Cyber insecurity : navigating the perils of the next information age / / edited by Richard M. Harrison and Trey Herr |
Pubbl/distr/stampa | Lanham ; London : , : Rowman & Littlefield, , 2016 |
Descrizione fisica | 1 online resource (xx, 392 pages) |
Disciplina | 364.4 |
Soggetto topico |
computer crime
information security fight against crime Internet electronic commerce Computer crimes - Prevention Computer security Cyberterrorism - Prevention Telecommunication - Security measures Internet governance |
ISBN | 1-4422-7285-6 |
Classificazione | 32.24.56 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foreword / Honorable Richard J. Danzig -- Introduction / Trey Herr and Richard M. Harrison -- Section I: Securing Data, Devices, and Networks. Understanding information assurance / Eric Ormes and Trey Herr -- A path to collective security: information sharing at the state and local level / David Weinstein -- Protecting industrial control systems in critical infrastructure / Robert M. Lee -- Safety at any speed: the roads ahead for automotive cyber safety policy / Joshua Corman and Beau Woods -- Bad code: exploring liability in software development / Jane Chong -- Section II: Combating Cyber Crime. Understanding cyber crime / Sasha Romanosky and Trey Herr -- Disrupting malware markets / Trey Herr and Ryan Ellis -- The Computer Fraud and Abuse Act: structure, controversies, and proposals for reform / Paul Ohm -- Breach notification laws: the policy and practice / Sasha Romanosky -- Cyber insurance: a market-based approach to information assurance / Robert Morgus -- Section III: Governing the Security of the Internet. Understanding internet security governance / Trey Herr and Heather West -- A holistic approach to the encryption debate / Aaron Brantly -- Certificate authorities: modernizing the internet's chain of trust / Adrienne Allen -- Multistakeholder approaches to cybersecurity challenges / Allan Friedman and Jonah F. Hill -- Countering the proliferation of malware / Trey Herr and Paul Rosenzweig -- Section IV: Military Cyber Operations. Understanding military cyber operations / Trey Herr and Drew Herrick -- Government acquisition and use of zero-day software vulnerabilities / Mailyn Fidler -- The Joint Cyber Force: challenges and opportunities / Jason Rivera, Lauren Boas Hayes, Anastasia Mark, Matthew Russell, and Nathaniel Tisa -- The practical impact of classification regarding offensive cyber operations / Herbert S. Lin and Taylor Grossman -- Creating influence through information / Kat Dransfield, Abraham Wagner, and Rand Waltzman -- Concluding remarks / Trey Herr an Richard M. Harrison. |
Record Nr. | UNINA-9910798871003321 |
Lanham ; London : , : Rowman & Littlefield, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber insecurity : navigating the perils of the next information age / / edited by Richard M. Harrison and Trey Herr |
Pubbl/distr/stampa | Lanham ; London : , : Rowman & Littlefield, , 2016 |
Descrizione fisica | 1 online resource (xx, 392 pages) |
Disciplina | 364.4 |
Soggetto topico |
computer crime
information security fight against crime Internet electronic commerce Computer crimes - Prevention Computer security Cyberterrorism - Prevention Telecommunication - Security measures Internet governance |
ISBN | 1-4422-7285-6 |
Classificazione | 32.24.56 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foreword / Honorable Richard J. Danzig -- Introduction / Trey Herr and Richard M. Harrison -- Section I: Securing Data, Devices, and Networks. Understanding information assurance / Eric Ormes and Trey Herr -- A path to collective security: information sharing at the state and local level / David Weinstein -- Protecting industrial control systems in critical infrastructure / Robert M. Lee -- Safety at any speed: the roads ahead for automotive cyber safety policy / Joshua Corman and Beau Woods -- Bad code: exploring liability in software development / Jane Chong -- Section II: Combating Cyber Crime. Understanding cyber crime / Sasha Romanosky and Trey Herr -- Disrupting malware markets / Trey Herr and Ryan Ellis -- The Computer Fraud and Abuse Act: structure, controversies, and proposals for reform / Paul Ohm -- Breach notification laws: the policy and practice / Sasha Romanosky -- Cyber insurance: a market-based approach to information assurance / Robert Morgus -- Section III: Governing the Security of the Internet. Understanding internet security governance / Trey Herr and Heather West -- A holistic approach to the encryption debate / Aaron Brantly -- Certificate authorities: modernizing the internet's chain of trust / Adrienne Allen -- Multistakeholder approaches to cybersecurity challenges / Allan Friedman and Jonah F. Hill -- Countering the proliferation of malware / Trey Herr and Paul Rosenzweig -- Section IV: Military Cyber Operations. Understanding military cyber operations / Trey Herr and Drew Herrick -- Government acquisition and use of zero-day software vulnerabilities / Mailyn Fidler -- The Joint Cyber Force: challenges and opportunities / Jason Rivera, Lauren Boas Hayes, Anastasia Mark, Matthew Russell, and Nathaniel Tisa -- The practical impact of classification regarding offensive cyber operations / Herbert S. Lin and Taylor Grossman -- Creating influence through information / Kat Dransfield, Abraham Wagner, and Rand Waltzman -- Concluding remarks / Trey Herr an Richard M. Harrison. |
Record Nr. | UNINA-9910828077303321 |
Lanham ; London : , : Rowman & Littlefield, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybercrime and business : strategies for global corporate security / / Sanford L. Moskowitz |
Autore | Moskowitz Sanford L |
Pubbl/distr/stampa | Oxford, United Kingdom : , : Butterworth-Heinemann, an imprint of Elsevier, , [2017] |
Descrizione fisica | 1 online resource (xvii, 226 pages) : illustrations |
Disciplina | 364.168 |
Collana | Gale eBooks |
Soggetto topico |
Computer crimes - Prevention
Electronic commerce - Security measures |
ISBN |
0-12-800388-X
0-12-800353-7 |
Classificazione |
32.24.56
40.08 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | ; Preface -- The global cybercrime industry -- The startup and spinoff firm -- The small and medium-sized enterprise (SME) -- The large corporation -- Mergers and acquisitions -- Joint ventures and strategic partnerships -- The subsidiary -- Franchising -- IP, licensing, and outsourcing -- Cybercrime and business : emerging themes and strategic directions. |
Record Nr. | UNINA-9910583042403321 |
Moskowitz Sanford L
![]() |
||
Oxford, United Kingdom : , : Butterworth-Heinemann, an imprint of Elsevier, , [2017] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The cybersecurity dilemma : hacking, trust, and fear between nations / / Ben Buchanan |
Autore | Buchanan Ben |
Pubbl/distr/stampa | Oxford : , : Oxford University Press, , 2016 |
Descrizione fisica | 1 online resource (viii, 290 p.) |
Disciplina | 005.8 |
Soggetto topico |
Cyber intelligence (Computer security)
Cyberterrorism - Prevention National security - Technological innovations Internet - Security measures Internet computer crime innovation artificial intelligence computer piracy fight against crime |
ISBN |
0-19-068654-5
0-19-069469-6 |
Classificazione | 32.24.56 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910164930703321 |
Buchanan Ben
![]() |
||
Oxford : , : Oxford University Press, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity for Industry 4.0 [[electronic resource] ] : Analysis for Design and Manufacturing / / edited by Lane Thames, Dirk Schaefer |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XIII, 265 p. ) : ill |
Disciplina | 005.8 |
Collana | Springer Series in Advanced Manufacturing |
Soggetto topico |
Computer security
Electrical engineering Industrial engineering Production engineering Management Industrial management Economic policy Computer crimes Systems and Data Security Communications Engineering, Networks Industrial and Production Engineering Innovation/Technology Management R & D/Technology Policy Cybercrime |
ISBN | 3-319-50660-9 |
Classificazione | 32.24.56 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Industry 4.0: An Overview of Key Benefits, Technologies, and Challenges -- Customized Encryption of CAD Models for Cloud-enabled Collaborative Product Development -- A New Approach to Cyberphysical Security in Industry 4.0 -- Big Data Security Intelligence for Healthcare Industry 4.0 -- Decentralized Cyber-physical Systems: A Paradigm for Cloud-based Smart Factory of Industry 4.0 -- Applying and Assessing Cybersecurity Controls for Direct Digital Manufacturing (DDM) Systems -- The Resource Usage Viewpoint of Industrial Control System Security: An Inference-based Intrusion Detection System -- Practical Security Aspects of the Internet of Things -- Cybersecurity for Industry 4.0 and Advanced Manufacturing Environments with Ensemble Intelligence. |
Record Nr. | UNINA-9910254323703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity in Germany [[electronic resource] /] / by Martin Schallbruch, Isabel Skierka |
Autore | Schallbruch Martin |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (VIII, 66 p.) |
Disciplina | 005.8 |
Collana | SpringerBriefs in Cybersecurity |
Soggetto topico |
Computer security
Computers and civilization Public policy Systems and Data Security Computers and Society Public Policy |
ISBN | 3-319-90014-5 |
Classificazione |
32.24.56
08.12.16 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Intro; foreword; contents; 1 Introduction; 1.1 On Terminology; 1.2 Approach; 1.3 Peculiarities of the German political system; 1.4 Structure; references; 2 The German view on cybersecurity; 2.1 The public perception of cyber issues; 2.2 Political and regulatory concepts; 2.3 Snowden and the emerging discussion about technological sovereignty; 2.4 Combining a German data protection and engineering approach with holistic cyber debates; 2.5 Advantages and disadvantages of the German approach-A preliminary balance; references; 3 The evolution of German cybersecurity strategy; 3.1 Introduction 3.2 Phase 1, 1991-2011: IT security and critical infrastructure protection 3.3 Phase 2: 2011-2016: building a civilian cybersecurity strategy; 3.3.1 The first national cybersecurity strategy for Germany; 3.3.2 The IT security law; 3.3.3 The Snowden revelations; 3.4 Phase 3, 2016-2018: consolidating a comprehensive civilian-military approach to cybersecurity; 3.4.1 The 2016 white paper on German security policy and the future of the Bundeswehr; 3.4.2 The 2016 second national cybersecurity strategy; 3.4.3 Taking stock of past developments for future cybersecurity strategies; references 4 The organisation of cybersecurity in Germany 4.1 Particularities of German law enforcement, intelligence, and public security organisations; 4.2 The German military's role in the cyber realm; 4.3 Cooperation and conflict between agencies; 4.4 Public-private cybersecurity cooperation; references; 5 Current priorities and gaps in German national cybersecurity, future trends; 5.1 Introduction; 5.2 Legal, technical and practical development of active cyber defence; 5.3 Cybersecurity architecture-roles and responsibilities of agencies; 5.4 Towards a governmental vulnerability handling strategy 5.5 Implementing a comprehensive IT security industry policy 5.6 Finding a coherent legal concept for safety and security; 5.7 International cooperation; references; 6 Conclusion |
Record Nr. | UNINA-9910299352703321 |
Schallbruch Martin
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|