Cybersecurity in Digital Transformation Cybersecurity in Digital Transformation
SpringerBriefs on Cyber Security Systems and Networks

Cybersecurity in Digital Transformation

Scope and Applications

    • €42.99
    • €42.99

Publisher Description

This book brings together the essential methodologies required to understand the advancement of digital technologies into digital transformation, as well as to protect them against cyber threat vulnerabilities (in this context cybersecurity attack ontology is included, modeling different types of adversary knowledge). It covers such essential methodologies as CIA Triad, Security Risk, Likelihood, and Consequence Level, Threat Attack Profiling, Threat Intelligence, Threat Lifecycle and more. 
The idea behind digital transformation is to use digital technologies not only to replicate an existing process in a digital form, but to use digital technology to transform that process into something intelligent (where anything is connected with everything at any time and accessible and controlled and designed advanced). Against this background, cyber threat attacks become reality, using advanced digital technologies with their extreme interconnected capabilitywhich call for sophisticated cybersecurity protecting digital technologies of digital transformation.
Scientists, advanced-level students and researchers working in computer science, electrical engineering and applied mathematics will find this book useful as a reference guide.  Professionals working in the field of big data analytics or digital/intelligent manufacturing will also find this book to be a valuable tool. 

GENRE
Computing & Internet
RELEASED
2020
3 December
LANGUAGE
EN
English
LENGTH
133
Pages
PUBLISHER
Springer International Publishing
PROVIDER INFO
Springer Science & Business Media LLC
SIZE
3.3
MB
Introduction to Cybersecurity Introduction to Cybersecurity
2023
Cybersecurity in the Age of Smart Societies Cybersecurity in the Age of Smart Societies
2023
Challenges in the IoT and Smart Environments Challenges in the IoT and Smart Environments
2021
Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity
2020
Cyberspace and Cybersecurity Cyberspace and Cybersecurity
2017
Cybersecurity and Infrastructure Protection Cybersecurity and Infrastructure Protection
2016
Guide to Cybersecurity in Digital Transformation Guide to Cybersecurity in Digital Transformation
2023
Guide to Automotive Connectivity and Cybersecurity Guide to Automotive Connectivity and Cybersecurity
2019
Guide to Computing Fundamentals in Cyber-Physical Systems Guide to Computing Fundamentals in Cyber-Physical Systems
2016
Introduction to Transportation Analysis, Modeling and Simulation Introduction to Transportation Analysis, Modeling and Simulation
2014
Privacy-Preserving Machine Learning Privacy-Preserving Machine Learning
2022
Privacy-Preserving Deep Learning Privacy-Preserving Deep Learning
2021
Design and Cryptanalysis of ZUC Design and Cryptanalysis of ZUC
2021
Location Privacy in Mobile Applications Location Privacy in Mobile Applications
2018
Big Digital Forensic Data Big Digital Forensic Data
2018
Advanced Monitoring in P2P Botnets Advanced Monitoring in P2P Botnets
2018