Amazon cover image
Image from Amazon.com

Cybercomplexity [electronic resource] : A Macroscopic View of Cybersecurity Risk /

By: Contributor(s): Material type: TextTextSeries: Advanced Sciences and Technologies for Security ApplicationsPublisher: Cham : Springer International Publishing : Imprint: Springer, 2022Edition: 1st ed. 2022Description: XXIX, 167 p. 69 illus., 18 illus. in color. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783031069949
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 004 23
LOC classification:
  • QA75.5-76.95
Online resources:
Contents:
1. Risk Fundamentals -- 2. Cyber Security Fundamentals -- 3. Cyber security criteria -- 4. Root Causes of Cyber Security Risk -- 5. IT Environment Risk Factors -- 6. Identity Uncertainty -- 7. Communicator Integrity -- 8. Exploitation of Uncertainty in Identity -- 9. Root Cause Effects and the Exploitation of IT Risk Factors; Compromises of IT Integrity -- 10. Integrity Flaws and Exploitation of Human Vulnerabilities.
In: Springer Nature eBookSummary: This book tackles the problem of complexity within IT environments, i.e., "Cybercomplexity," which is generally recognized as a principal source of cybersecurity risk. The book first defines complexity and simplifies its analysis by assuming a probabilistic approach to security risk management. It then proposes a simple model of cybercomplexity that is based on Shannon entropy, a basic concept in information theory. The key drivers of cybercomplexity emerge from this model, where these drivers reveal the scale-dependence of cybersecurity risk and explain why macroscopic security controls are required to address cybersecurity risk on an enterprise scale. The significant operational implications of cybercomplexity are also discussed, thereby providing both a theoretical framework and a practical guide to addressing this longstanding problem in cybersecurity risk management. .
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

1. Risk Fundamentals -- 2. Cyber Security Fundamentals -- 3. Cyber security criteria -- 4. Root Causes of Cyber Security Risk -- 5. IT Environment Risk Factors -- 6. Identity Uncertainty -- 7. Communicator Integrity -- 8. Exploitation of Uncertainty in Identity -- 9. Root Cause Effects and the Exploitation of IT Risk Factors; Compromises of IT Integrity -- 10. Integrity Flaws and Exploitation of Human Vulnerabilities.

This book tackles the problem of complexity within IT environments, i.e., "Cybercomplexity," which is generally recognized as a principal source of cybersecurity risk. The book first defines complexity and simplifies its analysis by assuming a probabilistic approach to security risk management. It then proposes a simple model of cybercomplexity that is based on Shannon entropy, a basic concept in information theory. The key drivers of cybercomplexity emerge from this model, where these drivers reveal the scale-dependence of cybersecurity risk and explain why macroscopic security controls are required to address cybersecurity risk on an enterprise scale. The significant operational implications of cybercomplexity are also discussed, thereby providing both a theoretical framework and a practical guide to addressing this longstanding problem in cybersecurity risk management. .

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in