This Book >>

  • 221pp. Published April 2019
  • Scientific Research Publishing
  • Category: Computer Science & Communications
  • ISBN: 978-1-61896-656-8
  • (Paperback) USD 89.00
  • ISBN: 978-1-61896-657-5
  • (E-Book) USD 29.00

Connect with SCIRP >>

Contact Us >>

WhatsApp  +86 18163351462(WhatsApp)
   
Paper Publishing WeChat
Book Publishing WeChat
(or Email:book@scirp.org)
Home > Books > THE ANALYSIS OF CYBER SECURITY THE EXTE...
THE ANALYSIS OF CYBER SECURITY THE EXTENDED CARTESIAN METHOD APPROACH WITH INNOVATIVE STUDY MODELS
  • Description
  • E-Book
  • Author(s) Information

Cyber security is the practice of protecting systems, networks, and programs from digital attacks. These cyber attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Implementing effective cyber security measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative.


This thesis addresses the individuation of the appropriate scientific tools in order to create a methodology and a set of models for establishing the suitable metrics and pertinent analytical capacity in the cyber dimension for social applications. The current state of the art of cyber security is exemplified by some specific characteristics.

Components of the Book:
  • Dedication
  • Acknowledgement
  • Abstract
  • Table of Contents
  • List of Figures
  • List of Tables
  • Chapter 1. Introduction
    • 1.1. Background and Motivation
    • 1.2. Research Problems
    • 1.3. Aims and Objectives
    • 1.4. Research Methods
    • 1.5. Organization of the Thesis
  • Chapter 2. The State of the Art of Cyber Security
    • 2.1. ICT Systems and Valuable Information
    • 2.2. The Growing Dependency on ICT Systems
    • 2.3. Information Security
    • 2.4. The Cryptography
    • 2.5. The Current Core Defensive Strategy
    • 2.6. The Risk Perception
    • 2.7. The Current Risk Management Approach
    • 2.8. Summary
  • Chapter 3. The Current Established Principles for Any New Development
    • 3.1. Critical Analysis of Existing Framework for Cyber Security
    • 3.2. Value and Accountancy
    • 3.3. Underpinning Principles for Information Security Analysis
    • 3.4. The Coordination between the Menu of Security Models and the Most Recognized and Used Methodologies
    • 3.5. Summary
  • Chapter 4. The New Patterns for Security
    • 4.1. The Novelty of the Research Hypothesis
    • 4.2. The Three-Entity Model
    • 4.3. The Functional and Business Information Model
    • 4.4. The Security Chain Model and the ASThMA Rate
    • 4.5. The Value Assessment of Information Mission
    • 4.6. The Methodology for Estimating Information Mission Value (ACES 1, 2 and 3)
  • Chapter 5. Innovative Hypothesis for Assessing Security Metrics and Risks
    • 5.1. The Defence in Depth Applied to Cyber Secu-rity
    • 5.2. The Cards for Assessing the Defence in Depth Applied to Cyber Security
    • 5.3. The Cyber Risks Assessment
    • 5.4. New Risk Assessment Based on a Single Negative Event
    • 5.5. The Perspective for Academic Validation in Consideration of the Validation of Alternative Security Approaches
    • 5.6. Summary
  • Chapter 6. Conclusion and Future Works
    • 6.1. Concluding Remarks
    • 6.2. Implications and Contributions
    • 6.3. Future Work
  • References
  • Glossary
Readership: Students, academics, teachers and other people attending or interested in cyber security.
comments powered by Disqus