Critical Infrastructure Security -  Soledad Antelada Toledano

Critical Infrastructure Security (eBook)

Cybersecurity lessons learned from real-world breaches
eBook Download: EPUB
2024 | 1. Auflage
270 Seiten
Packt Publishing (Verlag)
978-1-83763-356-2 (ISBN)
Systemvoraussetzungen
28,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

Discover the core of cybersecurity through gripping real-world accounts of the most common assaults on critical infrastructure - the body of vital systems, networks, and assets so essential that their continued operation is required to ensure the security of a nation, its economy, and the public's health and safety - with this guide to understanding cybersecurity principles.
From an introduction to critical infrastructure and cybersecurity concepts to the most common types of attacks, this book takes you through the life cycle of a vulnerability and how to assess and manage it. You'll study real-world cybersecurity breaches, each incident providing insights into the principles and practical lessons for cyber defenders striving to prevent future breaches.
From DDoS to APTs, the book examines how each threat activates, operates, and succeeds. Additionally, you'll analyze the risks posed by computational paradigms, such as the advancement of AI and quantum computing, to legacy infrastructure.
By the end of this book, you'll be able to identify key cybersecurity principles that can help mitigate evolving attacks to critical infrastructure.


Venture through the core of cyber warfare and unveil the anatomy of cyberattacks on critical infrastructureKey FeaturesGain an overview of the fundamental principles of cybersecurity in critical infrastructureExplore real-world case studies that provide a more exciting learning experience, increasing retentionBridge the knowledge gap associated with IT/OT convergence through practical examplesPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionDiscover the core of cybersecurity through gripping real-world accounts of the most common assaults on critical infrastructure - the body of vital systems, networks, and assets so essential that their continued operation is required to ensure the security of a nation, its economy, and the public's health and safety - with this guide to understanding cybersecurity principles. From an introduction to critical infrastructure and cybersecurity concepts to the most common types of attacks, this book takes you through the life cycle of a vulnerability and how to assess and manage it. You ll study real-world cybersecurity breaches, each incident providing insights into the principles and practical lessons for cyber defenders striving to prevent future breaches. From DDoS to APTs, the book examines how each threat activates, operates, and succeeds. Additionally, you ll analyze the risks posed by computational paradigms, such as the advancement of AI and quantum computing, to legacy infrastructure. By the end of this book, you ll be able to identify key cybersecurity principles that can help mitigate evolving attacks to critical infrastructure. What you will learnUnderstand critical infrastructure and its importance to a nationAnalyze the vulnerabilities in critical infrastructure systemsAcquire knowledge of the most common types of cyberattacks on critical infrastructureImplement techniques and strategies for protecting critical infrastructure from cyber threatsDevelop technical insights into significant cyber attacks from the past decadeDiscover emerging trends and technologies that could impact critical infrastructure securityExplore expert predictions about cyber threats and how they may evolve in the coming yearsWho this book is forThis book is for SOC analysts, security analysts, operational technology (OT) engineers, and operators seeking to improve the cybersecurity posture of their networks. Knowledge of IT and OT systems, along with basic networking and system administration skills, will significantly enhance comprehension. An awareness of current cybersecurity trends, emerging technologies, and the legal framework surrounding critical infrastructure is beneficial.]]>
Erscheint lt. Verlag 24.5.2024
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte Cyber Attack • cyber security • cyber security books • cybersecurity books • Cyber threat intelligence
ISBN-10 1-83763-356-8 / 1837633568
ISBN-13 978-1-83763-356-2 / 9781837633562
Haben Sie eine Frage zum Produkt?
EPUBEPUB (Ohne DRM)

Digital Rights Management: ohne DRM
Dieses eBook enthält kein DRM oder Kopier­schutz. Eine Weiter­gabe an Dritte ist jedoch rechtlich nicht zulässig, weil Sie beim Kauf nur die Rechte an der persön­lichen Nutzung erwerben.

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür die kostenlose Software Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99