (190 p.)
Disciplina 327.1/17
Altri autori (Persone) RussellAlison Lawlor
Soggetto topico Cyberterrorism
Cyberterrorism - Prevention
Cyberspace - Security measures
Computer security
Cyberkrig
Computer sikkerhed
ISBN 1-62616-113-5
Classificazione 355.424
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents -- List of tables and figures -- Acknowledgments -- List of abbreviations and acronyms -- Networks of power in the information society -- Theorizing about cyberspace -- Evolution of blockades in different domains -- Cyber attacks on estonia -- The Georgia-Russia war -- Comparing cyber blockades -- Conclusion -- Glossary -- Bibliography -- Index.
Record Nr. UNINA-9910817351403321
Russell Alison Lawlor  
Washington, District of Columbia, : Georgetown University Press, 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber blockades
Cyber blockades
Pubbl/distr/stampa Washington, District of Columbia, : Georgetown University Press, 2014
Descrizione fisica 1 online resource (190 p.)
Altri autori (Persone) RussellAlison Lawlor
Soggetto topico Cyberterrorism
Cyberterrorism - Prevention
Cyberspace - Security measures
Computer security
Cyberkrig
Computer sikkerhed
Soggetto genere / forma Electronic books.
ISBN 1-62616-113-5
Classificazione 355.424
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents -- List of tables and figures -- Acknowledgments -- List of abbreviations and acronyms -- Networks of power in the information society -- Theorizing about cyberspace -- Evolution of blockades in different domains -- Cyber attacks on estonia -- The Georgia-Russia war -- Comparing cyber blockades -- Conclusion -- Glossary -- Bibliography -- Index.
Record Nr. UNINA-9910459909103321
Washington, District of Columbia, : Georgetown University Press, 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber conflict [[electronic resource] ] : competing national perspectives / / edited by Daniel Ventre
Cyber conflict [[electronic resource] ] : competing national perspectives / / edited by Daniel Ventre
Autore Ventre Daniel
Edizione [1st edition]
Pubbl/distr/stampa London, : Iste
Descrizione fisica 1 online resource (345 p.)
Disciplina 363.325/6004678
Altri autori (Persone) VentreDaniel
Collana ISTE
Soggetto topico Internet - Security measures
Cyberspace - Security measures
Computer networks - Security measures
ISBN 1-118-56266-6
1-118-56274-7
1-118-56296-8
1-299-18890-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Table of Contents; Introduction; Chapter 1. Canada's Cyber Security Policy: a Tortuous Path Toward a Cyber Security Strategy; 1.1. Introduction; 1.2. Canada in North America: sovereign but subordinate?; 1.3. Counter-terrorism for the improvement of national security; 1.4. The long path to a national CI protection strategy and nationalcyber security strategy; 1.5. The adoption of the current strategies for CI protection and cyber security; 1.6. Conclusion; 1.7. Bibliography; 1.7.1. Scientific and media articles; 1.7.2. Primary Data; 1.7.3. Websites
Chapter 2. Cuba: Towards an Active Cyber-defense2.1. Cyberspace: statistics and history; 2.1.1. The marginalization of Cuba; 2.1.2. Cuban cyberspace as the target of attacks; 2.2. Theoretical and practical considerations on information warfareand cyber-warfare; 2.2.1. Development of capabilities; 2.3. Cyber-warfare theories and practices; 2.3.1. Fidel Castro's discourse; 2.3.2. The concept of active cyber-defense; 2.4. Regulations and ways around them; 2.4.1. The State's influence over cyberspace; 2.4.2. Getting around the restrictions
2.5. Capabilities of control, surveillance and interception2.6. Enemies; 2.7. Conclusion; 2.8. Bibliography; Chapter 3. French Perspectives on Cyber-conflict; 3.1. Cyberspace; 3.2. Assessments, view on the world and awakening; 3.2.1. Attacks; 3.2.2. The feeling of insecurity, the threat; 3.2.3. Potential vulnerabilities of States; 3.2.4. Evolution of the international environment; 3.3. Reaction, position of France and choice: theories, political strategies and military doctrines; 3.3.1. Information: a powerful weapon for those controlling it; 3.3.2. Media information: beneficial if controlled
3.3.3. Economic information as power, if controlled3.3.4. Information warfare; 3.3.5. Information warfare or information control; 3.3.6. The ANSSI; 3.3.7. Cyber-security and cyber-defense; 3.3.8. Army: Information operations, NEB (numérisation de l'espace de bataille/digitization of battlespace), info-development; 3.3.9. Cyber-war and other modalities of the cyber-conflict; 3.4. Conclusion; 3.5. Bibliography; Chapter 4. Digital Sparta: Information Operationsand Cyber-warfare in Greece; 4.1. Geopolitical significance; 4.2. Strategic concerns and internal balancing
4.3. Formative experiences in information operations: the Ergenekon conspiracy4.4. Formative experiences in information operations:intensifying cyber-attacks; 4.5. Formative experiences in information operations: the Öcalan affair; 4.6. Formative experiences in information operations: the Greek wiretapping case of 2004-2005; 4.7. Emerging civilian information operations strategies; 4.8. Emerging military information operations strategies; 4.9. The European Union dimension in Greek information operations; 4.10. Conclusion; 4.11. Bibliography
Chapter 5. Moving Toward an Italian Cyber Defenseand Security Strategy
Record Nr. UNINA-9910138856703321
Ventre Daniel  
London, : Iste
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber conflict : competing national perspectives / / edited by Daniel Ventre
Cyber conflict : competing national perspectives / / edited by Daniel Ventre
Autore Ventre Daniel
Edizione [1st edition]
Pubbl/distr/stampa London, : Iste
Descrizione fisica 1 online resource (345 p.)
Disciplina 363.325/6004678
Altri autori (Persone) VentreDaniel
Collana ISTE
Soggetto topico Internet - Security measures
Cyberspace - Security measures
Computer networks - Security measures
ISBN 1-118-56266-6
1-118-56274-7
1-118-56296-8
1-299-18890-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Table of Contents; Introduction; Chapter 1. Canada's Cyber Security Policy: a Tortuous Path Toward a Cyber Security Strategy; 1.1. Introduction; 1.2. Canada in North America: sovereign but subordinate?; 1.3. Counter-terrorism for the improvement of national security; 1.4. The long path to a national CI protection strategy and nationalcyber security strategy; 1.5. The adoption of the current strategies for CI protection and cyber security; 1.6. Conclusion; 1.7. Bibliography; 1.7.1. Scientific and media articles; 1.7.2. Primary Data; 1.7.3. Websites
Chapter 2. Cuba: Towards an Active Cyber-defense2.1. Cyberspace: statistics and history; 2.1.1. The marginalization of Cuba; 2.1.2. Cuban cyberspace as the target of attacks; 2.2. Theoretical and practical considerations on information warfareand cyber-warfare; 2.2.1. Development of capabilities; 2.3. Cyber-warfare theories and practices; 2.3.1. Fidel Castro's discourse; 2.3.2. The concept of active cyber-defense; 2.4. Regulations and ways around them; 2.4.1. The State's influence over cyberspace; 2.4.2. Getting around the restrictions
2.5. Capabilities of control, surveillance and interception2.6. Enemies; 2.7. Conclusion; 2.8. Bibliography; Chapter 3. French Perspectives on Cyber-conflict; 3.1. Cyberspace; 3.2. Assessments, view on the world and awakening; 3.2.1. Attacks; 3.2.2. The feeling of insecurity, the threat; 3.2.3. Potential vulnerabilities of States; 3.2.4. Evolution of the international environment; 3.3. Reaction, position of France and choice: theories, political strategies and military doctrines; 3.3.1. Information: a powerful weapon for those controlling it; 3.3.2. Media information: beneficial if controlled
3.3.3. Economic information as power, if controlled3.3.4. Information warfare; 3.3.5. Information warfare or information control; 3.3.6. The ANSSI; 3.3.7. Cyber-security and cyber-defense; 3.3.8. Army: Information operations, NEB (numérisation de l'espace de bataille/digitization of battlespace), info-development; 3.3.9. Cyber-war and other modalities of the cyber-conflict; 3.4. Conclusion; 3.5. Bibliography; Chapter 4. Digital Sparta: Information Operationsand Cyber-warfare in Greece; 4.1. Geopolitical significance; 4.2. Strategic concerns and internal balancing
4.3. Formative experiences in information operations: the Ergenekon conspiracy4.4. Formative experiences in information operations:intensifying cyber-attacks; 4.5. Formative experiences in information operations: the Öcalan affair; 4.6. Formative experiences in information operations: the Greek wiretapping case of 2004-2005; 4.7. Emerging civilian information operations strategies; 4.8. Emerging military information operations strategies; 4.9. The European Union dimension in Greek information operations; 4.10. Conclusion; 4.11. Bibliography
Chapter 5. Moving Toward an Italian Cyber Defenseand Security Strategy
Record Nr. UNINA-9910820094103321
Ventre Daniel  
London, : Iste
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber deception : techniques, strategies, and human aspects / / Tiffany Bao, Milind Tambe, Cliff Wang, editors
Cyber deception : techniques, strategies, and human aspects / / Tiffany Bao, Milind Tambe, Cliff Wang, editors
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (252 pages)
Disciplina 005.8
Collana Advances in information security
Soggetto topico Computer networks - Security measures
Cyberspace - Security measures
ISBN 3-031-16613-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Diversifying Deception: Game Theoretic Models for Two-Sided and Layered Deception -- 2. Human-Subject Experiments on Risk-based Cyber Camouflage Games -- 3. Adaptive Cyberdefense with Deception: A Human-AI Cognitive Approach -- 4. Cognitive Modeling for Personalized, Adaptive Signaling for Cyber Deception -- 5. Deceptive Signaling: Understanding Human Behavior against Signaling algorithms -- 6. Optimizing Honey Traffic Using Game Theory and Adversarial Learning -- 7. Mee: Adaptive Honeyfile System for Insider Attacker Detection -- 8. HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems -- 9. Using Amnesia to Detect Credential Database Breaches -- 10. Deceiving ML-Based Friend-or-Foe Identification for Executables.
Record Nr. UNINA-9910682584603321
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui