1 option
Cybercomplexity : A Macroscopic View of Cybersecurity Risk / by Carl S. Young.
- Format:
- Book
- Author/Creator:
- Young, Carl S., Author.
- Series:
- Computer Science (SpringerNature-11645)
- Advanced sciences and technologies for security applications 2363-9466
- Advanced Sciences and Technologies for Security Applications, 2363-9466
- Language:
- English
- Subjects (All):
- Computer science.
- Risk management.
- Security systems.
- Criminology.
- Computer Science.
- IT Risk Management.
- Security Science and Technology.
- Crime Control and Security.
- Local Subjects:
- Computer Science.
- IT Risk Management.
- Security Science and Technology.
- Crime Control and Security.
- Physical Description:
- 1 online resource (XXIX, 167 pages) : 69 illustrations, 18 illustrations in color.
- Edition:
- 1st ed. 2022.
- Contained In:
- Springer Nature eBook
- Place of Publication:
- Cham : Springer International Publishing : Imprint: Springer, 2022.
- System Details:
- text file PDF
- Summary:
- This book tackles the problem of complexity within IT environments, id est, "Cybercomplexity," which is generally recognized as a principal source of cybersecurity risk. The book first defines complexity and simplifies its analysis by assuming a probabilistic approach to security risk management. It then proposes a simple model of cybercomplexity that is based on Shannon entropy, a basic concept in information theory. The key drivers of cybercomplexity emerge from this model, where these drivers reveal the scale-dependence of cybersecurity risk and explain why macroscopic security controls are required to address cybersecurity risk on an enterprise scale. The significant operational implications of cybercomplexity are also discussed, thereby providing both a theoretical framework and a practical guide to addressing this longstanding problem in cybersecurity risk management. .
- Contents:
- 1. Risk Fundamentals
- 2. Cyber Security Fundamentals
- 3. Cyber security criteria
- 4. Root Causes of Cyber Security Risk
- 5. IT Environment Risk Factors
- 6. Identity Uncertainty
- 7. Communicator Integrity
- 8. Exploitation of Uncertainty in Identity
- 9. Root Cause Effects and the Exploitation of IT Risk Factors; Compromises of IT Integrity
- 10. Integrity Flaws and Exploitation of Human Vulnerabilities.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-031-06994-9
- 9783031069949
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.