Cyber resilience of systems and networks. ([2019])
- Record Type:
- Book
- Title:
- Cyber resilience of systems and networks. ([2019])
- Main Title:
- Cyber resilience of systems and networks
- Further Information:
- Note: Alexander Kott, Igor Linkov, editors.
- Editors:
- Kott, Alexander, 1971-
Linkov, Igor - Contents:
- Intro; Contents; Contributors; Chapter 1: Fundamental Concepts of Cyber Resilience: Introduction and Overview; 1 Motivation: Why Cyber Resilience?; 2 Resilience and Systems; 3 Resilience and Related Properties of Systems; 4 Costs of Cyber Resilience and Cyber Risk Management; 5 Assessment of Cyber Resilience; 6 Approaches to Improving Cyber Resilience; 7 Preview of the Book; References; Part I: Quantifying Cyber Resilience; Chapter 2: Metrics Based on the System Performance Perspective; 1 Introduction; 2 Ingredients of Quantitative Cyber Resiliency; 3 Challenges and Future Work; References Chapter 3: Metrics Based on the Mission Risk Perspective1 Introduction; 2 Considerations for Measuring Resilience; 2.1 System Boundaries Matter; 2.2 System Performance, Performance Metrics, and Threshold Performance Minimums; 2.3 Analysis Timeframe; 2.4 Capacity to Withstand Incidents; 2.5 The Occurrence of Incidents Is Uncertain; 2.6 Scale of Deployment; 3 A Definition of Resilience; 3.1 Resilience Is; 4 Example of Estimating Mission Resilience; 5 Application of the Resilience Metric to Complex Systems; 6 Comparison with Previous Work and Definitions; 7 Discussion; 8 Summary; References Part II: Assessment and Analysis of Cyber ResilienceChapter 4: Frameworks and Best Practices; 1 Introduction; 2 Framework Review; 2.1 The Resilience Matrix Framework (See footnote 1); 2.2 The National Institute of Standards and Technologyś (NIST) Framework; 2.3 The Center on Local Government ResearchIntro; Contents; Contributors; Chapter 1: Fundamental Concepts of Cyber Resilience: Introduction and Overview; 1 Motivation: Why Cyber Resilience?; 2 Resilience and Systems; 3 Resilience and Related Properties of Systems; 4 Costs of Cyber Resilience and Cyber Risk Management; 5 Assessment of Cyber Resilience; 6 Approaches to Improving Cyber Resilience; 7 Preview of the Book; References; Part I: Quantifying Cyber Resilience; Chapter 2: Metrics Based on the System Performance Perspective; 1 Introduction; 2 Ingredients of Quantitative Cyber Resiliency; 3 Challenges and Future Work; References Chapter 3: Metrics Based on the Mission Risk Perspective1 Introduction; 2 Considerations for Measuring Resilience; 2.1 System Boundaries Matter; 2.2 System Performance, Performance Metrics, and Threshold Performance Minimums; 2.3 Analysis Timeframe; 2.4 Capacity to Withstand Incidents; 2.5 The Occurrence of Incidents Is Uncertain; 2.6 Scale of Deployment; 3 A Definition of Resilience; 3.1 Resilience Is; 4 Example of Estimating Mission Resilience; 5 Application of the Resilience Metric to Complex Systems; 6 Comparison with Previous Work and Definitions; 7 Discussion; 8 Summary; References Part II: Assessment and Analysis of Cyber ResilienceChapter 4: Frameworks and Best Practices; 1 Introduction; 2 Framework Review; 2.1 The Resilience Matrix Framework (See footnote 1); 2.2 The National Institute of Standards and Technologyś (NIST) Framework; 2.3 The Center on Local Government Research Framework; 2.4 Choosing a Framework and Adding Metrics; 3 Best Practices; 3.1 Understand and Manage Legal and Regulatory Requirements Regarding Cybersecurity, Including Privacy and Civil Liberties Obl...; 3.2 Establish a Cyber-Aware Culture (Matrix Location: Social/Plan and Prepare #6) 3.3 Educate/Train Employees About Resilience and Organizationś Resilience Plan (Matrix Location: Social/Plan and Prepare #2)3.4 Documentation of Certifications, Qualifications, and Pedigree of Critical Hardware and/or Software Providers (Matrix Locat...; 3.5 Identify and Coordinate with External Entities That May Influence or Be Influenced by Internal Cyberattacks (Establish Poi...; 3.6 Include Cybersecurity in Human Resources Practices (Matrix Location: Cognitive/Plan and Prepare #4); 3.7 Test Response and Recovery Plans (Matrix Location: Cognitive/Plan and Prepare #5) 3.8 Assessment of Network Structure and Interconnection to System Components and to the Environment (Matrix Location: Physical...3.9 Dedicate Cyber Resources to Defend Against Attack (Matrix Location: Physical/Absorb #3); 3.10 Review Critical Points of Physical and Information Failure in Order to Make Informed Decisions (Matrix Location: Cognitiv...; 3.11 Manage Public Relations and Repair Reputation After Events (Matrix Location: Social/Recover #1); 3.12 Voluntarily Share Information with External Stakeholders to Achieve Broader Cybersecurity Situational Awareness (Matrix L... … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2019
- Extent:
- 1 online resource (475 pages), illustrations
- Subjects:
- 005.8
Engineering
Computer networks -- Security measures
Cyberspace -- Security measures
Internet -- Security measures
Computer security
COMPUTERS / Security / Networking
Computer networks -- Security measures
Computer security
Internet -- Security measures
Computers -- Security -- General
Computer security
System safety
Technology & Engineering -- Quality Control
Reliability engineering
Electronic books
Electronic books - Languages:
- English
- ISBNs:
- 9783319774923
3319774921 - Related ISBNs:
- 9783319774916
3319774913 - Notes:
- Note: Includes bibliographical references and index.
Note: Print version record. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.367448
- Ingest File:
- 01_346.xml