Cyber Defense and Situational Awareness Front Cover

Cyber Defense and Situational Awareness

  • Length: 329 pages
  • Edition: 2014
  • Publisher:
  • Publication Date: 2015-01-06
  • ISBN-10: 3319113909
  • ISBN-13: 9783319113906
  • Sales Rank: #3093805 (See Top 100 Books)
Description

This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for this book. Situational awareness is exceptionally prominent in the field of cyber defense. It involves science, technology and practice of perception, comprehension and projection of events and entities in cyber space. Chapters discuss the difficulties of achieving cyber situational awareness – along with approaches to overcoming the difficulties – in the relatively young field of cyber defense where key phenomena are so unlike the more conventional physical world. Cyber Defense and Situational Awareness is designed as a reference for practitioners of cyber security and developers of technology solutions for cyber defenders. Advanced-level students and researchers focused on security of computer networks will also find this book a valuable resource.

Table of Contents

Chapter 1. Foundation and Challenges
Chapter 2. Kinetic and Cyber
Chapter 3. Formation of Awareness
Chapter 4. Network-Wide Awareness
Chapter 5. Cognition and Technology
Chapter 6. Cognitive Process
Chapter 7. Visualizations and Analysts
Chapter 8. Inference and Ontologies
Chapter 9. Learning and Semantics
Chapter 10. Impact Assessment
Chapter 11. Attack Projection
Chapter 12. Metrics of Security
Chapter 13. Mission Resilience
Chapter 14. Concluding Thoughts
Chapter 15. Acknowledgements and Disclaimers

To access the link, solve the captcha.