Advertisement

Managing Cyber Threats

Issues, Approaches, and Challenges

  • Vipin Kumar
  • Jaideep Srivastava
  • Aleksandar Lazarevic

Part of the Massive Computing book series (MACO, volume 5)

Table of contents

  1. Front Matter
    Pages i-xvii
  2. Overview

    1. Bhavani Thuraisingham
      Pages 3-17
    2. Aleksandar Lazarevic, Vipin Kumar, Jaideep Srivastava
      Pages 19-78
  3. Data Mining Based Analysis of Computer Attacks

  4. Techniques for Managing Cyber Vulnerabilities and Alerts

    1. Vincent H. Berk, George V. Cybenko, Robert S. Gray
      Pages 147-180
    2. Richard A. Kemmerer, Giovanni Vigna
      Pages 181-219
    3. Shambhu Upadhyaya, Ramkumar Chinchani, Kiran Mantha, Kevin Kwiat
      Pages 221-245
    4. Sushil Jajodia, Steven Noel, Brian O’Berry
      Pages 247-266
    5. Robert L. Grossman
      Pages 281-291
  5. Cyber Forensics

    1. Erin E. Kenneally, Tony Fountain
      Pages 295-311
    2. Jau-Hwang Wang
      Pages 313-330

About this book

Introduction

Modern society depends critically on computers that control and manage systems on which we depend in many aspects of our daily lives. While this provides conveniences of a level unimaginable just a few years ago, it also leaves us vulnerable to attacks on the computers managing these systems. In recent times the explosion in cyber attacks, including viruses, worms, and intrusions, has turned this vulnerability into a clear and visible threat. Due to the escalating number and increased sophistication of cyber attacks, it has become important to develop a broad range of techniques, which can ensure that the information infrastructure continues to operate smoothly, even in the presence of dire and continuous threats.

This book brings together the latest techniques for managing cyber threats, developed by some of the world’s leading experts in the area. The book includes broad surveys on a number of topics, as well as specific techniques. It provides an excellent reference point for researchers and practitioners in the government, academic, and industrial communities who want to understand the issues and challenges in this area of growing worldwide importance.

 

Audience

This book is intended for members of the computer security research and development community interested in state-of-the-art techniques; personnel in federal organizations tasked with managing cyber threats and information leaks from computer systems; personnel at the military and intelligence agencies tasked with defensive and offensive information warfare; personnel in the commercial sector tasked with detection and prevention of fraud in their systems; and personnel running large-scale data centers, either for their organization or for others, tasked with ensuring the security, integrity, and availability of data.

Keywords

Internet data mining database security

Editors and affiliations

  • Vipin Kumar
    • 1
  • Jaideep Srivastava
    • 1
  • Aleksandar Lazarevic
    • 1
  1. 1.University of MinnesotaUSA

Bibliographic information

  • DOI https://doi.org/10.1007/b104908
  • Copyright Information Springer Science+Business Media, Inc. 2005
  • Publisher Name Springer, Boston, MA
  • eBook Packages Computer Science
  • Print ISBN 978-0-387-24226-2
  • Online ISBN 978-0-387-24230-9
  • Series Print ISSN 0924-6703
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace
Engineering