Author: |
Junaid Ahmed Zubairi & Athar Mahboob
|
Release at: | 2012 |
Pages: | 337 |
Edition: |
First Edition (Systems and Methodologies)
|
File Size: | 16 MB |
File Type: | |
Language: | English |
Description of Cyber Security Standards, Practices and Industrial Applications (PDF)
Cyber Security Standards, Practices and Industrial Applications by Junaid Ahmed Zubairi & Athar Mahboob is a great book available in PDF download. The field of cyber security has assumed utmost importance in today’s information age. Cyber security encompasses both information and network security. Information security covers the understanding of security requirements, classification of threats, attacks, and information protection systems and methodologies. Encryption is a key enabling technology for data and information security. Network security, on the other hand, includes both security protocols as well as systems, which create a security perimeter around networks for intrusion detection and avoidance. Network security protocols combine encryption and several related mechanisms, like hashing and digital signatures, along with procedures for key and session management, which allow for parties to establish secure communication links over otherwise insecure communication networks and exchange private information such as personal and financial data.
As part of proactive information security, Security Information Management (SIM) systems are set up by those tasked with managing information security in their respective organizations. These systems consolidate and analyze the information system usage logs in near real-time for alerting and in off-line mode for demonstrating system security and compliance to standards and regulations. At this time realtime audio, video, and instant messaging systems are used ubiquitously over integrated and converged public communication networks. Their security requirements include protection against eavesdropping and end to end authentication. To this end security protocols such as Secure Real Time Protocol (SRTP) for streaming media security have been developed by the Internet Engineering Task Force (IETF).
Cyber security of industrial manufacturing and utility industries, such as power, water, and gas, has assumed national defense status. Most industries, including power generation and manufacturing, use PLC’s (programmable logic controllers) that are connected to computers for remote control. SCADA and industrial systems security includes protection of SCADA control units or industrial equipment in production, power generation & distribution, fabrication, refining, public and private infrastructure institutions, and large communication systems. The area of industrial and infrastructure security is very important and various governments have mandated the compliance by all institutions and services to many security regulations.
Content of Cyber Security Standards, Practices and Industrial Applications (PDF)
Section 1: Mobile and Wireless Security
Chapter 1: Securing Wireless Ad Hoc Networks: State of the Art and Challenges
Chapter 2: Smartphone Data Protection Using Mobile Usage Pattern Matching
Chapter 3: Conservation of Mobile Data and Usability Constraints
Section 2: Social Media, Botnets and Intrusion Detection
Chapter 4: Cyber Security and Privacy in the Age of Social Networks
Chapter 5: Botnets and Cyber Security: Battling Online Threats
Chapter 6: Evaluation of Contemporary Anomaly Detection Systems (ADSs)
Section 3: Formal Methods and Quantum Computing
Chapter 7: Practical Quantum Key Distribution
Chapter 8: Automated Formal Methods for Security Protocol Engineering
Section 4: Embedded Systems and SCADA Security
Chapter 9: Fault Tolerant Remote Terminal Units (RTUs) in SCADA Systems
Chapter 10: Embedded Systems Security
Section 5: Industrial and Applications Security
Chapter 11: Cyber Security in Liquid Petroleum Pipelines
Chapter 12: Application of Cyber Security in Emerging C4ISR Systems and Related Technologies
Chapter 13: Practical Web Application Security Audit Following Industry Standards and Compliance
Compilation of References
About the Contributors
Index
GET THIS BOOK |
Also Available | |
---|---|
Fenner’s Veterinary Virology 5th edition |
GET THIS BOOK |
Plant Anatomy An Applied Approach by David F Cutler, Ted Botha & D.W. Stevenson |
GET THIS BOOK |
Plant Pathology by R S Mehrotra and Ashok Aggarwal 3rd Edition |
GET THIS BOOK |
Plant Pathology The Diseased Plant by James G. Horsfall |
GET THIS BOOK |
Plant Pathology by George N Agrios 5th Edition |
GET THIS BOOK |
0 comments: