The Cyber Security Handbook最新文献

筛选
英文 中文
GOVERN AND ASSURE 管理和保证
The Cyber Security Handbook Pub Date : 2020-12-10 DOI: 10.2307/j.ctv19shhms.18
{"title":"GOVERN AND ASSURE","authors":"","doi":"10.2307/j.ctv19shhms.18","DOIUrl":"https://doi.org/10.2307/j.ctv19shhms.18","url":null,"abstract":"","PeriodicalId":314085,"journal":{"name":"The Cyber Security Handbook","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128397845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RESPOND AND RECOVER 响应和恢复
The Cyber Security Handbook Pub Date : 2020-12-10 DOI: 10.2307/j.ctv19shhms.17
{"title":"RESPOND AND RECOVER","authors":"","doi":"10.2307/j.ctv19shhms.17","DOIUrl":"https://doi.org/10.2307/j.ctv19shhms.17","url":null,"abstract":"","PeriodicalId":314085,"journal":{"name":"The Cyber Security Handbook","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132697802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STEP 3 – DETERMINE THE SCOPE 步骤3 -确定范围
The Cyber Security Handbook Pub Date : 2020-12-10 DOI: 10.2307/j.ctv19shhms.23
{"title":"STEP 3 – DETERMINE THE SCOPE","authors":"","doi":"10.2307/j.ctv19shhms.23","DOIUrl":"https://doi.org/10.2307/j.ctv19shhms.23","url":null,"abstract":"","PeriodicalId":314085,"journal":{"name":"The Cyber Security Handbook","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116366055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EXTENDED 扩展
The Cyber Security Handbook Pub Date : 2020-12-10 DOI: 10.1201/b17277-10
Sue Pemberton
{"title":"EXTENDED","authors":"Sue Pemberton","doi":"10.1201/b17277-10","DOIUrl":"https://doi.org/10.1201/b17277-10","url":null,"abstract":"","PeriodicalId":314085,"journal":{"name":"The Cyber Security Handbook","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125543617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
APPENDIX 2: 附录2:
The Cyber Security Handbook Pub Date : 2020-12-10 DOI: 10.2307/j.ctv19shhms.36
{"title":"APPENDIX 2:","authors":"","doi":"10.2307/j.ctv19shhms.36","DOIUrl":"https://doi.org/10.2307/j.ctv19shhms.36","url":null,"abstract":"","PeriodicalId":314085,"journal":{"name":"The Cyber Security Handbook","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115923045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AN OVERVIEW OF THE CRF PROCESSES CRF流程概述
The Cyber Security Handbook Pub Date : 2020-12-10 DOI: 10.2307/j.ctv19shhms.14
{"title":"AN OVERVIEW OF THE CRF PROCESSES","authors":"","doi":"10.2307/j.ctv19shhms.14","DOIUrl":"https://doi.org/10.2307/j.ctv19shhms.14","url":null,"abstract":"","PeriodicalId":314085,"journal":{"name":"The Cyber Security Handbook","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132404942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CONCLUSION 结论
The Cyber Security Handbook Pub Date : 2020-12-10 DOI: 10.2307/j.ctv19shhms.34
{"title":"CONCLUSION","authors":"","doi":"10.2307/j.ctv19shhms.34","DOIUrl":"https://doi.org/10.2307/j.ctv19shhms.34","url":null,"abstract":"","PeriodicalId":314085,"journal":{"name":"The Cyber Security Handbook","volume":"28 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113955151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MATURITY LEVELS 成熟度级别
The Cyber Security Handbook Pub Date : 2020-12-10 DOI: 10.2307/j.ctv19shhms.19
{"title":"MATURITY LEVELS","authors":"","doi":"10.2307/j.ctv19shhms.19","DOIUrl":"https://doi.org/10.2307/j.ctv19shhms.19","url":null,"abstract":"","PeriodicalId":314085,"journal":{"name":"The Cyber Security Handbook","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117092285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CYBER RESILIENCE 网络弹性
The Cyber Security Handbook Pub Date : 2020-12-10 DOI: 10.2307/j.ctv19shhms.6
K. Levitt
{"title":"CYBER RESILIENCE","authors":"K. Levitt","doi":"10.2307/j.ctv19shhms.6","DOIUrl":"https://doi.org/10.2307/j.ctv19shhms.6","url":null,"abstract":"The term resilience has been in various uses for over 400 years and has been applied to characterize the ability of something to withstand unexpected threats, where the \"something\" can be an individual, a community, an object, species, an ecosystem, etc. The dependable community has embraced the term primarily under the threat of natural faults by asserting that a resilient system should fail operational (provide the full service as if no cyber disturbance occurred) but if this is not possible fail safe (preserve a safety requirement) and as a last resort fail stop. Increasingly, organizations embrace cyber resilience as a general strategy for security where the goal is to deliver an intended cyber service in the presence of cyber events to the extent possible. Although there are differing views of it, Symantec among others associates five \"pillars\" with the resilience concept: Prepare/Identify, Protect, Detect, Respond, Recover In its Cyber R&D Strategic Plan, NITRD has proposed a similar structure, again reflecting a multi-step and a dynamic approach to cyber resilience. In recent years, the security community has under the rubric of resilience begun to consider systems that dynamically cope with attacks, unexpected or previously unseen. DARPA has run several programs along this line, for example SRS (SelfRegenerative Systems), which explored many techniques towards systems that dynamically respond to attacks. Although there are fairly straightforward approaches, such as intrusion-prevention systems, today's systems mostly rely on human-driven responses to attacks. For the rapidly emerging applications, such as connected cars, cyber-controlled processing plants, and smart grids, human-level response is too slow; but fully automated response is considered too dangerous and too easily thwarted by an informed adversary, particularly when triggered by imperfect detection. Thus there is a clear need for the research community to take on the challenge of resilience. This breakout session is open to all of the research topics that bear on resilience, including but not limited to: System architectures in support of resilience The specification of \"intended\" cyber service for different situations The specification of \"safety\" requirements for different applications Approaches to detection, particularly approaches to cope with imperfect detection. \"Moves\" a system can take to achieve resilience Overall, does the automation of resilience introduce too many new and undefendable attack surfaces that preclude its serious consideration? Can \"risk\" to the mission be the overarching principle that characterizes the components of resilience? Are there measurable metrics to characterize cyber resilience? Other available formats: Cyber Resilience Switch to normal viewerSwitch to experimental viewer Karl Levitt License: Creative Commons 2.5 Presentations Presentations SaTC Pi Meeting 2017 2017 Presentation","PeriodicalId":314085,"journal":{"name":"The Cyber Security Handbook","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123707530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
ABOUT THE AUTHOR 作者简介
The Cyber Security Handbook Pub Date : 2020-12-10 DOI: 10.2307/j.ctv19shhms.2
{"title":"ABOUT THE AUTHOR","authors":"","doi":"10.2307/j.ctv19shhms.2","DOIUrl":"https://doi.org/10.2307/j.ctv19shhms.2","url":null,"abstract":"","PeriodicalId":314085,"journal":{"name":"The Cyber Security Handbook","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133549903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信