E-Book, Englisch, 270 Seiten
Toledano Critical Infrastructure Security
1. Auflage 2024
ISBN: 978-1-83763-356-2
Verlag: De Gruyter
Format: EPUB
Kopierschutz: 0 - No protection
Cybersecurity lessons learned from real-world breaches
E-Book, Englisch, 270 Seiten
ISBN: 978-1-83763-356-2
Verlag: De Gruyter
Format: EPUB
Kopierschutz: 0 - No protection
Discover the core of cybersecurity through gripping real-world accounts of the most common assaults on critical infrastructure - the body of vital systems, networks, and assets so essential that their continued operation is required to ensure the security of a nation, its economy, and the public's health and safety - with this guide to understanding cybersecurity principles.
From an introduction to critical infrastructure and cybersecurity concepts to the most common types of attacks, this book takes you through the life cycle of a vulnerability and how to assess and manage it. You'll study real-world cybersecurity breaches, each incident providing insights into the principles and practical lessons for cyber defenders striving to prevent future breaches.
From DDoS to APTs, the book examines how each threat activates, operates, and succeeds. Additionally, you'll analyze the risks posed by computational paradigms, such as the advancement of AI and quantum computing, to legacy infrastructure.
By the end of this book, you'll be able to identify key cybersecurity principles that can help mitigate evolving attacks to critical infrastructure.
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Schadprogramme (Viren, Trojaner etc.)
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
Weitere Infos & Material
Table of Contents - What is Critical Infrastructure?
- The Growing Threat of Cyberattacks on Critical Infrastructure
- Critical Infrastructure Vulnerabilities
- The Most Common Attacks Against CI
- Analysis of the Top Cyberattacks on Critical Infrastructure
- Protecting Critical Infrastructure – Part 1
- Protecting Critical Infrastructure – Part 2
- Protecting Critical Infrastructure – Part 3
- The Future of CI




