Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
808,464
result(s) for
"Cyber security"
Sort by:
Personal cybersecurity : how to avoid and recover from cybercrime
Personal Cybersecurity addresses the needs of individual users at work and at home. This book covers personal cybersecurity for all modes of personal computing whether on consumer-acquired or company-issued devices: desktop PCs, laptops, mobile devices, smart TVs, WiFi and Bluetooth peripherals, and IoT objects embedded with network-connected sensors. In all these modes, the frequency, intensity, and sophistication of cyberattacks that put individual users at risk are increasing in step with accelerating mutation rates of malware and cybercriminal delivery systems.
Mobilizing the C-Suite
2023,2022
Cyberattacks are more destructive than ever, but your C-suite can stop them. This book tells you how.
Cyberattacks are worse now than ever before. To defeat cybercriminals, companies must focus on the low-hanging fruits of cybersecurity. It's all about the basics. Companies laid low by ransomware failed to practice good cyber hygiene by recklessly allowing weak or reused passwords, not turning on multifactor authentication, or neglecting to install patches to known software vulnerabilities.
Adding insult to grievous injury, many companies failed to mitigate cyber doom by not encrypting their devices, not implementing a data backup plan, or the mother of all blunders, not training their workforce on basic cyber hygiene.
Worse still, hidden risks abound for the unwary. A devastating cyberattack is just moments away when C-suite leaders close their eyes to the hazards of shadow IT, data offshoring, mobile devices, and social media.
Mobilizing the C-suite: Waging War Against Cyberattacks was written to galvanize C-suite leaders into deploying the basic cybersecurity controls vital to defeating cyberattacks, and to support frontline cybersecurity professionals with companywide cyber hygiene training. Most importantly, the book was written to introduce real-world cybersecurity principles to college students—if our future generation of company leaders enter the C-suite with cyber-savvy, then destructive cyberattacks are not a foregone conclusion.
Cybersecurity essentials
\"Cybersecurity Essentials\" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authors summarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key concepts. -- From publisher's description.
In-Vehicle Communication Cyber Security: Challenges and Solutions
by
Hewage, Chaminda
,
Rathore, Rajkumar Singh
,
Kaiwartya, Omprakash
in
Artificial intelligence
,
Communications systems
,
Connectivity
2022
In-vehicle communication has become an integral part of today’s driving environment considering the growing add-ons of sensor-centric communication and computing devices inside a vehicle for a range of purposes including vehicle monitoring, physical wiring reduction, and driving efficiency. However, related literature on cyber security for in-vehicle communication systems is still lacking potential dedicated solutions for in-vehicle cyber risks. Existing solutions are mainly relying on protocol-specific security techniques and lacking an overall security framework for in-vehicle communication. In this context, this paper critically explores the literature on cyber security for in-vehicle communication focusing on technical architecture, methodologies, challenges, and possible solutions. In-vehicle communication network architecture is presented considering key components, interfaces, and related technologies. The protocols for in-vehicle communication have been classified based on their characteristics, and usage type. Security solutions for in-vehicle communication have been critically reviewed considering machine learning, cryptography, and port-centric techniques. A multi-layer secure framework is also developed as a protocol and use case-independent in-vehicle communication solution. Finally, open challenges and future dimensions of research for in-vehicle communication cyber security are highlighted as observations and recommendations.
Journal Article
Artificial intelligence in cyber security: research advances, challenges, and opportunities
2022
In recent times, there have been attempts to leverage artificial intelligence (AI) techniques in a broad range of cyber security applications. Therefore, this paper surveys the existing literature (comprising 54 papers mainly published between 2016 and 2020) on the applications of AI in user access authentication, network situation awareness, dangerous behavior monitoring, and abnormal traffic identification. This paper also identifies a number of limitations and challenges, and based on the findings, a conceptual human-in-the-loop intelligence cyber security model is presented.
Journal Article
Cyber-physical attack recovery procedures : a step-by-step preparation and response guide
by
Ayala, Luis (Writer on cybersecurity), author
in
Cyber intelligence (Computer security)
,
Cooperating objects (Computer systems) Security measures.
,
Supervisory control systems Security measures.
2016
\"Provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely\"--Back cover.
AI-Driven Cybersecurity: An Overview, Security Intelligence Modeling and Research Directions
by
Furhad, Md Hasan
,
Nowrozy, Raza
,
Sarker, Iqbal H.
in
Access control
,
Artificial intelligence
,
Automation
2021
Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution (or Industry 4.0), which can be used for the protection of Internet-connected systems from cyber threats, attacks, damage, or unauthorized access. To intelligently solve today’s various cybersecurity issues, popular
AI techniques
involving machine learning and deep learning methods, the concept of natural language processing, knowledge representation and reasoning, as well as the concept of knowledge or rule-based expert systems modeling can be used. Based on these AI methods, in this paper, we present a comprehensive view on “AI-driven Cybersecurity” that can play an important role for
intelligent cybersecurity services and management
. The security intelligence modeling based on such AI methods can make the cybersecurity computing process
automated and intelligent
than the conventional security systems. We also highlight several
research directions
within the scope of our study, which can help researchers do future research in the area. Overall, this paper’s ultimate objective is to serve as a reference point and guidelines for cybersecurity researchers as well as industry professionals in the area, especially from an
intelligent computing
or AI-based technical point of view.
Journal Article
Decision-Makers’ Understanding of Cyber-Security’s Systemic and Dynamic Complexity: Insights from a Board Game for Bank Managers
by
Rouwette, Etiënne A. J. A.
,
von Kutzschenbach, Michael
,
Armenia, Stefano
in
banking cyber-security
,
Complexity
,
cyber-security board game
2022
Cyber-security incidents show how difficult it is to make optimal strategic decisions in such a complex environment. Given that it is hard for researchers to observe organisations’ decision-making processes driving cyber-security strategy, we developed a board game that mimics this real-life environment and shows the challenges of decision-making. We observed cyber-security experts participating in the game. The results showed that decision-makers who performed poorly tended to employ heuristics, leading to fallacious decision approaches (overreaction strategies in place of proactive ones), and were not always aware of their poor performances. We advocate the need for decision support tools that capture this complex dynamic nature.
Journal Article