Cybersecurity in digital transformation [Documento eletrónico] : scope and applications / by Dietmar P. F. Möller
Language: eng.Country: Switzerland, Swiss Confederation.Publication: Cham : Springer, 2020Description: XIX, 114 p. : il.ISBN: 978-3-030-60570-4.Series: SpringerBriefs on Cyber Security Systems and NetworksSubject - Topical Name: Computer networks -- Security measures | Machine learning Online Resources:Click here to access onlineItem type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
E-Books | Biblioteca NOVA FCT Online | Não Ficção | TK5105.59.SPR FCT (Browse shelf(Opens below)) | 1 | Available | 96556 |
Browsing Biblioteca NOVA FCT shelves, Shelving location: Online, Collection: Não Ficção Close shelf browser (Hides shelf browser)
TK5105.5.SPR FCT 81643 Game theoretic problems in network economics and mechanism design solutions | TK5105.5.SPR FCT 95880 Group testing theory in network security, an advanced solution | TK5105.54.SPR FCT 81312 Mathematical aspects of network routing optimization | TK5105.59.SPR FCT Cybersecurity in digital transformation, scope and applications | TK6553.ELS FCT 85521 Newnes radio and RF engineering pocket book | TK6553.ELS FCT 85576 Practical radio-frequency handbook | TK6560.ELS FCT 85575 Practical radio engineering and telemetry for industry |
This book brings together the essential methodologies required to understand the advancement of digital technologies into digital transformation, as well as to protect them against cyber threat vulnerabilities (in this context cybersecurity attack ontology is included, modeling different types of adversary knowledge). It covers such essential methodologies as CIA Triad, Security Risk, Likelihood, and Consequence Level, Threat Attack Profiling, Threat Intelligence, Threat Lifecycle and more. The idea behind digital transformation is to use digital technologies not only to replicate an existing process in a digital form, but to use digital technology to transform that process into something intelligent (where anything is connected with everything at any time and accessible and controlled and designed advanced). Against this background, cyber threat attacks become reality, using advanced digital technologies with their extreme interconnected capability which call for sophisticated cybersecurity protecting digital technologies of digital transformation. Scientists, advanced-level students and researchers working in computer science, electrical engineering and applied mathematics will find this book useful as a reference guide. Professionals working in the field of big data analytics or digital/intelligent manufacturing will also find this book to be a valuable tool. .
There are no comments on this title.