Narrow your search

Library

KBC (2)

KU Leuven (2)

FARO (1)

LUCA School of Arts (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

ULB (1)

ULiège (1)

More...

Resource type

book (5)


Language

English (5)


Year
From To Submit

2021 (4)

2018 (1)

Listing 1 - 5 of 5
Sort by

Book
Cybersecurity Management : An Organizational and Strategic Approach
Author:
ISBN: 1487531257 1487531249 Year: 2021 Publisher: Toronto, Ontario : University of Toronto Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cybersecurity Management looks at the current state of cybercrime and explores how organizations can develop resources and capabilities to prepare themselves for the changing cybersecurity environment.


Book
Cyber Security of Critical Infrastructures
Authors: --- ---
Year: 2021 Publisher: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods.

Keywords

Technology: general issues --- crypto-ransomware --- locker-ransomware --- static analysis --- dynamic analysis --- machine learning --- assessment framework --- cybersecurity --- GDPR --- PCI-DSS --- DSPT --- NISD --- cyber-ranges --- security training --- security modelling --- serious games --- dynamic adaptation --- training programmes --- computers in education --- bloom --- STRIDE --- smart shipping --- military --- VMF --- hash chain --- T-OTP --- lightweight secure hash (LSH) --- CNR --- web application --- security vulnerability --- analysis security testing --- static analysis security testing --- dynamic analysis security testing --- interactive analysis security testing --- assessment methodology --- false positive --- false negative --- tools combination --- deep learning --- image classification --- transfer learning --- industrial control system --- fine-tuning --- testbeds --- cyber ranges --- cyber exercises --- education --- training --- research --- lattice cryptography --- code cryptography --- post quantum cryptography --- physical unclonable function --- public key infrastructure --- high performance computing --- malware analysis --- static malware analysis --- dynamic malware analysis --- malware classification --- random forest --- support vector machines --- smart grid --- risk assessment --- threat modeling --- formal verification --- probabilistic model checking --- cloud robotics --- image face recognition --- deep learning algorithms --- security --- encryption algorithms --- cybercrime --- Hasse diagram --- interval-valued complex intuitionistic fuzzy relations --- interval-valued complex intuitionistic fuzzy sets --- offensive cybersecurity --- cyber-attacks --- scoring model --- offensive cybersecurity framework --- crypto-ransomware --- locker-ransomware --- static analysis --- dynamic analysis --- machine learning --- assessment framework --- cybersecurity --- GDPR --- PCI-DSS --- DSPT --- NISD --- cyber-ranges --- security training --- security modelling --- serious games --- dynamic adaptation --- training programmes --- computers in education --- bloom --- STRIDE --- smart shipping --- military --- VMF --- hash chain --- T-OTP --- lightweight secure hash (LSH) --- CNR --- web application --- security vulnerability --- analysis security testing --- static analysis security testing --- dynamic analysis security testing --- interactive analysis security testing --- assessment methodology --- false positive --- false negative --- tools combination --- deep learning --- image classification --- transfer learning --- industrial control system --- fine-tuning --- testbeds --- cyber ranges --- cyber exercises --- education --- training --- research --- lattice cryptography --- code cryptography --- post quantum cryptography --- physical unclonable function --- public key infrastructure --- high performance computing --- malware analysis --- static malware analysis --- dynamic malware analysis --- malware classification --- random forest --- support vector machines --- smart grid --- risk assessment --- threat modeling --- formal verification --- probabilistic model checking --- cloud robotics --- image face recognition --- deep learning algorithms --- security --- encryption algorithms --- cybercrime --- Hasse diagram --- interval-valued complex intuitionistic fuzzy relations --- interval-valued complex intuitionistic fuzzy sets --- offensive cybersecurity --- cyber-attacks --- scoring model --- offensive cybersecurity framework


Book
Cyber Security of Critical Infrastructures
Authors: --- ---
Year: 2021 Publisher: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods.

Keywords

Technology: general issues --- crypto-ransomware --- locker-ransomware --- static analysis --- dynamic analysis --- machine learning --- assessment framework --- cybersecurity --- GDPR --- PCI-DSS --- DSPT --- NISD --- cyber-ranges --- security training --- security modelling --- serious games --- dynamic adaptation --- training programmes --- computers in education --- bloom --- STRIDE --- smart shipping --- military --- VMF --- hash chain --- T-OTP --- lightweight secure hash (LSH) --- CNR --- web application --- security vulnerability --- analysis security testing --- static analysis security testing --- dynamic analysis security testing --- interactive analysis security testing --- assessment methodology --- false positive --- false negative --- tools combination --- deep learning --- image classification --- transfer learning --- industrial control system --- fine-tuning --- testbeds --- cyber ranges --- cyber exercises --- education --- training --- research --- lattice cryptography --- code cryptography --- post quantum cryptography --- physical unclonable function --- public key infrastructure --- high performance computing --- malware analysis --- static malware analysis --- dynamic malware analysis --- malware classification --- random forest --- support vector machines --- smart grid --- risk assessment --- threat modeling --- formal verification --- probabilistic model checking --- cloud robotics --- image face recognition --- deep learning algorithms --- security --- encryption algorithms --- cybercrime --- Hasse diagram --- interval-valued complex intuitionistic fuzzy relations --- interval-valued complex intuitionistic fuzzy sets --- offensive cybersecurity --- cyber-attacks --- scoring model --- offensive cybersecurity framework --- n/a


Book
Cyber Security of Critical Infrastructures
Authors: --- ---
Year: 2021 Publisher: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods.

Keywords

crypto-ransomware --- locker-ransomware --- static analysis --- dynamic analysis --- machine learning --- assessment framework --- cybersecurity --- GDPR --- PCI-DSS --- DSPT --- NISD --- cyber-ranges --- security training --- security modelling --- serious games --- dynamic adaptation --- training programmes --- computers in education --- bloom --- STRIDE --- smart shipping --- military --- VMF --- hash chain --- T-OTP --- lightweight secure hash (LSH) --- CNR --- web application --- security vulnerability --- analysis security testing --- static analysis security testing --- dynamic analysis security testing --- interactive analysis security testing --- assessment methodology --- false positive --- false negative --- tools combination --- deep learning --- image classification --- transfer learning --- industrial control system --- fine-tuning --- testbeds --- cyber ranges --- cyber exercises --- education --- training --- research --- lattice cryptography --- code cryptography --- post quantum cryptography --- physical unclonable function --- public key infrastructure --- high performance computing --- malware analysis --- static malware analysis --- dynamic malware analysis --- malware classification --- random forest --- support vector machines --- smart grid --- risk assessment --- threat modeling --- formal verification --- probabilistic model checking --- cloud robotics --- image face recognition --- deep learning algorithms --- security --- encryption algorithms --- cybercrime --- Hasse diagram --- interval-valued complex intuitionistic fuzzy relations --- interval-valued complex intuitionistic fuzzy sets --- offensive cybersecurity --- cyber-attacks --- scoring model --- offensive cybersecurity framework --- n/a


Book
Dark commerce : how a new illicit economy is threatening our future
Author:
ISBN: 0691193401 0691184291 Year: 2018 Publisher: Princeton, New Jersey : Princeton University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

A comprehensive look at the world of illicit trade Though mankind has traded tangible goods for millennia, recent technology has changed the fundamentals of trade, in both legitimate and illegal economies. In the past three decades, the most advanced forms of illicit trade have broken with all historical precedents and, as Dark Commerce shows, now operate as if on steroids, tied to computers and social media. In this new world of illicit commerce, which benefits states and diverse participants, trade is impersonal and anonymized, and vast profits are made in short periods with limited accountability to sellers, intermediaries, and purchasers.Louise Shelley examines how new technology, communications, and globalization fuel the exponential growth of dangerous forms of illegal trade-the markets for narcotics and child pornography online, the escalation of sex trafficking through web advertisements, and the sale of endangered species for which revenues total in the hundreds of millions of dollars. The illicit economy exacerbates many of the world's destabilizing phenomena: the perpetuation of conflicts, the proliferation of arms and weapons of mass destruction, and environmental degradation and extinction. Shelley explores illicit trade in tangible goods-drugs, human beings, arms, wildlife and timber, fish, antiquities, and ubiquitous counterfeits-and contrasts this with the damaging trade in cyberspace, where intangible commodities cost consumers and organizations billions as they lose identities, bank accounts, access to computer data, and intellectual property.Demonstrating that illicit trade is a business the global community cannot afford to ignore and must work together to address, Dark Commerce considers diverse ways of responding to this increasing challenge.

Keywords

Advertising. --- Africa. --- Arms industry. --- Auction. --- Backpage. --- Beneficiary. --- Bitcoin. --- Botnet. --- Bribery. --- Business ethics. --- CITES. --- Camorra. --- Child pornography. --- Cigarette smuggling. --- Climate change. --- Cold War. --- Colonialism. --- Commodity. --- Competition. --- Consumer. --- Corruption. --- Counterfeit. --- Credit card. --- Crime. --- Currency. --- Customer. --- Cybercrime. --- Dark web. --- Deforestation. --- Developed country. --- EBay. --- Economic inequality. --- Economy. --- Employment. --- Entrepreneurship. --- Environmental crime. --- Europol. --- Export. --- Facilitator. --- Financial crimes. --- Fraud. --- Funding. --- Global Community. --- Globalization. --- Governance. --- Heroin. --- Human trafficking. --- Illegal drug trade. --- Illegal immigration. --- Illicit financial flows. --- Income. --- Insurgency. --- Intellectual property. --- Ivory trade. --- Latin America. --- Law enforcement. --- Malware. --- Marketing. --- Money laundering. --- Natural resource. --- North Korea. --- Online marketplace. --- Opioid. --- Organized crime. --- Panama Papers. --- Payment system. --- Payment. --- People smuggling. --- Pesticide. --- Piracy. --- Poaching. --- Politician. --- Private sector. --- Prostitution. --- Ransomware. --- Rhinoceros. --- Sex trafficking. --- Sicilian Mafia. --- Slavery. --- Smuggling. --- Supply (economics). --- Supply chain. --- Sustainability. --- Tax evasion. --- Tax. --- Technological revolution. --- Technology. --- Terrorism. --- Theft. --- Trade route. --- Transnational crime. --- Urbanization. --- Vendor. --- Virtual world. --- Volkswagen. --- War. --- Wealth. --- World War II. --- World economy. --- World population. --- Black market. --- Crime and globalization. --- Internet fraud.

Listing 1 - 5 of 5
Sort by