Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Title
Security incidents & response against cyber attacks / Akashdeep Bhardwaj, Varun Sapra, editors.
ISBN
9783030691745 (electronic bk.)
3030691748 (electronic bk.)
303069173X
9783030691738
Imprint
Cham : Springer, 2021.
Language
English
Description
1 online resource
Other Standard Identifiers
10.1007/978-3-030-69174-5 doi
Call Number
QA76.9.A25
Dewey Decimal Classification
005.8068
Summary
This book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents. The authors discuss cybersecurity incident planning, starting from a draft response plan, to assigning responsibilities, to use of external experts, to equipping organization teams to address incidents, to preparing communication strategy and cyber insurance. They also discuss classifications and methods to detect cybersecurity incidents, how to organize the incident response team, how to conduct situational awareness, how to contain and eradicate incidents, and how to cleanup and recover. The book shares real-world experiences and knowledge from authors from academia and industry. Shares cases studies on using ML and AI to predict and preempt cyber attacks; Describes security attacks, trends, and scenarios along with attack vectors for various domains and industry sectors; Includes detail on incident planning, detection methods, containing incidents, and clean up and recovery.
Note
Includes index.
Access Note
Access limited to authorized users.
Digital File Characteristics
text file
PDF
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed July 27, 2021).
Series
EAI/Springer innovations in communication and computing, 2522-8595
Introduction
By Failing to Prepare You are preparing to Fail
Authentication Methods and Applications
Design of Blockchain Polynomial Digests to Secure Method Authentication
Need of Cybersecurity for ERP Systems
IoT Architecture Vulnerabilities and Security Measures
Cybersecurity Advanced Persistent Threat Attacks
Securing Deep Learning Neural Networks
Three Tier Architecture to Mitigate DDoS attacks on Hybrid Cloud Environments
Conclusion.