دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش:
نویسندگان: Benjamin J. Colfer (editor)
سری: Defense, Security and Strategy
ISBN (شابک) : 1612098266, 9781611223620
ناشر: Nova Science Publishers, Inc.
سال نشر: 2011
تعداد صفحات: 208
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 3 مگابایت
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب The science of cybersecurity and a roadmap to research به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب علم امنیت سایبری و نقشه راهی برای تحقیق نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
فناوری اطلاعات از هر نظر فراگیر شده است، از تلفنها و سایر دستگاههای کوچک گرفته تا شبکههای سازمانی و زیرساختهایی که اقتصاد ما را اداره میکند. از آنجایی که زیرساخت های حیاتی ایالات متحده بیش از پیش به شبکه های عمومی و خصوصی وابسته شده اند، پتانسیل تأثیرات گسترده ملی ناشی از اختلال یا شکست این شبکه ها نیز افزایش یافته است. ایمن سازی زیرساخت های حیاتی کشور مستلزم محافظت نه تنها از سیستم های فیزیکی آنها، بلکه به همان اندازه مهم، از بخش های سایبری سیستم هایی است که آنها به آنها متکی هستند. این کتاب به بررسی نقشه راه تحقیقات امنیت سایبری می پردازد تا یک دستور کار تحقیق و توسعه ملی را تعریف کند که ما را قادر می سازد تا از دشمنان خود پیشی بگیریم و فناوری هایی را تولید کنیم که از سیستم ها و شبکه های اطلاعاتی ما در آینده محافظت می کنند.
Information technology has become pervasive in every way, from our phones and other small devices to our enterprise networks to the infrastructure that runs our economy. As the critical infrastructures of the United States have become more and more dependent on public and private networks, the potential for widespread national impact resulting from disruption or failure of these networks has also increased. Securing the nation's critical infrastructures requires protecting not only their physical systems but, just as important, the cyber portions of the systems on which they rely. This book examines the cybersecurity research roadmap in order to define a national R&D agenda that is required to enable us to get ahead of our adversaries and produce the technologies that will protect our information systems and networks into the future.
Library of Congress Cataloging-in-Publication Data Contents Preface Science of Cybersecurity Abstract 1. executive Summary 2. Problem Statement and Introduction 3. Cyber-Security as Science - An Overview 3.1. Attributes for Cyber-Security 3.2. Guidance from other Sciences 3.2.1. Economics 3.2.2. Meteorology 3.2.3. Medicine 3.2.4. Astronomy 3.2.5. Agriculture 3.3. Security Degrades Over Time 3.3.1. Unix passwords 3.3.2. Lock bumping 3.4. The Role of Secrecy 3.5. Aspects of the Science of Cyber-Security 3.6. Some Science 3.6.1. Trust 3.6.2. Cryptography 3.6.3. Game theory 3.6.4. Model checking 3.6.5. Obfuscation 3.6.6. Machine learning 3.6.7. Composition of components 3.7. Applying the Fruits of Science 3.8. Metrics 3.9. The Opportunities of New Technologies 3.10. Experiments and Data 4. Model Checking 4.1. Brief Introduction to Spin and Promela 4.2. Application to Security 4.2.1. The Needham-Schroeder Protocol 4.2.2. Promela model of the protocol 4.3. Scaling Issues 4.4. Extracting Models from Code 4.5. Relationship to Hyper-Properties 5. The Immune System Analogy 5.1. Basic Biology 5.2. Learning from the Analogy 5.2.1. The need for adaptive response 5.2.2. A mix of sensing modalities 5.2.3. The need for controlled experiments 5.2.4. Time scale differences 5.2.5. Responses to detection 5.2.6. Final points 6. Conclusions and Recommendations A. Appendix: Briefers References A Roadmap for Cybersecurity Research Executive Summary Introduction Historical Background Current Context Document Format Background Future Directions Acknowledgments Current Hard Problems in INFOSEC Research 1. Scalable Trustworthy Systems Background What is the problem being addressed? What are the potential threats? Who are the potential beneficiaries? What are their respective needs? What is the current state of the practice? What is the status of current research? Future Directions On what categories can we subdivide this topic? What are the major research gaps? Near term Medium term Long term What are the challenges that must be addressed? What approaches might be desirable? What R&D is evolutionary and what is more basic, higher risk, game changing? Resources Measures of success What needs to be in place for test and evaluation? To what extent can we test real systems? 2. Enterprise-Level Metrics (ELMs) Background What is the problem being addressed? What are the potential threats? Who are the potential beneficiaries? What are their respective needs? What is the current state of the practice? What is the status of current research? Future Directions On what categories can we subdivide this topic? Definition Collection Analysis Composition Adoption What are the major research gaps? What are some exemplary problems for R&D on this topic? What R&D is evolutionary, and what is more basic, higher risk, game changing? Resources Measures of success What needs to be in place for test and evaluation? To what extent can we test real systems? 3. System Evaluation Life Cycle Background What is the problem being addressed? What are the potential threats? Who are the potential beneficiaries? What are their respective needs? What is the current state of the practice? What is the status of current research? Future Directions On what categories can we subdivide this topic? Requirements Design Development and Implementation Testing Deployment and Operations Decommissioning What are the major research gaps? What are some exemplary problems for R&D on this topic? What R&D is evolutionary, and what is more basic, higher risk, game changing? Resources Measures of success What needs to be in place for test and evaluation? To what extent can we test real systems? 4. Combatting Insider Threats Background What is the problem being addressed? What are the potential threats? Who are the potential beneficiaries? What are their respective needs? What is the current state of the practice? What is the status of current research? Future Directions On what categories can we subdivide this topic? What are the major research gaps? What are some exemplary problems for R&D on this topic? Collect and Analyze Detect Deter Protect Predict React What are the near-term, midterm, long-term capabilities that need to be developed? Near Term Medium Term Long Term What R&D is evolutionary and what is more basic, higher risk, game changing? Resources Measures of success To what extent can we test real systems? 5. Combatting Malware and Botnets Background What is the problem being addressed? What are the potential threats? Who are the potential beneficiaries? What are their respective needs? What is the current state of the practice? What is the status of current research? Future Directions On what categories can we subdivide this topic? What are the major research gaps? What are some exemplary problems for R&D on this topic? What R&D is evolutionary, and what is more basic, higher risk, game changing? Measures of success What needs to be in place for test and evaluation? To what extent can we test real systems? 6. Global-Scale Identity Management Background What is the problem being addressed? What are the potential threats? Who are the potential beneficiaries? What are their respective needs? What is the current state of the practice? What is the status of current research? Future Directions On what categories can we subdivide the topic? What are the major research gaps? Resources Measures of success What needs to be in place for test and evaluation? To what extent can we test real systems? 7. Survivability of Time-Critical Systems Background What is the problem being addressed? What are the potential threats? Who are the potential beneficiaries? What are their respective needs? What is the current state of practice? What is the status of current research? Future Directions On what categories can we subdivide the topics? What are the major research gaps? Detect React What are the challenges that must be addressed? What R&D is evolutionary and what is more basic, higher risk, game changing? Near term Medium term Long term Resources Measures of success What needs to be in place for test and evaluation? To what extent can we test real systems? 8. Situational Understanding and Attack Attribution Background What is the problem being addressed? What are the potential threats? Who are the potential beneficiaries? What are their respective needs? What is the current state of the practice? What is the status of current research? Future Directions On what categories can we subdivide this topic? What are the major gaps? What are some exemplary problems for R&D on this topic? What R&D is evolutionary and what is more basic, higher risk, game changing? Resources Measures of success What needs to be in place for test and evaluation? To what extent can we test real systems? 9. Provenance Background What is the problem being addressed? What are the potential threats? Who are the potential beneficiaries? What are their respective needs? What is the current state of practice? What is the status of current research? Future Directions On what categories can we subdivide the topic? What are the major research gaps? What are some exemplary problem domains for R&D in this area? What R&D is evolutionary, and what is more basic, higher risk, game changing? Resources Measures of success What needs to be in place for test and evaluation? 10. Privacy-Aware Security Background What is the problem being addressed? What are the potential threats? Who are the potential beneficiaries? What are their respective needs? What is the current state of practice? What is the status of current research? Future Directions On what categories can we subdivide the topic? What are the major research gaps? Selective disclosure and privacy-aware access Specification frameworks Policy issues What are some exemplary problems for R&D on this topic? What R&D is evolutionary and what is more basic, higher risk, game changing? Near term Medium term Long term Game changing Resources Measures of success What needs to be in place for test and evaluation? 11. Usable Security Background What is the problem being addressed? What are the potential threats? Who are the potential beneficiaries? What are their respective needs? What is the current state of practice? What is the status of current research? Future Directions On what categories can we subdivide the topic? What are the major research gaps? Hard problems Other areas we might draw on What are some exemplary problems for R&D on this topic? What R&D is evolutionary and what is more basic, higher risk, game changing? Near term Medium term Resources Measures of success What needs to be in place for test and evaluation? To what extent can we test real systems? Appendix A. Interdependencies among Topics Topic 1. Scalable Trustworthy Systems Topic 2. Enterprise-Level Metrics (ELMs) Topic 3. System Evaluation Life Cycle Topic 4. Combatting Insider Threats Topic 5. Combatting Malware and Botnets Topic 6. Global-Scale Identity Management Topic 7. Survivability of Time Critical Systems Topic 8. Situational Understanding and Attack Attribution Topic 9. Provenance Topic 10. Privacy-Aware Security Topic 11. Usable Security Appendix B. Technology Transfer B.1. Introduction B.2. Fundamental Issues for Technology Transition What are likely effective ways to transfer the technology? B.3. Topic-Specific Considerations Topic 1: Scalable Trustworthy Systems Topic 2: Enterprise-Level Metrics (ELMs) B.4 Forcing Functions (Some Illustrative Examples) Government Academia Industry Appendix C. List of Participants in the Roadmap Development Appendix D. Acronyms References Chapter Sources Index