Book description
This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats.
This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity threats. The author builds from a common understanding based on previous class-tested works to introduce the reader to the current and newly innovative approaches to address the maliciously-by-human-created (rather than by-chance-occurring) vulnerability and threat, and related cost-effective management to mitigate such risk. This book is purely statistical data-oriented (not deterministic) and employs computationally intensive techniques, such as Monte Carlo and Discrete Event Simulation. The enriched JAVA ready-to-go applications and solutions to exercises provided by the author at the book’s specifically preserved website will enable readers to utilize the course related problems.
• Enables the reader to use the book's website's applications to implement and see results, and use them making ‘budgetary’ sense
• Utilizes a data analytical approach and provides clear entry points for readers of varying skill sets and backgrounds
• Developed out of necessity from real in-class experience while teaching advanced undergraduate and graduate courses by the author
Cyber-Risk Informatics is a resource for undergraduate students, graduate students, and practitioners in the field of Risk Assessment and Management regarding Security and Reliability Modeling.
Mehmet Sahinoglu, a Professor (1990) Emeritus (2000), is the founder of the Informatics Institute (2009) and its SACS-accredited (2010) and NSA-certified (2013) flagship Cybersystems and Information Security (CSIS) graduate program (the first such full degree in-class program in Southeastern USA) at AUM, Auburn University’s metropolitan campus in Montgomery, Alabama. He is a fellow member of the SDPS Society, a senior member of the IEEE, and an elected member of ISI. Sahinoglu is the recipient of Microsoft's Trustworthy Computing Curriculum (TCC) award and the author of Trustworthy Computing (Wiley, 2007).
Table of contents
- COVER
- TITLE PAGE
- ABOUT THE COVER
- PROLOGUE
- REVIEWS
- PREFACE
- ACKNOWLEDGMENTS AND DEDICATION
- ABOUT THE AUTHOR
-
1 METRICS, STATISTICAL QUALITY CONTROL, AND BASIC RELIABILITY IN CYBER-RISK
- 1.1 DETERMINISTIC AND STOCHASTIC CYBER-RISK METRICS
- 1.2 STATISTICAL RISK ANALYSIS
- 1.3 ACCEPTANCE SAMPLING IN QUALITY CONTROL
- 1.4 POISSON AND NORMAL APPROXIMATION TO BINOMIAL IN QUALITY CONTROL
- 1.5 BASIC STATISTICAL RELIABILITY CONCEPTS AND MC SIMULATORS
- 1.6 DISCUSSIONS AND CONCLUSION
- 1.7 EXERCISES
- REFERENCES
-
2 COMPLEX NETWORK RELIABILITY EVALUATION AND ESTIMATION IN CYBER-RISK
- 2.1 INTRODUCTION
- 2.2 OVERLAP TECHNIQUE TO CALCULATE COMPLEX NETWORK RELIABILITY
- 2.3 THE OVERLAP METHOD: MONTE CARLO AND DISCRETE EVENT SIMULATION
- 2.4 MULTISTATE SYSTEM RELIABILITY EVALUATION
- 2.5 WEIBULL TIME DISTRIBUTED RELIABILITY EVALUATION
- 2.6 DISCUSSIONS AND CONCLUSION
- APPENDIX 2.A OVERLAP ALGORITHM AND EXAMPLE
- 2.7 EXERCISES
- REFERENCES
- 3 STOPPING RULES FOR RELIABILITY AND SECURITY TESTS IN CYBER-RISK
-
4 SECURITY ASSESSMENT AND MANAGEMENT IN CYBER-RISK
- 4.1 INTRODUCTION
- 4.2 SECURITY METER (SM) MODEL DESIGN
- 4.3 VERIFICATION OF THE PROBABILISTIC SECURITY METER (SM) METHOD BY MONTE CARLO SIMULATION AND MATH-STATISTICAL TRIPLE-PRODUCT RULE
- 4.4 MODIFYING THE SM QUANTITATIVE MODEL FOR CATEGORICAL, HYBRID, AND NONDISJOINT DATA
- 4.5 MAINTENANCE PRIORITY DETERMINATION FOR 3 × 3 × 2 SM
- 4.6 PRIVACY METER (PM): HOW TO QUANTIFY PRIVACY BREACH
- 4.7 POLISH DECODING (DECOMPRESSION) ALGORITHM
- 4.8 DISCUSSIONS AND CONCLUSION
- 4.9 EXERCISES
- REFERENCES
-
5 GAME-THEORETIC COMPUTING IN CYBER-RISK
- 5.1 HISTORICAL PERSPECTIVE TO GAME THEORY’S ORIGINS
- 5.2 APPLICATIONS OF GAME THEORY TO CYBER-SECURITY RISK
- 5.3 INTUITIVE BACKGROUND: CONCEPTS, DEFINITIONS, AND NOMENCLATURE
- 5.4 RANDOM SELECTION FOR NASH MIXED STRATEGY
- 5.5 ADVERSARIAL RISK ANALYSIS MODELS BY BANKS, RIOS, AND RIOS
- 5.6 AN ALTERNATIVE MODEL: SAHINOGLU’S SECURITY METER FOR NEUMANN AND NASH MIXED STRATEGY
- 5.7 OTHER INTERDISCIPLINARY APPLICATIONS OF RISK METERS
- 5.8 MIXED STRATEGY FOR RISK ASSESSMENT AND MANAGEMENT- UNIVERSITY SERVER AND SOCIAL NETWORK EXAMPLES
- 5.9 APPLICATION TO HOSPITAL HEALTHCARE SERVICE RISK
- 5.10 APPLICATION TO ENVIRONMETRICS AND ECOLOGY RISK
- 5.11 APPLICATION TO DIGITAL FORENSICS SECURITY RISK
- 5.12 APPLICATION TO BUSINESS CONTRACTING RISK
- 5.13 APPLICATION TO NATIONAL CYBERSECURITY RISK
- 5.14 APPLICATION TO AIRPORT SERVICE QUALITY RISK
- 5.15 APPLICATION TO OFFSHORE OIL-DRILLING SPILL AND SECURITY RISK
- 5.16 DISCUSSIONS AND CONCLUSION
- 5.17 EXERCISES
- REFERENCES
-
6 MODELING AND SIMULATION IN CYBER-RISK
- 6.1 INTRODUCTION AND A BRIEF HISTORY TO SIMULATION
- 6.2 GENERIC THEORY: CASE STUDIES ON GOODNESS OF FIT FOR UNIFORM NUMBERS
- 6.3 WHY CRUCIAL TO MANUFACTURING AND CYBER DEFENSE
- 6.4 A CROSS SECTION OF MODELING AND SIMULATION IN MANUFACTURING INDUSTRY
- 6.5 A REVIEW OF MODELING AND SIMULATION IN CYBER-SECURITY
- 6.6 APPLICATION OF QUEUING THEORY AND MULTICHANNEL SIMULATION TO CYBER-SECURITY
- 6.7 DISCUSSIONS AND CONCLUSION
- APPENDIX 6.A
- 6.8 EXERCISES
- REFERENCES
-
7 CLOUD COMPUTING IN CYBER-RISK
- 7.1 INTRODUCTION AND MOTIVATION
- 7.2 CLOUD COMPUTING RISK ASSESSMENT
- 7.3 MOTIVATION AND METHODOLOGY
- 7.4 VARIOUS APPLICATIONS TO CYBER SYSTEMS
- 7.5 LARGE CYBER SYSTEMS USING STATISTICAL METHODS
- 7.6 REPAIR CREW AND PRODUCT RESERVE PLANNING TO MANAGE RISK COST EFFECTIVELY USING CYBERRISKSOLVER CLOUD MANAGEMENT JAVA TOOL
- 7.7 REMARKS FOR “PHYSICAL CLOUD” EMPLOYING PHYSICAL PRODUCTS (SERVERS, GENERATORS, COMMUNICATION TOWERS, ETC.)
- 7.8 APPLICATIONS TO “SOCIAL (HUMAN RESOURCES) CLOUD”
- 7.9 STOCHASTIC CLOUD SYSTEM SIMULATION
- 7.10 CLOUD RISK METER ANALYSIS
- 7.11 DISCUSSIONS AND CONCLUSION
- 7.12 EXERCISES
- REFERENCES
-
8 SOFTWARE RELIABILITY MODELING AND METRICS IN CYBER-RISK
- 8.1 INTRODUCTION, MOTIVATION, AND METHODOLOGY
- 8.2 HISTORY AND CLASSIFICATION OF SOFTWARE RELIABILITY MODELS
- 8.3 SOFTWARE RELIABILITY MODELS IN TIME DOMAIN
- 8.4 SOFTWARE RELIABILITY GROWTH MODELS
- 8.5 NUMERICAL EXAMPLES USING PEDAGOGUES
- 8.6 RECENT TRENDS IN SOFTWARE RELIABILITY
- 8.7 DISCUSSIONS AND CONCLUSION
- 8.8 EXERCISES
- REFERENCES
- 9 METRICS FOR SOFTWARE RELIABILITY FAILURE-COUNT MODELS IN CYBER-RISK
- 10 PRACTICAL HANDS-ON LAB TOPICS IN CYBER-RISK
- WHAT THE CYBER-RISK INFORMATICS TEXTBOOK AND THE AUTHOR ARE ABOUT?
- INDEX
- END USER LICENSE AGREEMENT
Product information
- Title: Cyber-Risk Informatics
- Author(s):
- Release date: May 2016
- Publisher(s): Wiley
- ISBN: 9781119087519
You might also like
book
PowerShell Cookbook, 4th Edition
How do you use PowerShell to navigate the filesystem, manage files and folders, or retrieve a …
book
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in …
book
Generative Deep Learning, 2nd Edition
Generative AI is the hottest topic in tech. This practical book teaches machine learning engineers and …
book
Ransomware Protection Playbook
Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. …