2 results (0,13458 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Security Architecture – How & Why

Security Architecture – How & Why

Security Architecture or Enterprise Information security architecture as it was originally coined by Gartner back in 2006 has been applied to many things and different areas making a concrete definition of security architecture a difficult proposition. But having an architecture for the cyber security needs of an organization is important for many reasons not least because having an architecture makes working with cyber security a much easier job since we can now build on a hopefully solid foundation. Developing a security architecture is a daunting job for almost anyone and in a company that has not had a cyber security program implemented before the job becomes even harder. The benefits of having a concrete cyber security architecture in place cannot be overstated! The challenge here is that a security architecture is not something that can stand alone it absolutely must be aligned with the business in which it is being implemented. This book emphasizes the importance and the benefits of having a security architecture in place. The book will be aligned with most of the sub-frameworks in the general framework called SABSA or Sherwood Applied Business Security Architecture. SABSA is comprised of several individual frameworks and there are several certifications that you can take in SABSA. Aside from getting a validation of your skills SABSA as a framework focuses on aligning the Security Architecture with the business and its strategy. Each of the chapters in this book will be aligned with one or more of the components in SABSA the components will be described along with the introduction to each of the chapters. | Security Architecture – How & Why

GBP 94.99
1

Challenges in Cybersecurity and Privacy - the European Research Landscape

Challenges in Cybersecurity and Privacy - the European Research Landscape

Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT since they present additional vulnerabilities due to their constrained capabilities their unattended nature and the usage of potential untrustworthiness components. Likewise identity-theft fraud personal data leakages and other related cyber-crimes are continuously evolving causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context new holistic approaches methodologies techniques and tools are needed to cope with those issues and mitigate cyberattacks by employing novel cyber-situational awareness frameworks risk analysis and modeling threat intelligent systems cyber-threat information sharing methods advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition novel privacy-preserving techniques and crypto-privacy mechanisms identity and eID management systems trust services and recommendations are needed to protect citizens’ privacy while keeping usability levels. The European Commission is addressing the challenge through different means including the Horizon 2020 Research and Innovation program thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project which aims to cope with digital security and privacy aspects risks threats and cybersecurity issues from a different perspective. Each chapter includes the project’s overviews and objectives the particular challenges they are covering research achievements on security and privacy as well as the techniques outcomes and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely the EU projects analyzed in the book are: ANASTACIA SAINT YAKSHA FORTIKA CYBECO SISSDEN CIPSEC CS-AWARE. RED-Alert Truessec. eu. ARIES LIGHTest CREDENTIAL FutureTrust LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects.

GBP 89.99
1