Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
11,041
result(s) for
"Cyber intelligence (Computer security)"
Sort by:
Personal cybersecurity : how to avoid and recover from cybercrime
Personal Cybersecurity addresses the needs of individual users at work and at home. This book covers personal cybersecurity for all modes of personal computing whether on consumer-acquired or company-issued devices: desktop PCs, laptops, mobile devices, smart TVs, WiFi and Bluetooth peripherals, and IoT objects embedded with network-connected sensors. In all these modes, the frequency, intensity, and sophistication of cyberattacks that put individual users at risk are increasing in step with accelerating mutation rates of malware and cybercriminal delivery systems.
Cyber Security
by
David Sutton
in
COMPUTERS
2022
Cyber security has never been more essential than it is today, it's not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data secure.
Cyber Security explains the fundamentals of information security, how to shape good organisational security practice, and how to recover effectively should the worst happen.
Written in an accessible manner, Cyber Security provides practical guidance and actionable steps to better prepare your workplace and your home alike. This second edition has been updated to reflect the latest threats and vulnerabilities in the IT security landscape, and updates to standards, good practice guides and legislation.
• A valuable guide to both current professionals at all levels and those wishing to embark on a cyber security profession
• Offers practical guidance and actionable steps for individuals and businesses to protect themselves
• Highly accessible and terminology is clearly explained and supported with current, real-world examples
Cybersecurity essentials
\"Cybersecurity Essentials\" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authors summarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key concepts. -- From publisher's description.
FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm
2020
In recent years, the number of vulnerabilities discovered and publicly disclosed has shown a sharp upward trend. However, the value of exploitation of vulnerabilities varies for attackers, considering that only a small fraction of vulnerabilities are exploited. Therefore, the realization of quick exclusion of the non-exploitable vulnerabilities and optimal patch prioritization on limited resources has become imperative for organizations. Recent works using machine learning techniques predict exploited vulnerabilities by extracting features from open-source intelligence (OSINT). However, in the face of explosive growth of vulnerability information, there is room for improvement in the application of past methods to multiple threat intelligence. A more general method is needed to deal with various threat intelligence sources. Moreover, in previous methods, traditional text processing methods were used to deal with vulnerability related descriptions, which only grasped the static statistical characteristics but ignored the context and the meaning of the words of the text. To address these challenges, we propose an exploit prediction model, which is based on a combination of fastText and LightGBM algorithm and called fastEmbed. We replicate key portions of the state-of-the-art work of exploit prediction and use them as benchmark models. Our model outperforms the baseline model whether in terms of the generalization ability or the prediction ability without temporal intermixing with an average overall improvement of 6.283% by learning the embedding of vulnerability-related text on extremely imbalanced data sets. Besides, in terms of predicting the exploits in the wild, our model also outperforms the baseline model with an F1 measure of 0.586 on the minority class (33.577% improvement over the work using features from darkweb/deepweb). The results demonstrate that the model can improve the ability to describe the exploitability of vulnerabilities and predict exploits in the wild effectively.
Journal Article
Artificial Intelligence, Cybersecurity and Cyber Defence
The aim of the book is to analyse and understand the impacts of artificial intelligence in the fields of national security and defense; to identify the political, geopolitical, strategic issues of AI; to analyse its place in conflicts and cyberconflicts, and more generally in the various forms of violence; to explain the appropriation of artificial intelligence by military organizations, but also law enforcement agencies and the police; to discuss the questions that the development of artificial intelligence and its use raise in armies, police, intelligence agencies, at the tactical, operational and strategic levels.
Cyber-physical attack recovery procedures : a step-by-step preparation and response guide
by
Ayala, Luis (Writer on cybersecurity), author
in
Cyber intelligence (Computer security)
,
Cooperating objects (Computer systems) Security measures.
,
Supervisory control systems Security measures.
2016
\"Provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely\"--Back cover.
Cybersecurity for Information Professionals
by
Hawamdeh, Suliman
,
Chang, Hsia-Ching
in
Computer crimes
,
Computer crimes -- Prevention
,
Computer security
2020
Information professionals have been paying more attention and putting a greater focus on privacy over cybersecurity. The cybersecurity and privacy breach incidents in soaring reveal that cybersecurity risks are high. Utilizing cybersecurity awareness training in the organizations has been one of the effective tools to promote cybersecurity-conscious culture and make individuals become more cybersecurity conscious. However, it is unknown if employees’ security behavior at work can be extended to their security behavior at home and personal life. On the one hand, library and information professionals need to inherit their role as data/information gatekeeper to safeguard data/information assets in the organizations and the cyberspace. On the other hand, library and information professionals can aid in enabling effective information access and dissemination of cybersecurity knowledge to make users conscious about the cybersecurity and privacy risks that are often hidden in the cyber universe.
Cybersecurity for Information Professionals: Concepts and Applications
introduces the fundamental concepts in cybersecurity and addresses some of the challenges faced by information professionals, librarians, archivists, record managers, students, and professionals in related disciplines. This book is written especially for educators preparing courses in information security, cybersecurity, and the integration of privacy and cybersecurity. The chapters contained in this book represent the multiple and diverse perspectives from professionals in the field of cybersecurity. The chapters will cover the following topics:
Information Governance and Cybersecurity
User Privacy and Security Online: The Role of Information Professionals
Cybersecurity and Social Media
Healthcare Regulations, Threats, and their Impact on Cybersecurity
Mobile Cybersecurity: A Socio-Technical Perspective
Cybersecurity in the Software Development Life Cycle
Data Security and Privacy
Above all, the book addresses the ongoing challenges of cybersecurity. In particular, it explains how information professionals can contribute to long-term workforce development by designing and leading cybersecurity awareness campaigns or cybersecurity hygiene programs to change people’s security behavior.
The cyber threat landscape
by
Chang, Emily
,
Whitmore, Wendi
in
Computer security
,
Cyber intelligence (Computer security)
,
Cyberinfrastructure
2022
Palo Alto Networks Senior VP Wendi Whitmore joins Emily Chang for a discussion about the future of the cybersecurity landscape and how governments and companies can best prepare for potential attacks, and what form they can take.
Streaming Video