000 | 03310nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-3-031-06994-9 | ||
003 | DE-He213 | ||
005 | 20240423125439.0 | ||
007 | cr nn 008mamaa | ||
008 | 220720s2022 sz | s |||| 0|eng d | ||
020 |
_a9783031069949 _9978-3-031-06994-9 |
||
024 | 7 |
_a10.1007/978-3-031-06994-9 _2doi |
|
050 | 4 | _aQA75.5-76.95 | |
072 | 7 |
_aUY _2bicssc |
|
072 | 7 |
_aCOM000000 _2bisacsh |
|
072 | 7 |
_aUY _2thema |
|
082 | 0 | 4 |
_a004 _223 |
100 | 1 |
_aYoung, Carl S. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aCybercomplexity _h[electronic resource] : _bA Macroscopic View of Cybersecurity Risk / _cby Carl S. Young. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2022. |
|
300 |
_aXXIX, 167 p. 69 illus., 18 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aAdvanced Sciences and Technologies for Security Applications, _x2363-9466 |
|
505 | 0 | _a1. Risk Fundamentals -- 2. Cyber Security Fundamentals -- 3. Cyber security criteria -- 4. Root Causes of Cyber Security Risk -- 5. IT Environment Risk Factors -- 6. Identity Uncertainty -- 7. Communicator Integrity -- 8. Exploitation of Uncertainty in Identity -- 9. Root Cause Effects and the Exploitation of IT Risk Factors; Compromises of IT Integrity -- 10. Integrity Flaws and Exploitation of Human Vulnerabilities. | |
520 | _aThis book tackles the problem of complexity within IT environments, i.e., "Cybercomplexity," which is generally recognized as a principal source of cybersecurity risk. The book first defines complexity and simplifies its analysis by assuming a probabilistic approach to security risk management. It then proposes a simple model of cybercomplexity that is based on Shannon entropy, a basic concept in information theory. The key drivers of cybercomplexity emerge from this model, where these drivers reveal the scale-dependence of cybersecurity risk and explain why macroscopic security controls are required to address cybersecurity risk on an enterprise scale. The significant operational implications of cybercomplexity are also discussed, thereby providing both a theoretical framework and a practical guide to addressing this longstanding problem in cybersecurity risk management. . | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aRisk management. | |
650 | 0 | _aSecurity systems. | |
650 | 0 | _aCriminology. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aIT Risk Management. |
650 | 2 | 4 | _aSecurity Science and Technology. |
650 | 2 | 4 | _aCrime Control and Security. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031069932 |
776 | 0 | 8 |
_iPrinted edition: _z9783031069956 |
776 | 0 | 8 |
_iPrinted edition: _z9783031069963 |
830 | 0 |
_aAdvanced Sciences and Technologies for Security Applications, _x2363-9466 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-06994-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c178027 _d178027 |