Network Security Metrics Network Security Metrics

Network Security Metrics

Lingyu Wang and Others
    • $79.99
    • $79.99

Publisher Description

This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since “you cannot improve what you cannot measure”, a network security metric is essential to evaluating the relative effectiveness of potential network security solutions.
The authors start by examining the limitations of existing solutions and standards on security metrics, such as CVSS and attack surface, which typically focus on known vulnerabilities in individual software products or systems. The first few chapters of this book describe different approaches to fusing individual metric values obtained from CVSS scores into an overall measure of network security using attack graphs. Since CVSS scores are only available for previously known vulnerabilities, such approaches do not consider the threat of unknownattacks exploiting the so-called zero day vulnerabilities. Therefore, several chapters of this book are dedicated to develop network security metrics especially designed for dealing with zero day attacks where the challenge is that little or no prior knowledge is available about the exploited vulnerabilities, and thus most existing methodologies for designing security metrics are no longer effective.
Finally, the authors examine several issues on the application of network security metrics at the enterprise level. Specifically, a chapter presents a suite of security metrics organized along several dimensions for measuring and visualizing different aspects of the enterprise cyber security risk, and the last chapter presents a novel metric for measuring the operational effectiveness of the cyber security operations center (CSOC).
Security researchers who work on network security or security analytics related areas seeking new research topics, as well as security practitioners including network administrators and security architects who are looking for state of the art approaches to hardening their networks, will find this book helpful as a reference. Advanced-level students studying computer science and engineering will find this book useful as a secondary text.

GENRE
Computers & Internet
RELEASED
2017
November 15
LANGUAGE
EN
English
LENGTH
221
Pages
PUBLISHER
Springer International Publishing
SELLER
Springer Nature B.V.
SIZE
5.8
MB
Network Hardening Network Hardening
2014
Quality Of Protection Quality Of Protection
2008
Critical Information Infrastructures Security Critical Information Infrastructures Security
2022
Cyber Situational Awareness Cyber Situational Awareness
2009
Adaptive Autonomous Secure Cyber Systems Adaptive Autonomous Secure Cyber Systems
2020
Risks and Security of Internet and Systems Risks and Security of Internet and Systems
2022
Binary Code Fingerprinting for Cybersecurity Binary Code Fingerprinting for Cybersecurity
2020
Applied Cryptography and Network Security Workshops Applied Cryptography and Network Security Workshops
2019
Foundations and Practice of Security Foundations and Practice of Security
2016
Preserving Privacy Against Side-Channel Leaks Preserving Privacy Against Side-Channel Leaks
2016
Network Hardening Network Hardening
2014
Preserving Privacy in On-Line Analytical Processing (OLAP) Preserving Privacy in On-Line Analytical Processing (OLAP)
2007