Collaborative Cyber Threat Intelligence
Detecting and Responding to Advanced Cyber Attacks at the National Level
Herausgeber: Skopik, Florian
Collaborative Cyber Threat Intelligence
Detecting and Responding to Advanced Cyber Attacks at the National Level
Herausgeber: Skopik, Florian
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book discusses national cyber threat intelligence and security information sharing. It details ongoing work in research laboratories world-wide to address current national security concerns. It allows practitioners to learn about upcoming trends, researchers to share current results, and decision makers to prepare for future developments.
Andere Kunden interessierten sich auch für
Humans and Generative AI Tools for Collaborative Intelligence193,99 €
Raymond Newkirk Psy. D.Insider Threat Prevention32,99 €
J. F. HillarySuperintelligence or Super Threat28,99 €
Collaborative Research in the Digital Humanities74,99 €
Raymond Leslie NewkirkPsychology of Insider Threat Prevention Part 430,99 €
Rajasekar L.Advanced Insider Threat Detection34,99 €
Raymond Leslie NewkirkThe Psychology of Insider Threat Prevention Part 232,99 €-
-
-
This book discusses national cyber threat intelligence and security information sharing. It details ongoing work in research laboratories world-wide to address current national security concerns. It allows practitioners to learn about upcoming trends, researchers to share current results, and decision makers to prepare for future developments.<
Produktdetails
- Produktdetails
- Verlag: Auerbach Publications
- Seitenzahl: 448
- Erscheinungstermin: 30. September 2020
- Englisch
- Abmessung: 234mm x 156mm x 24mm
- Gewicht: 676g
- ISBN-13: 9780367657628
- ISBN-10: 0367657627
- Artikelnr.: 59995268
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Auerbach Publications
- Seitenzahl: 448
- Erscheinungstermin: 30. September 2020
- Englisch
- Abmessung: 234mm x 156mm x 24mm
- Gewicht: 676g
- ISBN-13: 9780367657628
- ISBN-10: 0367657627
- Artikelnr.: 59995268
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Florian Skopik currently works in the ICT Security Research Team at the Austrian Institute of Technology (AIT) as Senior Scientist, where he is responsible for national and international research projects (in course of the EU FP7). The main topics of these projects are centered around smart grid security, security of critical infrastructures, and national cyber security and defense. Due to this research focus, the ICT Security Research Team works in close collaboration with national authorities, such as the Minstry of the Interior and the Ministry of Defense. Before joining AIT, Florian was with the Distributed Systems Group at the Vienna University of Technology as a research assistant and post-doctoral research scientist from 2007 to 2011, where he was involved in a number of international research projects dealing with cross-organizational collaboration over the Web. In context of these projects, he also finished his PhD studies. Florian further spent a sabbatical at IBM Research India in Bangalore for several months. He published around 75 scientific conference papers and journal articles, and is member of various conference program committees and editorial boards. In parallel to his studies, he was working in the industry as firmware developer for microcontroller systems for more than 10 years. Florian is IEEE Senior Member and Member of the Association for Computing Machinery (ACM).
1. Introduction. 2. A Systematic Study and Comparison of Attack Scenarios
and Involved Threat Actors. 3. From Monitoring, Logging, and Network
Analysis to Threat Intelligence Extraction. 4. The Importance of
Information Sharing and Its Numerous Dimensions to Circumvent Incidents and
Mitigate Cyber Threats. 5. Cyber Threat Intelligence Sharing through
National and Sector-Oriented Communities. 6. Situational Awareness for
Strategic Decision Making on a National Level. 7. Legal Implications of
Information Sharing. 8. Implementation Issues and Obstacles from a Legal
Perspective. 9. Real-World Implementation of an Information Sharing
Network: Lessons Learned from the Large-Scale European Research Project
ECOSSIAN.
and Involved Threat Actors. 3. From Monitoring, Logging, and Network
Analysis to Threat Intelligence Extraction. 4. The Importance of
Information Sharing and Its Numerous Dimensions to Circumvent Incidents and
Mitigate Cyber Threats. 5. Cyber Threat Intelligence Sharing through
National and Sector-Oriented Communities. 6. Situational Awareness for
Strategic Decision Making on a National Level. 7. Legal Implications of
Information Sharing. 8. Implementation Issues and Obstacles from a Legal
Perspective. 9. Real-World Implementation of an Information Sharing
Network: Lessons Learned from the Large-Scale European Research Project
ECOSSIAN.
1. Introduction. 2. A Systematic Study and Comparison of Attack Scenarios
and Involved Threat Actors. 3. From Monitoring, Logging, and Network
Analysis to Threat Intelligence Extraction. 4. The Importance of
Information Sharing and Its Numerous Dimensions to Circumvent Incidents and
Mitigate Cyber Threats. 5. Cyber Threat Intelligence Sharing through
National and Sector-Oriented Communities. 6. Situational Awareness for
Strategic Decision Making on a National Level. 7. Legal Implications of
Information Sharing. 8. Implementation Issues and Obstacles from a Legal
Perspective. 9. Real-World Implementation of an Information Sharing
Network: Lessons Learned from the Large-Scale European Research Project
ECOSSIAN.
and Involved Threat Actors. 3. From Monitoring, Logging, and Network
Analysis to Threat Intelligence Extraction. 4. The Importance of
Information Sharing and Its Numerous Dimensions to Circumvent Incidents and
Mitigate Cyber Threats. 5. Cyber Threat Intelligence Sharing through
National and Sector-Oriented Communities. 6. Situational Awareness for
Strategic Decision Making on a National Level. 7. Legal Implications of
Information Sharing. 8. Implementation Issues and Obstacles from a Legal
Perspective. 9. Real-World Implementation of an Information Sharing
Network: Lessons Learned from the Large-Scale European Research Project
ECOSSIAN.







