National Open University Library

Security incidents & response against cyber attacks / (Record no. 13953)

MARC details
000 -LEADER
fixed length control field 02452cam a2200241Ii 4500
INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783030691745
INTERNATIONAL STANDARD BOOK NUMBER
ISBN 3030691748
DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number HF5625.B43 2021, DDC005.8068
TITLE STATEMENT
Title Security incidents & response against cyber attacks /
Statement of responsibility, etc Akashdeep Bhardwaj, Varun Sapra, editors
Copyright Date
Place of publication Cham :
Name of publisher Springer,
Year of publication or production 2021
PHYSICAL DESCRIPTION
Number of Pages xviii, 234p.
Other physical details Illu:, Charts, References, Index and Tables
SERIES STATEMENT
Series statement EAI/Springer Innovations in Communication and Computing,
GENERAL NOTE
General note Includes index
FORMATTED CONTENTS NOTE
Formatted contents note Introduction -- By Failing to Prepare You are preparing to Fail -- Authentication Methods and Applications -- Design of Blockchain Polynomial Digests to Secure Method Authentication -- Need of Cybersecurity for ERP Systems -- IoT Architecture Vulnerabilities and Security Measures -- Cybersecurity Advanced Persistent Threat Attacks -- Securing Deep Learning Neural Networks -- Three Tier Architecture to Mitigate DDoS attacks on Hybrid Cloud Environments -- Conclusion
SUMMARY, ETC.
Summary, etc This book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents. The authors discuss cybersecurity incident planning, starting from a draft response plan, to assigning responsibilities, to use of external experts, to equipping organization teams to address incidents, to preparing communication strategy and cyber insurance. They also discuss classifications and methods to detect cybersecurity incidents, how to organize the incident response team, how to conduct situational awareness, how to contain and eradicate incidents, and how to cleanup and recover. The book shares real-world experiences and knowledge from authors from academia and industry. Shares cases studies on using ML and AI to predict and preempt cyber attacks; Describes security attacks, trends, and scenarios along with attack vectors for various domains and industry sectors; Includes detail on incident planning, detection methods, containing incidents, and clean up and recovery
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer security
ADDED ENTRY--PERSONAL NAME
Personal name Bhardwaj, Akashdeep,
ADDED ENTRY--PERSONAL NAME
Personal name Sapra, Varun,
ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://rave.ohiolink.edu/ebooks/ebc2/9783030691745
ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://link.springer.com/10.1007/978-3-030-69174-5
ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://go.ohiolink.edu/goto?url=https://link.springer.com/10.1007/978-3-030-69174-5
ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Permanent Location Current Location Date acquired Full call number Accession Number Koha item type
Gabriel Afolabi Ojo Central Library (Headquarters). Gabriel Afolabi Ojo Central Library (Headquarters). 11/05/2024 HF5625 .B43 2021 0195847 Books

Powered by Koha

//