THE ANALYSIS OF CYBER SECURITY THE EXTENDED CARTESIAN METHOD APPROACH WITH INNOVATIVE STUDY MODELS

Cyber security is the practice of protecting systems, networks, and programs from digital attacks. These cyber attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Implementing effective cyber security measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative.


This thesis addresses the individuation of the appropriate scientific tools in order to create a methodology and a set of models for establishing the suitable metrics and pertinent analytical capacity in the cyber dimension for social applications. The current state of the art of cyber security is exemplified by some specific characteristics.

Components of the Book:
  • Dedication
  • Acknowledgement
  • Abstract
  • Table of Contents
  • List of Figures
  • List of Tables
  • Chapter 1. Introduction
    • 1.1. Background and Motivation
    • 1.2. Research Problems
    • 1.3. Aims and Objectives
    • 1.4. Research Methods
    • 1.5. Organization of the Thesis
  • Chapter 2. The State of the Art of Cyber Security
    • 2.1. ICT Systems and Valuable Information
    • 2.2. The Growing Dependency on ICT Systems
    • 2.3. Information Security
    • 2.4. The Cryptography
    • 2.5. The Current Core Defensive Strategy
    • 2.6. The Risk Perception
    • 2.7. The Current Risk Management Approach
    • 2.8. Summary
  • Chapter 3. The Current Established Principles for Any New Development
    • 3.1. Critical Analysis of Existing Framework for Cyber Security
    • 3.2. Value and Accountancy
    • 3.3. Underpinning Principles for Information Security Analysis
    • 3.4. The Coordination between the Menu of Security Models and the Most Recognized and Used Methodologies
    • 3.5. Summary
  • Chapter 4. The New Patterns for Security
    • 4.1. The Novelty of the Research Hypothesis
    • 4.2. The Three-Entity Model
    • 4.3. The Functional and Business Information Model
    • 4.4. The Security Chain Model and the ASThMA Rate
    • 4.5. The Value Assessment of Information Mission
    • 4.6. The Methodology for Estimating Information Mission Value (ACES 1, 2 and 3)
  • Chapter 5. Innovative Hypothesis for Assessing Security Metrics and Risks
    • 5.1. The Defence in Depth Applied to Cyber Secu-rity
    • 5.2. The Cards for Assessing the Defence in Depth Applied to Cyber Security
    • 5.3. The Cyber Risks Assessment
    • 5.4. New Risk Assessment Based on a Single Negative Event
    • 5.5. The Perspective for Academic Validation in Consideration of the Validation of Alternative Security Approaches
    • 5.6. Summary
  • Chapter 6. Conclusion and Future Works
    • 6.1. Concluding Remarks
    • 6.2. Implications and Contributions
    • 6.3. Future Work
  • References
  • Glossary
Readership: Students, academics, teachers and other people attending or interested in cyber security.
3
Dedication
PDF (93 KB)
5
Acknowledgement
PDF (97 KB)
7
Abstract
PDF (109 KB)
9
Table of Contents
PDF (131 KB)
13
List of Figures
PDF (118 KB)
15
List of Tables
PDF (108 KB)
17
Chapter 1. Introduction
PDF (286 KB)
35
Chapter 2. The State of the Art of Cyber Security
PDF (1642 KB)
113
Chapter 3. The Current Established Principles for Any New Development
PDF (369 KB)
137
Chapter 4. The New Patterns for Security
PDF (598 KB)
171
Chapter 5. Innovative Hypothesis for Assessing Security Metrics and Risks
PDF (426 KB)
193
Chapter 6. Conclusion and Future Works
PDF (226 KB)
203
References
PDF (290 KB)
221
Glossary
PDF (283 KB)
Diego ABBO

Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top