Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

The book first provides a historical reference, detailing the emergence of viruses, worms, malware, and other cyber threats that created the need for the cybersecurity field. It then discusses the vulnerabilities of our critical infrastructures, the broad arsenal of cyber attack tools, and the vario...

Full description

Saved in:
Bibliographic Details
Other Authors: Johnson, Thomas A (Editor)
Format: Book
Language:English
Published: Boca Raton CRC Press 2015
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000n a2200000 a 4501
001 wils-558653
005 2018310104743
020 # # |a 9781482239225  |q hardback 
040 # # |a UiTM  |e rda 
041 0 # |a eng 
090 0 0 |a QA76.9  |b .C93 2015 
245 1 0 |a Cybersecurity  |b protecting critical infrastructures from cyber attack and cyber warfare  |c Edited by Thomas A Johnson 
264 # 1 |a Boca Raton  |b CRC Press  |c 2015 
264 # 4 |c ©2015 
300 # # |a xv, 347 pages  |c 25 cm 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarrier 
520 # # |a The book first provides a historical reference, detailing the emergence of viruses, worms, malware, and other cyber threats that created the need for the cybersecurity field. It then discusses the vulnerabilities of our critical infrastructures, the broad arsenal of cyber attack tools, and the various engineering design issues involved in protecting our infrastructures. It goes on to cover cyber intelligence tactics, recent examples of cyber conflict and warfare, and the key issues in formulating a national strategy to defend against cyber warfare. The book also discusses how to assess and measure the cost of cybersecurity. It examines the many associated cost factors and presents the results of several important industry-based economic studies of security breaches that have occurred within many nations. The book concludes with a look at future trends in cybersecurity. It discusses the potential impact of industry-wide transformational changes, such as virtualization, social media, cloud computing, structured and unstructured data, big data, and data analytics. 
650 # 0 |a Computer security 
650 # 0 |a Cyberterrorism  |x Prevention 
650 # 0 |a Computer networks  |x Security measures 
650 # 0 |a Information warfare  |x Prevention 
700 1 # |a Johnson, Thomas A  |e editor 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=558653 
998 # # |a 00264#1a006.2.2||00264#1b006.2.2||00300##a006.2.2||00300##b006.2.2||00300##c006.2.2||00520##a006.2.2||00520##b006.2.2||