Big Data Technologies for Monitoring of Computer Security A Case Study of the Russian Federation

Big Data Technologies for Monitoring of Computer Security  A Case Study of the Russian Federation
Author: Sergei Petrenko
Publsiher: Springer
Total Pages: 249
Release: 2018-05-17
Genre: Computers
ISBN: 9783319790367

Download Big Data Technologies for Monitoring of Computer Security A Case Study of the Russian Federation Book in PDF, Epub and Kindle

This timely book offers rare insight into the field of cybersecurity in Russia -- a significant player with regard to cyber-attacks and cyber war. Big Data Technologies for Monitoring of Computer Security presents possible solutions to the relatively new scientific/technical problem of developing an early-warning cybersecurity system for critically important governmental information assets. Using the work being done in Russia on new information security systems as a case study, the book shares valuable insights gained during the process of designing and constructing open segment prototypes of this system. Most books on cybersecurity focus solely on the technical aspects. But Big Data Technologies for Monitoring of Computer Security demonstrates that military and political considerations should be included as well. With a broad market including architects and research engineers in the field of information security, as well as managers of corporate and state structures, including Chief Information Officers of domestic automation services (CIO) and chief information security officers (CISO), this book can also be used as a case study in university courses.

Cyber Security Innovation for the Digital Economy

Cyber Security Innovation for the Digital Economy
Author: Sergei Petrenko
Publsiher: CRC Press
Total Pages: 491
Release: 2022-09-01
Genre: Science
ISBN: 9781000793505

Download Cyber Security Innovation for the Digital Economy Book in PDF, Epub and Kindle

Cyber Security Innovation for the Digital Economy considers possible solutions to the relatively new scientific-technical problem of developing innovative solutions in the field of cyber security for the Digital Economy. The solutions proposed are based on the results of exploratory studies conducted by the author in the areas of Big Data acquisition, cognitive information technologies (cogno-technologies), new methods of analytical verification of digital ecosystems on the basis of similarity invariants and dimensions, and “computational cognitivism,” involving a number of existing models and methods.In practice, this successfully allowed the creation of new entities - the required safe and trusted digital ecosystems - on the basis of the development of digital and cyber security technologies, and the resulting changes in their behavioral preferences. Here, the ecosystem is understood as a certain system of organizations, created around a certain Technological Platform that use its services to make the best offers to customers and access to them to meet the ultimate needs of clients - legal entities and individuals. The basis of such ecosystems is a certain technological platform, created on advanced innovative developments, including the open interfaces and code, machine learning, cloud technologies, Big Data collection and processing, artificial intelligence technologies, etc. The mentioned Technological Platform allows creating the best offer for the client both from own goods and services and from the offers of external service providers in real time.This book contains four chapters devoted to the following subjects:- Relevance of the given scientific-technical problems in the cybersecurity of Digital Economy- Determination of the limiting capabilities- Possible scientific and technical solutions- Organization of perspective research studies in the area of Digital Economy cyber security in Russia.

Developing an Enterprise Continuity Program

Developing an Enterprise Continuity Program
Author: Sergei Petrenko
Publsiher: CRC Press
Total Pages: 585
Release: 2022-09-01
Genre: Computers
ISBN: 9781000795905

Download Developing an Enterprise Continuity Program Book in PDF, Epub and Kindle

The book discusses the activities involved in developing an Enterprise Continuity Program (ECP) that will cover both Business Continuity Management (BCM) as well as Disaster Recovery Management (DRM). The creation of quantitative metrics for BCM are discussed as well as several models and methods that correspond to the goals and objectives of the International Standards Organisation (ISO) Technical Committee ISO/TC 292 "Security and resilience”. Significantly, the book contains the results of not only qualitative, but also quantitative, measures of Cyber Resilience which for the first time regulates organizations’ activities on protecting their critical information infrastructure. The book discusses the recommendations of the ISO 22301: 2019 standard “Security and resilience — Business continuity management systems — Requirements” for improving the BCM of organizations based on the well-known “Plan-Do-Check-Act” (PDCA) model. It also discusses the recommendations of the following ISO management systems standards that are widely used to support BCM. The ISO 9001 standard "Quality Management Systems"; ISO 14001 "Environmental Management Systems"; ISO 31000 "Risk Management", ISO/IEC 20000-1 "Information Technology - Service Management", ISO/IEC 27001 "Information Management security systems”, ISO 28000 “Specification for security management systems for the supply chain”, ASIS ORM.1-2017, NIST SP800-34, NFPA 1600: 2019, COBIT 2019, RESILIA, ITIL V4 and MOF 4.0, etc. The book expands on the best practices of the British Business Continuity Institute’s Good Practice Guidelines (2018 Edition), along with guidance from the Disaster Recovery Institute’s Professional Practices for Business Continuity Management (2017 Edition). Possible methods of conducting ECP projects in the field of BCM are considered in detail. Based on the practical experience of the author there are examples of Risk Assessment (RA) and Business Impact Analysis (BIA), examples of Business Continuity Plans (BCP) & Disaster Recovery Plans (DRP) and relevant BCP & DRP testing plans. This book will be useful to Chief Information Security Officers, internal and external Certified Information Systems Auditors, senior managers within companies who are responsible for ensuring business continuity and cyber stability, as well as teachers and students of MBA’s, CIO and CSO programs.

Cyber Resilience

Cyber Resilience
Author: Sergei Petrenko
Publsiher: CRC Press
Total Pages: 370
Release: 2022-09-01
Genre: Computers
ISBN: 9781000792539

Download Cyber Resilience Book in PDF, Epub and Kindle

Modern cyber systems acquire more emergent system properties, as far as their complexity increases: cyber resilience, controllability, self-organization, proactive cyber security and adaptability. Each of the listed properties is the subject of the cybernetics research and each subsequent feature makes sense only if there is a previous one.Cyber resilience is the most important feature of any cyber system, especially during the transition to the sixth technological stage and related Industry 4.0 technologies: Artificial Intelligence (AI), Cloud and foggy computing, 5G +, IoT/IIoT, Big Data and ETL, Q-computing, Blockchain, VR/AR, etc. We should even consider the cyber resilience as a primary one, because the mentioned systems cannot exist without it. Indeed, without the sustainable formation made of the interconnected components of the critical information infrastructure, it does not make sense to discuss the existence of 4.0 Industry cyber-systems. In case when the cyber security of these systems is mainly focused on the assessment of the incidents' probability and prevention of possible security threats, the cyber resilience is mainly aimed at preserving the targeted behavior and cyber systems' performance under the conditions of known (about 45 %) as well as unknown (the remaining 55 %) cyber attacks.This monograph shows that modern Industry 4.0. Cyber systems do not have the required cyber resilience for targeted performance under heterogeneous mass intruder cyber-attacks. The main reasons include a high cyber system structural and functional complexity, a potential danger of existing vulnerabilities and “sleep” hardware and software tabs, as well as an inadequate efficiency of modern models, methods, and tools to ensure cyber security, reliability, response and recovery.

Software Technology Methods and Tools

Software Technology  Methods and Tools
Author: Manuel Mazzara,Jean-Michel Bruel,Bertrand Meyer,Alexander Petrenko
Publsiher: Springer Nature
Total Pages: 429
Release: 2019-10-08
Genre: Computers
ISBN: 9783030298524

Download Software Technology Methods and Tools Book in PDF, Epub and Kindle

​This book constitutes the refereed proceedings of the 51st International Conference on Software Technology: Methods and Tools, TOOLS 2019, held in Innopolis, Russia, in October 2019.The 19 revised full papers and 13 short papers presented in this book were carefully reviewed and selected from 62 submissions. The papers discuss all aspects of software engineering and programming languages; machine learning; internet of things; security computer architectures and robotics; and projects.

Developing a Cybersecurity Immune System for Industry 4 0

Developing a Cybersecurity Immune System for Industry 4 0
Author: Sergei Petrenko
Publsiher: CRC Press
Total Pages: 457
Release: 2022-09-01
Genre: Science
ISBN: 9781000794052

Download Developing a Cybersecurity Immune System for Industry 4 0 Book in PDF, Epub and Kindle

Cyber immune systems try to mimic the adaptive immune system of humans and animals because of its capability to detect and fend off new, unseen pathogens. Today's current cyber security systems provide an effective defense mechanism against known cyber-attacks but are not so good when it comes to defending against unknown attacks. This book describes the possible development and organization of self-healing computing based on cyber immunity techniques and aimed at working in the new realm of Industry 4.0. Industry 4.0 is the trend towards automation and data exchange in manufacturing technologies and processes which include cyber-physical systems (CPS), the internet of things (IoT), industrial internet of things (IIOT), cloud computing, cognitive computing and artificial intelligence. The book describes the author’s research and development of cyber-immunity systems that will prevent the destruction of critical information infrastructure by future unknown cyber-attacks and thus avoid the significant or catastrophic consequences of such attacks. The book is designed for undergraduate and post-graduate students, for engineers in related fields as well as managers of corporate and state structures, chief information officers (CIO), chief information security officers (CISO), architects, and research engineers in the field of cybersecurity. This book contains four chapters1. Cyber Immunity Concept of the Industry 4.0; 2. Mathematical Framework for Immune Protection of Industry 4.0; 3. Trends and prospects of the development of Immune Protection of Industry 4.0; 4. From detecting cyber-attacks to self-healing Industry 4.0;

Applied Quantum Cryptanalysis

Applied Quantum Cryptanalysis
Author: Alexei Petrenko
Publsiher: CRC Press
Total Pages: 223
Release: 2023-04-13
Genre: Computers
ISBN: 9781000879469

Download Applied Quantum Cryptanalysis Book in PDF, Epub and Kindle

Today we witness an explosive growth in attention to Q-computing. Q-computing technologies, along with artificial intelligence (AI) and machine learning (ML) technologies, cloud and foggy computing, as well as technologies for collecting and streaming processing of Big Data and ETL, are constantly leading the lists of ""end-to-end"" information technologies for the digital economy of technologically developed countries of the world. One of the main reasons for this is the potential ability of quantum computers to solve some computational problems more efficiently than any of the most modern classical computers of the von Neumann architecture (supercomputers). The most expressive and interesting, from an applied point of view, examples of such problems are integer factorization, effectively performed by Shor's quantum algorithm, as well as record search in an unordered database, effectively solved by Grover's algorithm. This monograph contains the best practice for solving problems of quantum cryptanalysis to improve cyber security and resilience of the digital economy. The book discusses well-known and author's software implementations of promising quantum Shor algorithms, Grover, Simon et al. Shor's algorithm provides exponential acceleration of solving factorization problems, discrete logarithm problems (DLPs) and elliptic curve discrete logarithm problems (ECDLPs). The mentioned tasks are widely used in TLS, SSH or IPsec cryptographic applications of Internet/Intranet and IIoT/IoT networks, communication protocols based on Diffie–Hellman key agreements (dependent on the strength of the DLP or ECDLP), digital signature algorithms (DSA, ECDSA, RSA-PSS), public key encryption algorithms (El Gamal, RSA-OAEP), etc. In other words, Shor's quantum algorithm is potentially capable of violating these algorithms, and with them all the mechanisms of public-key cryptography deployed in cyberspace.

Memristor Computing Systems

Memristor Computing Systems
Author: Leon O. Chua,Ronald Tetzlaff,Angela Slavova
Publsiher: Springer Nature
Total Pages: 307
Release: 2022-06-23
Genre: Technology & Engineering
ISBN: 9783030905828

Download Memristor Computing Systems Book in PDF, Epub and Kindle

This contributed volume offers practical solutions and design-, modeling-, and implementation-related insights that address current research problems in memristors, memristive devices, and memristor computing. The book studies and addresses related challenges in and proposes solutions for the future of memristor computing. State-of-the-art research on memristor modeling, memristive interconnections, memory circuit architectures, software simulation tools, and applications of memristors in computing are presented. Utilising contributions from numerous experts in the field, written in clear language and illustrated throughout, this book is a comprehensive reference work. Memristor Computing Systems explains memristors and memristive devices in an accessible way for graduate students and researchers with a basic knowledge of electrical and control systems engineering, as well as prompting further research for more experienced academics.