Modelling Cyber Security: Approaches, Methodology, Strategies

Cyberterrorism and cybercrime are on the rise. One new webpage was infected every 4.5 seconds by malicious email attachments in 2008, five times more than the previous year. The normal computer user also has to fight against new ‘scareware’ or fake antivirus software websites (five new ones identifi...

Mô tả đầy đủ

Đã lưu trong:
Chi tiết về thư mục
Tác giả chính: Gori, Umberto
Định dạng: Sách
Ngôn ngữ:English
Được phát hành: IOS Press 2013
Truy cập trực tuyến:http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/35603
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
Thư viện lưu trữ: Thư viện Trường Đại học Đà Lạt
id oai:scholar.dlu.edu.vn:DLU123456789-35603
record_format dspace
spelling oai:scholar.dlu.edu.vn:DLU123456789-356032014-01-19T23:43:40Z Modelling Cyber Security: Approaches, Methodology, Strategies Gori, Umberto Cyberterrorism and cybercrime are on the rise. One new webpage was infected every 4.5 seconds by malicious email attachments in 2008, five times more than the previous year. The normal computer user also has to fight against new ‘scareware’ or fake antivirus software websites (five new ones identified every day) and the ubiquitous spam. It seems clear that the more technology advances, the greater the increase in the number of threats. According to expert reports there were more than 237 million attacks to information security all over the world in the first half of 2005 only. States cannot control cyber crime at the individual level and international cooperation is highly needed. Securing cyberspace is, however, extremely difficult, as it requires facing strategic challenges and cooperation between the public, private, military and civilian sectors of our society. It is therefore necessary to fully understand the characteristics, principles and challenges that underlie the development of secure information systems. This book is one of the first comprehensive attempts to address all the issues mentioned above and highlights the urgent need of a multidisciplinary approach to cope with cyber threats. It presents all the factors that need to be taken into consideration, rethinks current strategies and identifies urgent measures to be taken in order to minimize the strategic and economic impact of cyber attacks. This volume is divided into three parts: the first one revises various conceptual approaches to security, explaining concepts such as cryptography and how it is applied. The second part focuses on terrorists attacks and attacks to critical infrastructures and the third part reviews European measures and legal issues. The final chapter also includes experts’ recommendations and proposals for a more secure cyberspace in the future. Modelling Cyber Security: Approaches, Methodology, Strategies could be of great interest to engineers working on IT security and everybody -from government departments to small companies and regular Internet users- concerned with the overall impact of security in the Net. 2013-09-23T07:49:18Z 2013-09-23T07:49:18Z 2009 Book 978-1-60750-517-4 http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/35603 en application/pdf IOS Press
institution Thư viện Trường Đại học Đà Lạt
collection Thư viện số
language English
description Cyberterrorism and cybercrime are on the rise. One new webpage was infected every 4.5 seconds by malicious email attachments in 2008, five times more than the previous year. The normal computer user also has to fight against new ‘scareware’ or fake antivirus software websites (five new ones identified every day) and the ubiquitous spam. It seems clear that the more technology advances, the greater the increase in the number of threats. According to expert reports there were more than 237 million attacks to information security all over the world in the first half of 2005 only. States cannot control cyber crime at the individual level and international cooperation is highly needed. Securing cyberspace is, however, extremely difficult, as it requires facing strategic challenges and cooperation between the public, private, military and civilian sectors of our society. It is therefore necessary to fully understand the characteristics, principles and challenges that underlie the development of secure information systems. This book is one of the first comprehensive attempts to address all the issues mentioned above and highlights the urgent need of a multidisciplinary approach to cope with cyber threats. It presents all the factors that need to be taken into consideration, rethinks current strategies and identifies urgent measures to be taken in order to minimize the strategic and economic impact of cyber attacks. This volume is divided into three parts: the first one revises various conceptual approaches to security, explaining concepts such as cryptography and how it is applied. The second part focuses on terrorists attacks and attacks to critical infrastructures and the third part reviews European measures and legal issues. The final chapter also includes experts’ recommendations and proposals for a more secure cyberspace in the future. Modelling Cyber Security: Approaches, Methodology, Strategies could be of great interest to engineers working on IT security and everybody -from government departments to small companies and regular Internet users- concerned with the overall impact of security in the Net.
format Book
author Gori, Umberto
spellingShingle Gori, Umberto
Modelling Cyber Security: Approaches, Methodology, Strategies
author_facet Gori, Umberto
author_sort Gori, Umberto
title Modelling Cyber Security: Approaches, Methodology, Strategies
title_short Modelling Cyber Security: Approaches, Methodology, Strategies
title_full Modelling Cyber Security: Approaches, Methodology, Strategies
title_fullStr Modelling Cyber Security: Approaches, Methodology, Strategies
title_full_unstemmed Modelling Cyber Security: Approaches, Methodology, Strategies
title_sort modelling cyber security: approaches, methodology, strategies
publisher IOS Press
publishDate 2013
url http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/35603
_version_ 1757657056811155456