Muutke küpsiste eelistusi

Situational Awareness in Computer Network Defense: Principles, Methods and Applications [Kõva köide]

Edited by , Edited by
  • Formaat: Hardback, 444 pages, kaal: 1269 g
  • Ilmumisaeg: 31-Jan-2012
  • Kirjastus: Idea Group,U.S.
  • ISBN-10: 1466601043
  • ISBN-13: 9781466601048
Teised raamatud teemal:
  • Formaat: Hardback, 444 pages, kaal: 1269 g
  • Ilmumisaeg: 31-Jan-2012
  • Kirjastus: Idea Group,U.S.
  • ISBN-10: 1466601043
  • ISBN-13: 9781466601048
Teised raamatud teemal:
"This book provides academia and organizations insights into practical and applied solutions, frameworks, technologies, and implementations for situational awareness in computer networks"--Provided by publisher.

This collection of nineteen articles on information security showcases current scholarship in computer and network security with a focus on the development of situationally aware systems and practices. The volume is divided into sections covering principles of situational awareness and network defense, security methods, and situationally aware applications, and individual essays address topics such as designing information systems for situational awareness, sensor fusion for security incident analysis, en-route filtering against false data injection attacks in wireless networks, and tools and metrics for the optimization of enterprise network defense systems. Chapters include abstracts, illustrations, notes, and references and a volume-wide compilation of reading resources is provided. Contributors are academics in computer science from US, European, and Indian institutions. Annotation ©2012 Book News, Inc., Portland, OR (booknews.com)
Preface xvi
Section 1 Principles of SA CND
Chapter 1 Review of Situational Awareness for Computer Network Defense
1(9)
Cyril Onwubiko
Thomas John Owens
Chapter 2 The Contributions of Information Security Culture and Human Relations to the Improvement of Situational Awareness
10(19)
Janne Merete Hagen
Chapter 3 Cyber Command and Control: A Military Doctrinal Prospective on Collaborative Situation Awareness for Decision Making
29(19)
Michael E. Ruiz
Richard Redmond
Chapter 4 A Proactive Defense Strategy to Enhance Situational Awareness in Computer Network Security
48(23)
Yi Luo
Ferenc Szidarovszky
Chapter 5 An Alternative Framework for Research on Situational Awareness in Computer Network Defense
71(15)
Eric McMillan
Michael Tyworth
Chapter 6 Information Security for Situational Awareness in Computer Network Defense
86(18)
Uri Blumenthal
Joshua Haines
William Streilein
Gerald O'Leary
Chapter 7 Designing Information Systems and Network Components for Situational Awareness
104(21)
Cyril Onwubiko
Section 2 Methods in SA CND
Chapter 8 Cyber Situation Awareness through Instance-Based Learning: Modeling the Security Analyst in a Cyber-Attack Scenario
125(16)
Varun Dutt
Cleotilde Gonzalez
Chapter 9 Information Data Fusion and Computer Network Defense
141(24)
Mark Ballora
Nicklaus A. Giacobe
Michael McNeese
David L. Hall
Chapter 10 Usefulness of Sensor Fusion for Security Incident Analysis
165(16)
Ciza Thomas
N. Balakrishnan
Chapter 11 GCD: A Global Collaborative Defense Approach to Thwart Internet Attacks
181(20)
Subrata Acharya
Chapter 12 DNSSEC vs. DNSCurve: A Side-by-Side Comparison
201(20)
Marios Anagnostopoulos
Georgios Kambourakis
Elisavet Konstantinou
Stefanos Gritzalis
Chapter 13 IEEE802.21 Assisted Fast Re-Authentication Scheme over GSABA
221(24)
Qazi Bouland Mussabbir
Thomas John Owens
Section 3 SA CND Applications
Chapter 14 Modelling Situation Awareness Information and System Requirements for the Mission using Goal-Oriented Task Analysis Approach
245(18)
Cyril Onwubiko
Chapter 15 On Situational Aware En-Route Filtering against Injected False Data in Wireless Sensor Networks
263(21)
Xinyu Yang
Jie Lin
Wei Yu
Xinwen Fu
Genshe Chen
Erik P. Blasch
Chapter 16 Attack Graphs and Scenario Driven Wireless Computer Network Defense
284(18)
Peter J. Hawrylak
George Louthan IV
Jeremy Daily
John Hale
Mauricio Papa
Chapter 17 Advanced Security Incident Analysis with Sensor Correlation
302(18)
Ciza Thomas
N. Balakrishnan
Chapter 18 PITWALL: Tools, Techniques and Metrics for the Optimization of Enterprise Network Defense Systems
320(24)
Subrata Acharya
Chapter 19 Forensic Investigative Process for Situational Awareness in Information Security
344(13)
Khidir Mohamed Ali
Thomas John Owens
Compilation of References 357(24)
About the Contributors 381(9)
Index 390