語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cybercomplexity = A Macroscopic View of Cybersecurity Risk /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Cybercomplexity/ by Carl S. Young.
其他題名:
A Macroscopic View of Cybersecurity Risk /
作者:
Young, Carl S.
面頁冊數:
XXIX, 167 p. 69 illus., 18 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Crime Control and Security. -
電子資源:
https://doi.org/10.1007/978-3-031-06994-9
ISBN:
9783031069949
Cybercomplexity = A Macroscopic View of Cybersecurity Risk /
Young, Carl S.
Cybercomplexity
A Macroscopic View of Cybersecurity Risk /[electronic resource] :by Carl S. Young. - 1st ed. 2022. - XXIX, 167 p. 69 illus., 18 illus. in color.online resource. - Advanced Sciences and Technologies for Security Applications,2363-9466. - Advanced Sciences and Technologies for Security Applications,.
1. Risk Fundamentals -- 2. Cyber Security Fundamentals -- 3. Cyber security criteria -- 4. Root Causes of Cyber Security Risk -- 5. IT Environment Risk Factors -- 6. Identity Uncertainty -- 7. Communicator Integrity -- 8. Exploitation of Uncertainty in Identity -- 9. Root Cause Effects and the Exploitation of IT Risk Factors; Compromises of IT Integrity -- 10. Integrity Flaws and Exploitation of Human Vulnerabilities.
This book tackles the problem of complexity within IT environments, i.e., "Cybercomplexity," which is generally recognized as a principal source of cybersecurity risk. The book first defines complexity and simplifies its analysis by assuming a probabilistic approach to security risk management. It then proposes a simple model of cybercomplexity that is based on Shannon entropy, a basic concept in information theory. The key drivers of cybercomplexity emerge from this model, where these drivers reveal the scale-dependence of cybersecurity risk and explain why macroscopic security controls are required to address cybersecurity risk on an enterprise scale. The significant operational implications of cybercomplexity are also discussed, thereby providing both a theoretical framework and a practical guide to addressing this longstanding problem in cybersecurity risk management. .
ISBN: 9783031069949
Standard No.: 10.1007/978-3-031-06994-9doiSubjects--Topical Terms:
1172058
Crime Control and Security.
LC Class. No.: QA75.5-76.95
Dewey Class. No.: 004
Cybercomplexity = A Macroscopic View of Cybersecurity Risk /
LDR
:02742nam a22004095i 4500
001
1088739
003
DE-He213
005
20220720121804.0
007
cr nn 008mamaa
008
221228s2022 sz | s |||| 0|eng d
020
$a
9783031069949
$9
978-3-031-06994-9
024
7
$a
10.1007/978-3-031-06994-9
$2
doi
035
$a
978-3-031-06994-9
050
4
$a
QA75.5-76.95
072
7
$a
UY
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UY
$2
thema
082
0 4
$a
004
$2
23
100
1
$a
Young, Carl S.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
812476
245
1 0
$a
Cybercomplexity
$h
[electronic resource] :
$b
A Macroscopic View of Cybersecurity Risk /
$c
by Carl S. Young.
250
$a
1st ed. 2022.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
XXIX, 167 p. 69 illus., 18 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Advanced Sciences and Technologies for Security Applications,
$x
2363-9466
505
0
$a
1. Risk Fundamentals -- 2. Cyber Security Fundamentals -- 3. Cyber security criteria -- 4. Root Causes of Cyber Security Risk -- 5. IT Environment Risk Factors -- 6. Identity Uncertainty -- 7. Communicator Integrity -- 8. Exploitation of Uncertainty in Identity -- 9. Root Cause Effects and the Exploitation of IT Risk Factors; Compromises of IT Integrity -- 10. Integrity Flaws and Exploitation of Human Vulnerabilities.
520
$a
This book tackles the problem of complexity within IT environments, i.e., "Cybercomplexity," which is generally recognized as a principal source of cybersecurity risk. The book first defines complexity and simplifies its analysis by assuming a probabilistic approach to security risk management. It then proposes a simple model of cybercomplexity that is based on Shannon entropy, a basic concept in information theory. The key drivers of cybercomplexity emerge from this model, where these drivers reveal the scale-dependence of cybersecurity risk and explain why macroscopic security controls are required to address cybersecurity risk on an enterprise scale. The significant operational implications of cybercomplexity are also discussed, thereby providing both a theoretical framework and a practical guide to addressing this longstanding problem in cybersecurity risk management. .
650
2 4
$a
Crime Control and Security.
$3
1172058
650
2 4
$a
Security Science and Technology.
$3
783419
650
2 4
$a
IT Risk Management.
$3
1366666
650
1 4
$a
Computer Science.
$3
593922
650
0
$a
Criminology.
$3
563146
650
0
$a
Security systems.
$3
716291
650
0
$a
Risk management.
$3
559158
650
0
$a
Computer science.
$3
573171
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783031069932
776
0 8
$i
Printed edition:
$z
9783031069956
776
0 8
$i
Printed edition:
$z
9783031069963
830
0
$a
Advanced Sciences and Technologies for Security Applications,
$x
1613-5113
$3
1266773
856
4 0
$u
https://doi.org/10.1007/978-3-031-06994-9
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入