000 03674nam a22005535i 4500
001 978-3-030-69174-5
003 DE-He213
005 20220801220440.0
007 cr nn 008mamaa
008 210707s2021 sz | s |||| 0|eng d
020 _a9783030691745
_9978-3-030-69174-5
024 7 _a10.1007/978-3-030-69174-5
_2doi
050 4 _aTK5101-5105.9
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
072 7 _aTJK
_2thema
082 0 4 _a621.382
_223
245 1 0 _aSecurity Incidents & Response Against Cyber Attacks
_h[electronic resource] /
_cedited by Akashdeep Bhardwaj, Varun Sapra.
250 _a1st ed. 2021.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2021.
300 _aVIII, 242 p. 110 illus., 91 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aEAI/Springer Innovations in Communication and Computing,
_x2522-8609
505 0 _aIntroduction -- By Failing to Prepare – You are preparing to Fail -- Authentication Methods and Applications -- Design of Blockchain Polynomial Digests to Secure Method Authentication -- Need of Cybersecurity for ERP Systems -- IoT – Architecture Vulnerabilities and Security Measures -- Cybersecurity Advanced Persistent Threat Attacks -- Securing Deep Learning Neural Networks -- Three Tier Architecture to Mitigate DDoS attacks on Hybrid Cloud Environments -- Conclusion.
520 _aThis book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents. The authors discuss cybersecurity incident planning, starting from a draft response plan, to assigning responsibilities, to use of external experts, to equipping organization teams to address incidents, to preparing communication strategy and cyber insurance. They also discuss classifications and methods to detect cybersecurity incidents, how to organize the incident response team, how to conduct situational awareness, how to contain and eradicate incidents, and how to cleanup and recover. The book shares real-world experiences and knowledge from authors from academia and industry. Shares cases studies on using ML and AI to predict and preempt cyber attacks; Describes security attacks, trends, and scenarios along with attack vectors for various domains and industry sectors; Includes detail on incident planning, detection methods, containing incidents, and clean up and recovery.
650 0 _aTelecommunication.
_910437
650 0 _aComputer crimes.
_910774
650 0 _aPsychology, Industrial.
_934059
650 1 4 _aCommunications Engineering, Networks.
_931570
650 2 4 _aCybercrime.
_933477
650 2 4 _aIndustrial Psychology.
_950371
700 1 _aBhardwaj, Akashdeep.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_950372
700 1 _aSapra, Varun.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_950373
710 2 _aSpringerLink (Online service)
_950374
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030691738
776 0 8 _iPrinted edition:
_z9783030691752
776 0 8 _iPrinted edition:
_z9783030691769
830 0 _aEAI/Springer Innovations in Communication and Computing,
_x2522-8609
_950375
856 4 0 _uhttps://doi.org/10.1007/978-3-030-69174-5
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c78577
_d78577