000 03310nam a22005655i 4500
001 978-3-031-06994-9
003 DE-He213
005 20240423125439.0
007 cr nn 008mamaa
008 220720s2022 sz | s |||| 0|eng d
020 _a9783031069949
_9978-3-031-06994-9
024 7 _a10.1007/978-3-031-06994-9
_2doi
050 4 _aQA75.5-76.95
072 7 _aUY
_2bicssc
072 7 _aCOM000000
_2bisacsh
072 7 _aUY
_2thema
082 0 4 _a004
_223
100 1 _aYoung, Carl S.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aCybercomplexity
_h[electronic resource] :
_bA Macroscopic View of Cybersecurity Risk /
_cby Carl S. Young.
250 _a1st ed. 2022.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2022.
300 _aXXIX, 167 p. 69 illus., 18 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvanced Sciences and Technologies for Security Applications,
_x2363-9466
505 0 _a1. Risk Fundamentals -- 2. Cyber Security Fundamentals -- 3. Cyber security criteria -- 4. Root Causes of Cyber Security Risk -- 5. IT Environment Risk Factors -- 6. Identity Uncertainty -- 7. Communicator Integrity -- 8. Exploitation of Uncertainty in Identity -- 9. Root Cause Effects and the Exploitation of IT Risk Factors; Compromises of IT Integrity -- 10. Integrity Flaws and Exploitation of Human Vulnerabilities.
520 _aThis book tackles the problem of complexity within IT environments, i.e., "Cybercomplexity," which is generally recognized as a principal source of cybersecurity risk. The book first defines complexity and simplifies its analysis by assuming a probabilistic approach to security risk management. It then proposes a simple model of cybercomplexity that is based on Shannon entropy, a basic concept in information theory. The key drivers of cybercomplexity emerge from this model, where these drivers reveal the scale-dependence of cybersecurity risk and explain why macroscopic security controls are required to address cybersecurity risk on an enterprise scale. The significant operational implications of cybercomplexity are also discussed, thereby providing both a theoretical framework and a practical guide to addressing this longstanding problem in cybersecurity risk management. .
650 0 _aComputer science.
650 0 _aRisk management.
650 0 _aSecurity systems.
650 0 _aCriminology.
650 1 4 _aComputer Science.
650 2 4 _aIT Risk Management.
650 2 4 _aSecurity Science and Technology.
650 2 4 _aCrime Control and Security.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031069932
776 0 8 _iPrinted edition:
_z9783031069956
776 0 8 _iPrinted edition:
_z9783031069963
830 0 _aAdvanced Sciences and Technologies for Security Applications,
_x2363-9466
856 4 0 _uhttps://doi.org/10.1007/978-3-031-06994-9
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c178027
_d178027