CYBER SECURITY INNOVATION FOR THE DIGITAL ECONOMY : a case study of the russian federation.

Saved in:
Bibliographic Details
Main Author: PETRENKO, SERGEI
Corporate Author: ProQuest (Firm)
Format: Electronic eBook
Language:English
Published: [S.l.] : RIVER PUBLISHERS, 2018.
Series:River publishers series in security and digital forensics
Subjects:
Online Access:Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)

MARC

LEADER 00000nam a22000007 4500
001 b3208720
003 CStclU
005 20190201061449.8
006 m |o d |
007 cr |n|||||||||
008 190201s2018 xx o 000 0 eng d
020 |a 9788770220217 (electronic bk.) 
020 |a 8770220212 (electronic bk.) 
020 |z 8770220220 
020 |z 9788770220224 
035 |a (NhCcYBP)ebc5611042 
040 |a NhCcYBP  |c NhCcYBP 
082 0 4 |a 005.8  |2 23 
100 1 |a PETRENKO, SERGEI. 
245 1 0 |a CYBER SECURITY INNOVATION FOR THE DIGITAL ECONOMY :  |b a case study of the russian federation. 
260 |a [S.l.] :  |b RIVER PUBLISHERS,  |c 2018. 
300 |a 1 online resource (1 volume.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 0 |a River publishers series in security and digital forensics 
505 0 0 |a Machine generated contents note:   |g 1.  |t Relevance of Cyber Security Innovations --   |g 1.1.  |t Digital Transformation of State and Society --   |g 1.1.1.  |t State Program "Digital Economy" --   |g 1.1.2.  |t Main Information Infrastructure Development Objectives --   |g 1.1.3.  |t Implementation of the Long-Term Evolution (LTE) Technology --   |g 1.1.4.  |t IIoT/IoT Technologies Development --   |g 1.2.  |t Typical Cyber Security Threats --   |g 1.2.1.  |t Possible Scenarios of Cyber-Attack on the Information Infrastructure --   |g 1.2.2.  |t Threats and Consequences of Wireless LAN IEEE 802.1x Implementation --   |g 1.2.3.  |t Cyber Security Threats of Corporate Digital and IP-ATX (Private Automatic Telephone Exchanges) --   |g 1.2.4.  |t Threats and Security Profile of the Mobile Operating System OS Sailfish and Tizen --   |g 1.3.  |t Cyber Security Threats Monitoring Necessity --   |g 1.3.1.  |t Cyber Security Incidents Factual Account --   |g 1.3.2.  |t Need for Joint Initiatives of Society and States --   |g 1.3.3.  |t Capture the Flag Competition on Vulnerability Detection --   |g 1.3.4.  |t Security Operations Center (SOC) Key Role --   |g 2.  |t MSSP/MDR National Operator Development --   |g 2.1.  |t Ultimate Opportunity of National MSSP/MDR Operators --   |g 2.1.1.  |t Relevance of MSSP/MDR Cyber Security Services --   |g 2.1.2.  |t MSSP/MDR Best Organization Practice --   |g 2.1.3.  |t Sample of MSSP by AT&T --   |g 2.1.4.  |t Sample of MSSP Model by UBIqube --   |g 2.1.5.  |t Feasible Technical Solutions --   |g 2.2.  |t Possible Ways of Providing Cyber Security Services --   |g 2.2.1.  |t Typical MSSR/MDR Services --   |g 2.2.2.  |t IS Sourcing Model Analysis --   |g 2.2.3.  |t IS Sourcing Practice --   |g 2.2.4.  |t Sample SLA Content for the Provision of Cyber Security Services --   |g 2.2.5.  |t Best Practices for Providing Cyber Security Service --   |g 2.3.  |t Development of National MSSP/MDR Based on Big Data --   |g 2.3.1.  |t Big Data Processing Requirements Analysis --   |g 2.3.2.  |t Best Big Data Processing Practice --   |g 2.3.3.  |t MSSP/MDR Subsystem Functionality for Big Data Processing --   |g 2.3.4.  |t Sensor Cloud Architecture Advantages --   |g 2.4.  |t New Methods of Cyber Security Knowledge Management --   |g 2.4.1.  |t Possible State of the Art --   |g 2.4.2.  |t Cyber Security MDM Principles --   |g 2.4.3.  |t MDM Cyber Security System Example --   |g 3.  |t Innovative Methods for Detecting Anomalies --   |g 3.1.  |t Justification of a New Method for Detecting Anomalies --   |g 3.1.1.  |t Analysis of the Existing Approaches to the TCP/IP Network Abnormal Functioning Detection --   |g 3.1.2.  |t Possible Statement of the Detecting Anomalies' Problem --   |g 3.1.3.  |t Definition of New Informative Features --   |g 3.1.4.  |t Detection of Anomalies Based on Dimensions --   |g 3.1.5.  |t Investigation of Properties of Invariants of Dimension --   |g 3.2.  |t Main Provisions of the New Method for Detecting Anomalies --   |g 3.2.1.  |t Main Hypotheses for Detecting Anomalies --   |g 3.2.2.  |t Control of Semantic Correctness Criteria --   |g 3.2.3.  |t Sufficient Condition for the Criteria Fulfillment --   |g 3.2.4.  |t Implementation of the New Method of TCP Transport Layer Protocol --   |g 3.3.  |t Startup of Anomaly Detection Based on Dimensions --   |g 3.3.1.  |t Possible Architecture Solutions --   |g 3.3.2.  |t Features of the Transfer and Control Criteria --   |g 3.3.3.  |t Experiment Results --   |g 3.3.4.  |t Trends and Development Prospects --   |g 3.4.  |t New Method of Analytical Verification --   |g 3.4.1.  |t Data Processing Model on the Example of Oracle Solution --   |g 3.4.2.  |t Marked Data Visualization --   |g 3.4.3.  |t Formalization of HTTP and SQL* Net Protocols --   |g 3.4.4.  |t Presentation of the Transport Layer Protocol (TCP) --   |g 3.4.5.  |t Presentation of the Networking Layer IP --   |g 3.4.6.  |t Control of the Platform Semantic Correctness --   |g 3.4.7.  |t Platform Semantic Correctness Control --   |g 3.4.8.  |t Verification of Applied Queries --   |g 3.4.9.  |t TCP Verification --   |g 3.4.10.  |t IP Verification --   |g 4.  |t Development of Cyber Security Technologies --   |g 4.1.  |t Cyber Security R&D Best Practice --   |g 4.1.1.  |t Cyber Security R&D Importance --   |g 4.1.2.  |t Cyber Security Project Management --   |g 4.1.3.  |t New Cyber Security Problems Statement --   |g 4.2.  |t Development of the Cyber Security Requirements in Terms ofGOSTRIEC 61508 --   |g 4.2.1.  |t Analysis of the Cyber Security Requirements --   |g 4.2.2.  |t Need for GOSTRIEC 61508 Development --   |g 4.2.3.  |t Method for Anomaly Detection in the CF CPCS Behavior --   |g 4.3.  |t Creation of New Cyber Security Ontologies --   |g 4.3.1.  |t Analysis of New Requirements of Cyber Security --   |g 4.3.2.  |t Known Cyber Security Ontologies --   |g 4.3.3.  |t Proposed Cyber Security Ontology --   |g 4.3.4.  |t Ontology Structure Example --   |g 4.4.  |t Development of Cyber Security Platforms --   |g 4.4.1.  |t Principles of Designing Special Computing Systems --   |g 4.4.2.  |t Feasible Computing Classifications --   |g 4.4.3.  |t Characteristics of the Known Computing Systems --   |g 4.4.4.  |t Development of the Supercomputer Technologies --   |g 4.5.  |t Security Software Development based on Agile Methodology --   |g 4.5.1.  |t Main Ideas and Principles of the Agile Methodology --   |g 4.5.2.  |t Best Practices of Agile Methodology --   |g 4.5.3.  |t Adapting Agile for Secure Application Development --   |g 4.6.  |t Development of BI-platforms for Cyber Security Predictive Analytics --   |g 4.6.1.  |t BI-security Platform Requirements --   |g 4.6.2.  |t BI Security Platform Startup --   |g 4.6.3.  |t Expected Results. 
533 |a Electronic reproduction.  |b Ann Arbor, MI  |n Available via World Wide Web. 
588 |a Description based on print version record. 
650 0 |a Computer security. 
650 0 |a Computer security  |z Russia (Federation)  |x Evaluation. 
710 2 |a ProQuest (Firm) 
776 0 8 |c Original  |z 8770220220  |z 9788770220224 
856 4 0 |u https://ebookcentral.proquest.com/lib/santaclara/detail.action?docID=5611042  |z Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)  |t 0 
907 |a .b32087202  |b 200401  |c 190204 
998 |a uww  |b    |c m  |d z   |e l  |f eng  |g xx   |h 0 
917 |a YBP DDA 
919 |a .ulebk  |b 2017-02-14 
999 f f |i 1588afab-45a6-518e-ae18-fcd890019e4e  |s 767626b5-9c10-5831-85af-984c26b71482  |t 0