Intrusion Detection and Prevention

This chapter provides a study regarding the important topics of cyber threat intrusion detection and prevention with regard to identifying malicious incidents, logging information about them, attempting to stop them and reporting the identified malicious

  • PDF / 2,562,580 Bytes
  • 126 Pages / 439.43 x 666.14 pts Page_size
  • 21 Downloads / 263 Views

DOWNLOAD

REPORT


Dietmar P.F. Möller

Cybersecurity in Digital Transformation Scope and Applications

SpringerBriefs on Cyber Security Systems and Networks Editor-in-Chief Yang Xiang, Digital Research and Innovation Capability Platform, Swinburne University of Technology, Hawthorn, Melbourne, VIC, Australia Series editors Liqun Chen , Department of Computer Science, University of Surrey, Guildford, Surrey, UK Kim-Kwang Raymond Choo , Department of Information Systems, University of Texas at San Antonio, San Antonio,TX, USA Sherman S. M. Chow , Department of Information Engineering, The Chinese University of Hong Kong, Shatin, Hong Kong Robert H. Deng , School of Information Systems, Singapore Management University, Singapore, Singapore Dieter Gollmann, Hamburg University of Technology, Hamburg, Germany Kuan-Ching Li, Department of Computer Science and Information Engineering, Providence University, Taichung, Taiwan Javier Lopez, Computer Science Department, University of Málaga, Málaga, Spain Kui Ren, University at Buffalo, Buffalo, NY, USA Jianying Zhou , Infocomm Security Department, Institute for Infocomm Research, Singapore, Singapore

The series aims to develop and disseminate an understanding of innovations, paradigms, techniques, and technologies in the contexts of cyber security systems and networks related research and studies. It publishes thorough and cohesive overviews of state-of-the-art topics in cyber security, as well as sophisticated techniques, original research presentations and in-depth case studies in cyber systems and networks. The series also provides a single point of coverage of advanced and timely emerging topics as well as a forum for core concepts that may not have reached a level of maturity to warrant a comprehensive textbook. It addresses security, privacy, availability, and dependability issues for cyber systems and networks, and welcomes emerging technologies, such as artificial intelligence, cloud computing, cyber physical systems, and big data analytics related to cyber security research. The mainly focuses on the following research topics: Fundamentals and theories • Cryptography for cyber security • Theories of cyber security • Provable security Cyber Systems and Networks • • • • • • •

Cyber systems security Network security Security services Social networks security and privacy Cyber attacks and defense Data-driven cyber security Trusted computing and systems

Applications and others • Hardware and device security • Cyber application security • Human and social aspects of cyber security More information about this series at http://www.springer.com/series/15797

Dietmar P. F. Möller

Cybersecurity in Digital Transformation Scope and Applications

Dietmar P. F. Möller Computer Engineering Clausthal University of Technology Clausthal-Zellerfeld, Germany

ISSN 2522-5561     ISSN 2522-557X (electronic) SpringerBriefs on Cyber Security Systems and Networks ISBN 978-3-030-60569-8    ISBN 978-3-030-60570-4 (eBook) https://doi.org/10.1007/978-3-030-60570-4 © The Author(s), under exclusive license