This book presents a unique, step-by-step approach for monitoring, detecting, analyzing and mitigating complex network cyber threats. It includes updated processes in response to asymmetric threats, as well as descriptions of the current tools to mitigate cyber threats. Featuring comprehensive computer science material relating to a complete network baseline with the characterization hardware and software configuration, the book also identifies potential emerging cyber threats and the vulnerabilities of the network architecture to provide students with a guide to responding to threats. The book is intended for undergraduate and graduate college students who are unfamiliar with the cyber paradigm and processes in responding to attacks.
Reihe
Auflage
Sprache
Verlagsort
Verlagsgruppe
Springer International Publishing
Zielgruppe
Illustrationen
2
16 farbige Abbildungen, 2 s/w Abbildungen
XV, 97 p. 18 illus., 16 illus. in color.
Maße
Höhe: 235 mm
Breite: 155 mm
Dicke: 7 mm
Gewicht
ISBN-13
978-3-030-61593-2 (9783030615932)
DOI
10.1007/978-3-030-61591-8
Schweitzer Klassifikation
Pre-incident Planning and Analysis.- Incident Detection and Characterization.- Vulnerability/Consequence Analysis.- Incident Response and Recovery.- Cloud Architecture.- Lessons Learned.