Cyber-Security Threats, Actors, and Dynamic Mitigation
Home > Computing and Information Technology > Computer security > Privacy and data protection > Cyber-Security Threats, Actors, and Dynamic Mitigation
Cyber-Security Threats, Actors, and Dynamic Mitigation

Cyber-Security Threats, Actors, and Dynamic Mitigation


     0     
5
4
3
2
1



International Edition


X
About the Book

Cyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security. It covers the methodologies for modeling attack strategies used by threat actors targeting devices, systems, and networks such as smart homes, critical infrastructures, and industrial IoT. With a comprehensive review of the threat landscape, the book explores both common and sophisticated threats to systems and networks. Tools and methodologies are presented for precise modeling of attack strategies, which can be used both proactively in risk management and reactively in intrusion prevention and response systems. Several contemporary techniques are offered ranging from reconnaissance and penetration testing to malware detection, analysis, and mitigation. Advanced machine learning-based approaches are also included in the area of anomaly-based detection, that are capable of detecting attacks relying on zero-day vulnerabilities and exploits. Academics, researchers, and professionals in cyber-security who want an in-depth look at the contemporary aspects of the field will find this book of interest. Those wanting a unique reference for various cyber-security threats and how they are detected, analyzed, and mitigated will reach for this book often.

Table of Contents:
1. Cyber–attackers’ profiling. 2. Reconnaissance. 3. System threats. 4. Cryptography threats. 5. Network threats. 6. Malware detection and mitigation. 7. Dynamic risk management. 8. Attack graph generation. 9. Intelligent intrusion response.

About the Author :
Nicholas Kolokotronis is an Associate Professor and head of the Cryptography and Security Group at the Department of Informatics and Telecommunications, University of the Peloponnese. He received his B.Sc. in mathematics from the Aristotle University of Thessaloniki, Greece, in 1995, an M.Sc. in highly efficient algorithms (highest honors) in 1998 and a Ph.D. in cryptography in 2003, both from the National and Kapodistrian University of Athens. Since 2004, he has held visiting positions at the University of Piraeus, University of the Peloponnese, the National and Kapodistrian University of Athens, and the Open University of Cyprus. During 2002–04, he was with the European Dynamics S.A., Greece, as a security consultant. He has been a member of working groups for the provisioning of professional cyber–security training to large organizations, including the Hellenic Telecommunications and Posts Commission (EETT). He has published more than 85 papers in international scientific journals, conferences, and books and has participated in more than 20 EU–funded and national research and innovation projects. He has been a co–chair of conferences (IEEE CSR 2021), workshops (IEEE SecSoft 2019, IEEE CSRIoT 2019, 2020, and ACM EPESec 2020), and special sessions focusing on IoT security. Moreover, he has been a TPC member in many international conferences, incl. IEEE ISIT, IEEE GLOBECOM, IEEE ICC, ARES, and ISC. He is currently a Guest Editor in "Engineering – cyber security, digital forensics and resilience" area of Springer’s Applied Sciences Journal (since 2019) and in the Reviewer Board of MDPI’s Cryptography journal (since 2020), whereas he has been an Associate Editor of the EURASIP Journal on Wireless Communications and Networking (2009–17) and a regular reviewer for a number of prestigious journals, incl. IEEE TIFS, IEEE TIT, Springer’s DCC, etc. His research interests span the broad areas of cryptography, security, and coding theory. Stavros Shiaeles is an Assistant Professor in cyber-security at the University of Portsmouth, UK. He worked as an expert in cyber-security and digital forensics in the UK and EU, serving companies and research councils. His research interest span in the broad area of cyber-security and more specifically in OSINT, social engineering, distributed denial-of-service attacks, cloud security, digital forensics, network anomaly detection, and malware mitigation. Dr Shiaeles has authored more than 60 publications in academic journals and conferences, co-chaired many workshops and conferences and actively involved in research projects as Principal Investigator leading his cyber-security research team. He is currently a Guest Editor in the topical collection "Cyber security, digital forensics and resilience" at Springer’s Applied Sciences Journal (since 2019), Topic Editor at MDPI Forensic Sciences Journal (since 2020), Guest editor in the Special Issue "Advancements in Networking and Cyber Security" at MDPI Electronics Journal (2020), Guest editor in the "Special Issue on Novel Cyber-Security Paradigms for Software-defined and Virtualized Systems" at Elsevier Computer Networks Journal (2020), Active member at IEEE Technical Committee on Information Infrastructure and Networking (TCIIN) and a regular reviewer for several prestigious journals. Further to his academic qualifications, he holds a series of professional certifications, namely EC-Council Certified Ethical Hacker (CEH), EC-Council Advanced Penetration Testing (CAST611), ISACA Cobit 5 Foundation and a Cyberoam Certified Network and Security Professional (CCNSP), and he is EC-Council accredited instructor providing professional certifications training on cyber-security and penetration testing. He is also a Fellow of the BCS and a Fellow of the Higher Education Academy in the UK. Before entering academia, Dr Shiaeles was in the industry, where he has more than ten years of experience, and he has worked on various aspects of IT and cyber-security, gaining invaluable hands-on knowledge on various systems and software developing.


Best Sellers


Product Details
  • ISBN-13: 9780367745875
  • Publisher: Taylor & Francis Ltd
  • Publisher Imprint: CRC Press
  • Height: 234 mm
  • No of Pages: 374
  • Width: 156 mm
  • ISBN-10: 0367745879
  • Publisher Date: 04 Oct 2024
  • Binding: Paperback
  • Language: English
  • Weight: 580 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Cyber-Security Threats, Actors, and Dynamic Mitigation
Taylor & Francis Ltd -
Cyber-Security Threats, Actors, and Dynamic Mitigation
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cyber-Security Threats, Actors, and Dynamic Mitigation

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!