Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare Front Cover

Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare

  • Length: 363 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2015-04-16
  • ISBN-10: 1482239221
  • ISBN-13: 9781482239225
  • Sales Rank: #214962 (See Top 100 Books)
Description

The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporations to protect against these threats.

The book first provides a historical reference, detailing the emergence of viruses, worms, malware, and other cyber threats that created the need for the cybersecurity field. It then discusses the vulnerabilities of our critical infrastructures, the broad arsenal of cyber attack tools, and the various engineering design issues involved in protecting our infrastructures. It goes on to cover cyber intelligence tactics, recent examples of cyber conflict and warfare, and the key issues in formulating a national strategy to defend against cyber warfare.

The book also discusses how to assess and measure the cost of cybersecurity. It examines the many associated cost factors and presents the results of several important industry-based economic studies of security breaches that have occurred within many nations. The book concludes with a look at future trends in cybersecurity. It discusses the potential impact of industry-wide transformational changes, such as virtualization, social media, cloud computing, structured and unstructured data, big data, and data analytics.

Table of Contents

Chapter 1: Historical Reference Points in the Computer Industry and Emerging Challenges in Cybersecurity
Chapter 2: Critical Infrastructures, Key Assets : A Target-Rich Environment
Chapter 3: Protection and Engineering Design Issues in Critical Infrastructures
Chapter 4: Cyber Intelligence, Cyber Conflicts, and Cyber Warfare
Chapter 5: Cybersecurity : A Primer of U.S. and International Legal Aspects
Chapter 6: Economic Cost of Cybersecurity
Chapter 7: Cybersecurity Threat Landscape and Future Trends

To access the link, solve the captcha.