Amazon cover image
Image from Amazon.com

The science of cybersecurity and a roadmap to research / Benjamin J. Colfer, editor.

Contributor(s): Material type: TextTextSeries: Defense, security and strategy series | Computer science, technology and applicationsPublication details: Hauppauge, NY : Nova Science Publishers, 2011.Description: 1 online resource (198 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781611223620
  • 1611223628
Subject(s): Genre/Form: Additional physical formats: Print version:: Science of cybersecurity and a roadmap to research.DDC classification:
  • 005.8 23
LOC classification:
  • TK5105.59 .S3843 2011eb
Online resources:
Contents:
Library of Congress Cataloging-in-Publication Data; Contents; Preface; Science of Cybersecurity; Abstract; 1. executive Summary; 2. Problem Statement and Introduction; 3. Cyber-Security as Science -- An Overview; 3.1. Attributes for Cyber-Security; 3.2. Guidance from other Sciences; 3.2.1. Economics; 3.2.2. Meteorology; 3.2.3. Medicine; 3.2.4. Astronomy; 3.2.5. Agriculture; 3.3. Security Degrades Over Time; 3.3.1. Unix passwords; 3.3.2. Lock bumping; 3.4. The Role of Secrecy; 3.5. Aspects of the Science of Cyber-Security; 3.6. Some Science; 3.6.1. Trust; 3.6.2. Cryptography; 3.6.3. Game theory.
3.6.4. Model checking3.6.5. Obfuscation; 3.6.6. Machine learning; 3.6.7. Composition of components; 3.7. Applying the Fruits of Science; 3.8. Metrics; 3.9. The Opportunities of New Technologies; 3.10. Experiments and Data; 4. Model Checking; 4.1. Brief Introduction to Spin and Promela; 4.2. Application to Security; 4.2.1. The Needham-Schroeder Protocol; 4.2.2. Promela model of the protocol; 4.3. Scaling Issues; 4.4. Extracting Models from Code; 4.5. Relationship to Hyper-Properties; 5. The Immune System Analogy; 5.1. Basic Biology; 5.2. Learning from the Analogy.
5.2.1. The need for adaptive response5.2.2. A mix of sensing modalities; 5.2.3. The need for controlled experiments; 5.2.4. Time scale differences; 5.2.5. Responses to detection; 5.2.6. Final points; 6. Conclusions and Recommendations; A. Appendix: Briefers; References; A Roadmap for Cybersecurity Research; Executive Summary; Introduction; Historical Background; Current Context; Document Format; Background; Future Directions; Acknowledgments; Current Hard Problems in INFOSEC Research; 1. Scalable Trustworthy Systems; Background; What is the problem being addressed?
What are the potential threats?Who are the potential beneficiaries? What are their respective needs?; What is the current state of the practice?; What is the status of current research?; Future Directions; On what categories can we subdivide this topic?; What are the major research gaps?; Near term; Medium term; Long term; What are the challenges that must be addressed?; What approaches might be desirable?; What R & D is evolutionary and what is more basic, higher risk, game changing?; Resources; Measures of success; What needs to be in place for test and evaluation?
To what extent can we test real systems?2. Enterprise-Level Metrics (ELMs); Background; What is the problem being addressed?; What are the potential threats?; Who are the potential beneficiaries? What are their respective needs?; What is the current state of the practice?; What is the status of current research?; Future Directions; On what categories can we subdivide this topic?; Definition; Collection; Analysis; Composition; Adoption; What are the major research gaps?; What are some exemplary problems for R & D on this topic?
Item type:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Home library Collection Call number Materials specified Status Date due Barcode
Electronic-Books Electronic-Books OPJGU Sonepat- Campus E-Books EBSCO Available

Includes index.

Library of Congress Cataloging-in-Publication Data; Contents; Preface; Science of Cybersecurity; Abstract; 1. executive Summary; 2. Problem Statement and Introduction; 3. Cyber-Security as Science -- An Overview; 3.1. Attributes for Cyber-Security; 3.2. Guidance from other Sciences; 3.2.1. Economics; 3.2.2. Meteorology; 3.2.3. Medicine; 3.2.4. Astronomy; 3.2.5. Agriculture; 3.3. Security Degrades Over Time; 3.3.1. Unix passwords; 3.3.2. Lock bumping; 3.4. The Role of Secrecy; 3.5. Aspects of the Science of Cyber-Security; 3.6. Some Science; 3.6.1. Trust; 3.6.2. Cryptography; 3.6.3. Game theory.

3.6.4. Model checking3.6.5. Obfuscation; 3.6.6. Machine learning; 3.6.7. Composition of components; 3.7. Applying the Fruits of Science; 3.8. Metrics; 3.9. The Opportunities of New Technologies; 3.10. Experiments and Data; 4. Model Checking; 4.1. Brief Introduction to Spin and Promela; 4.2. Application to Security; 4.2.1. The Needham-Schroeder Protocol; 4.2.2. Promela model of the protocol; 4.3. Scaling Issues; 4.4. Extracting Models from Code; 4.5. Relationship to Hyper-Properties; 5. The Immune System Analogy; 5.1. Basic Biology; 5.2. Learning from the Analogy.

5.2.1. The need for adaptive response5.2.2. A mix of sensing modalities; 5.2.3. The need for controlled experiments; 5.2.4. Time scale differences; 5.2.5. Responses to detection; 5.2.6. Final points; 6. Conclusions and Recommendations; A. Appendix: Briefers; References; A Roadmap for Cybersecurity Research; Executive Summary; Introduction; Historical Background; Current Context; Document Format; Background; Future Directions; Acknowledgments; Current Hard Problems in INFOSEC Research; 1. Scalable Trustworthy Systems; Background; What is the problem being addressed?

What are the potential threats?Who are the potential beneficiaries? What are their respective needs?; What is the current state of the practice?; What is the status of current research?; Future Directions; On what categories can we subdivide this topic?; What are the major research gaps?; Near term; Medium term; Long term; What are the challenges that must be addressed?; What approaches might be desirable?; What R & D is evolutionary and what is more basic, higher risk, game changing?; Resources; Measures of success; What needs to be in place for test and evaluation?

To what extent can we test real systems?2. Enterprise-Level Metrics (ELMs); Background; What is the problem being addressed?; What are the potential threats?; Who are the potential beneficiaries? What are their respective needs?; What is the current state of the practice?; What is the status of current research?; Future Directions; On what categories can we subdivide this topic?; Definition; Collection; Analysis; Composition; Adoption; What are the major research gaps?; What are some exemplary problems for R & D on this topic?

eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide

There are no comments on this title.

to post a comment.

O.P. Jindal Global University, Sonepat-Narela Road, Sonepat, Haryana (India) - 131001

Send your feedback to glus@jgu.edu.in

Hosted, Implemented & Customized by: BestBookBuddies   |   Maintained by: Global Library