Cyber Security Innovation for the Digital Economy: A Case Study of the Russian Federation

Cyber Security Innovation for the Digital Economy considers possible solutions to the relatively new scientific-technical problem of developing innovative solutions in the field of cyber security for the Digital Economy. The solutions proposed are based on the results of exploratory studies conducte...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Petrenko, Sergei
Format: E-Book
Sprache:Englisch
Veröffentlicht: River Publishers 2020
Schriftenreihe:River publishers series in security and digital forensics
Schlagworte:
ISBN:9788770220224, 8770220220
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Cyber Security Innovation for the Digital Economy considers possible solutions to the relatively new scientific-technical problem of developing innovative solutions in the field of cyber security for the Digital Economy. The solutions proposed are based on the results of exploratory studies conducted by the author in the areas of Big Data acquisition, cognitive information technologies (cogno-technologies), new methods of analytical verification of digital ecosystems on the basis of similarity invariants and dimensions, and “computational cognitivism,” involving a number of existing models and methods. In practice, this successfully allowed the creation of new entities - the required safe and trusted digital ecosystems - on the basis of the development of digital and cyber security technologies, and the resulting changes in their behavioral preferences. Here, the ecosystem is understood as a certain system of organizations, created around a certain Technological Platform that use its services to make the best offers to customers and access to them to meet the ultimate needs of clients - legal entities and individuals. The basis of such ecosystems is a certain technological platform, created on advanced innovative developments, including the open interfaces and code, machine learning, cloud technologies, Big Data collection and processing, artificial intelligence technologies, etc. The mentioned Technological Platform allows creating the best offer for the client both from own goods and services and from the offers of external service providers in real time. This book contains four chapters devoted to the following subjects: • Relevance of the given scientific-technical problems in the cybersecurity of Digital Economy • Determination of the limiting capabilities • Possible scientific and technical solutions • Organization of perspective research studies in the area of Digital Economy cyber security in Russia.
AbstractList 'Cyber Security Innovation for the Digital Economy' considers possible solutions to the relatively new scientific-technical problem of developing innovative solutions in the field of cyber security for the digital economy. The solutions proposed are based on the results of exploratory studies conducted by the author in the areas of Big Data acquisition, cognitive information technologies (cogno-technologies), new methods of analytical verification of digital ecosystems on the basis of similarity invariants and dimensions, and 'computational cognitivism,' involving a number of existing models and methods.
Cyber Security Innovation for the Digital Economy considers possible solutions to the relatively new scientific-technical problem of developing innovative solutions in the field of cyber security for the Digital Economy. The solutions proposed are based on the results of exploratory studies conducted by the author in the areas of Big Data acquisition, cognitive information technologies (cogno-technologies), new methods of analytical verification of digital ecosystems on the basis of similarity invariants and dimensions, and “computational cognitivism,” involving a number of existing models and methods. In practice, this successfully allowed the creation of new entities - the required safe and trusted digital ecosystems - on the basis of the development of digital and cyber security technologies, and the resulting changes in their behavioral preferences. Here, the ecosystem is understood as a certain system of organizations, created around a certain Technological Platform that use its services to make the best offers to customers and access to them to meet the ultimate needs of clients - legal entities and individuals. The basis of such ecosystems is a certain technological platform, created on advanced innovative developments, including the open interfaces and code, machine learning, cloud technologies, Big Data collection and processing, artificial intelligence technologies, etc. The mentioned Technological Platform allows creating the best offer for the client both from own goods and services and from the offers of external service providers in real time. This book contains four chapters devoted to the following subjects: • Relevance of the given scientific-technical problems in the cybersecurity of Digital Economy • Determination of the limiting capabilities • Possible scientific and technical solutions • Organization of perspective research studies in the area of Digital Economy cyber security in Russia.
Author Petrenko, Sergei
Author_xml – sequence: 1
  givenname: Sergei
  surname: Petrenko
  fullname: Petrenko, Sergei
BookMark eNpV0D1PwzAQBmAjQAJKRwY2rwwFnz9ih61KW6hUCYkiJKbKac40NNhSnBTl3xO1XTqdXt3z3nA35MIHj4TcAXsEzuAp1QYYE0JobfgZGfbZaM04Zxz0-Unm8ooMY_xhvWcMJDfX5CvrcqzpEtdtXTYdnXsfdrYpg6cu1LTZIJ2U32VjKzpdBx9-u2c6ppmNSJdNW3Q0uD16b2MsraczLLDe92_JpbNVxOFxDsjnbPqRvY4Wby_zbLwYWQFaJCNkaymS3IHWEqHAIpeYmn5TKLDKicIal-ZKSKedTp3iFkE5meRpyrXiIAbk4XDYxi3-xU2omrjaVZiHsI2rk3_09v5gS0RcHQUHY1Qi_gHPhmCK
ContentType eBook
Copyright 2018 River Publishers
Copyright_xml – notice: 2018 River Publishers
DEWEY 005.8
DOI 10.1201/9781003337782
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9788770220217
8770220212
ExternalDocumentID 9788770220217
9218856
GroupedDBID -VX
38.
AABBV
AAPWI
ABARN
ABAZT
ABCRS
ABEQL
ABMRC
ABQPQ
ACBYE
ACLGV
ACNAM
ACXMI
ADVEM
AERYV
AESSL
AEUHU
AFOJC
AHWGJ
AIXXW
AJFER
ALMA_UNASSIGNED_HOLDINGS
AREVN
AXTGW
AZZ
BBABE
BEFXN
BFFAM
BGNUA
BKEBE
BPBUR
BPEOZ
CZZ
C~9
DUGUG
EBATF
EBBCW
EBSCA
ECNEQ
ECOWB
GEOUK
INALI
JTX
OCL
UCHLF
XI1
ID FETCH-LOGICAL-a31736-e0c436bf1774e1dedb4e98736d51a5f3da8f9b534f7f79f52ae15f46b99275213
ISBN 9788770220224
8770220220
IngestDate Sun Jul 13 06:51:14 EDT 2025
Sun Jun 29 07:32:01 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-a31736-e0c436bf1774e1dedb4e98736d51a5f3da8f9b534f7f79f52ae15f46b99275213
PageCount 0
ParticipantIDs askewsholts_vlebooks_9788770220217
ieee_books_9218856
PublicationCentury 2000
PublicationDate 2020
2018-12-01
PublicationDateYYYYMMDD 2020-01-01
2018-12-01
PublicationDate_xml – year: 2020
  text: 2020
PublicationDecade 2020
2010
PublicationSeriesTitle River publishers series in security and digital forensics
PublicationYear 2020
2018
Publisher River Publishers
Publisher_xml – name: River Publishers
SSID ssj0003001428
Score 2.4721518
Snippet Cyber Security Innovation for the Digital Economy considers possible solutions to the relatively new scientific-technical problem of developing innovative...
'Cyber Security Innovation for the Digital Economy' considers possible solutions to the relatively new scientific-technical problem of developing innovative...
SourceID askewsholts
ieee
SourceType Aggregation Database
Publisher
SubjectTerms Computer security
Computing and Processing
TableOfContents Foreword ix Preface xv Acknowledgements xvii List of Figures xix List of Tables xxvii List of Abbreviations xxix Introduction 1 1 Relevance of Cyber Security Innovations 7 1.1 Digital Transformation of State and Society 7 1.1.1 State Program “Digital Economy” 8 1.1.2 Main Information Infrastructure Development Objectives 28 1.1.3 Implementation of the Long-Term Evolution (LTE) Technology 39 1.1.4 IIoT/IoT Technologies Development 53 1.2 Typical Cyber Security Threats 68 1.2.1 Possible Scenarios of Cyber-Attack on the Information Infrastructure 68 1.2.2 Threats and Consequences of Wireless LAN IEEE 802.1x Implementation 106 1.2.3 Cyber Security Threats of Corporate Digital and IP-ATX (Private Automatic Telephone Exchanges) 117 1.2.4 Threats and Security Profile of the Mobile Operating System OS Sailfish and Tizen 123 1.3 Cyber Security Threats Monitoring Necessity 136 1.3.1 Cyber Security Incidents Factual Account 136 1.3.2 Need for Joint Initiatives of Society and States 144 1.3.3 Capture the Flag Competition on Vulnerability Detection 148 1.3.4 Security Operations Center (SOC) Key Role 150 2 MSSP/MDR National Operator Development 163 2.1 Ultimate Opportunity of National MSSP/MDR Operators 163 2.1.1 Relevance of MSSP/MDR Cyber Security Services 164 2.1.2 MSSP/MDR Best Organization Practice 167 2.1.3 Sample of MSSP by AT&T 171 2.1.4 Sample of MSSP Model by UBIqube 173 2.1.5 Feasible Technical Solutions 174 2.2 Possible Ways of Providing Cyber Security Services 181 2.2.1 Typical MSSR/MDR Services 184 2.2.2 IS Sourcing Model Analysis 192 2.2.3 The IS Sourcing Practice 193 2.2.4 Sample SLA Content for the Provision of Cyber Security Services 200 2.2.5 Best Practices for Providing Cyber Security Service 204 2.3 Development of National MSSP/MDR Based on Big Data 208 2.3.1 Big Data Processing Requirements Analysis 208 2.3.2 Best Big Data Processing Practice 211 2.3.3 MSSP/MDR Subsystem Functionality for Big Data Processing 215 2.3.4 Sensor Cloud Architecture Advantages 219 2.4 New Methods of Cyber Security Knowledge Management 221 2.4.1 Possible State of the Art 221 2.4.2 Cyber Security MDM Principles 228 2.4.3 MDM Cyber Security System Example 230 3 Innovative Methods for Detecting Anomalies 237 3.1 Justification of a New Method for Detecting Anomalies 237 3.1.1 Analysis of the Existing Approaches to the TCP/IP Network Abnormal Functioning Detection 237 3.1.2 Possible Statement of the Detecting Anomalies’ Problem 242 3.1.3 Definition of New Informative Features 244 3.1.4 Detection of Anomalies Based on Dimensions 248 3.1.5 Investigation of Properties of Invariants of Dimension 252 3.2 The Main Provisions of the New Method for Detecting Anomalies 261 3.2.1 The Main Hypotheses for Detecting Anomalies 261 3.2.2 Control of Semantic Correctness Criteria 268 3.2.3 Sufficient Condition for the Criteria Fulfillment 273 3.2.4 Implementation of the New Method of TCP Transport Layer Protocol 277 3.3 Startup of Anomaly Detection Based on Dimensions 283 3.3.1 Possible Architecture Solutions 283 3.3.2 Features of the Transfer and Control Criteria 287 3.3.3 Experiment Results 290 3.3.4 Trends and Development Prospects 293 3.4 New Method of Analytical Verification 299 3.4.1 Data Processing Model on the Example of Oracle Solution 299 3.4.2 Marked Data Visualization 301 3.4.3 Formalization of HTTP and SQL * Net Protocols 304 3.4.4 Presentation of the Transport Layer Protocol (TCP) 309 3.4.5 Presentation of the Networking Layer IP 313 3.4.6 Control of the Platform Semantic Correctness 314 3.4.7 Platform Semantic Correctness Control 317 3.4.8 Verification of Applied Queries 323 3.4.9 TCP Verification 326 3.4.10 IP Verification 327 4 Development of Cyber Security Technologies 335 4.1 Cyber Security R&D Best Practice 335 4.1.1 Cyber Security R&D Importance 336 4.1.2 Cyber Security Project Management 340 4.1.3 New Cyber Security Problems Statement 344 4.2 Development of the Cyber Security Requirements in Terms of GOST R IEC 61508 346 4.2.1 Analysis of the Cyber Security Requirements 346 4.2.2 Need for GOST R IEC 61508 Development 351 4.2.3 Method for Anomaly Detection in the CF CPCS Behavior 355 4.3 Creation of New Cyber Security Ontologies 362 4.3.1 Analysis of New Requirements of Cyber Security 362 4.3.2 Known Cyber Security Ontologies 365 4.3.3 Proposed Cyber Security Ontology 373 4.3.4 Ontology Structure Example 379 4.4 Development of Cyber Security Platforms 385 4.4.1 Principles of Designing Special Computing Systems 386 4.4.2 Feasible Computing Classifications 390 4.4.3 Characteristics of the Known Computing Systems 395 4.4.4 Development of the Supercomputer Technologies 398 4.5 Security Software Development based on Agile Methodology 406 4.5.1 Main Ideas and Principles of the Agile Methodology 406 4.5.2 Best Practices of Agile Methodology 407 4.5.3 Adapting Agile for Secure Application Development 409 4.6 Development of BI-platforms for Cyber Security Predictive Analytics 414 4.6.1 BI-security Platform Requirements 415 4.6.2 BI Security Platform Startup 419 4.6.3 Expected Results 426 Conclusion 433 References 441 Index 455 About the Author 457
Title Cyber Security Innovation for the Digital Economy: A Case Study of the Russian Federation
URI https://ieeexplore.ieee.org/servlet/opac?bknumber=9218856
https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9788770220217&uid=none
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3JTsMwELWgcKAXdlE2WYhrROMsTrghdoEAlYLgVMWxjaqiFDVt1f49M66bLnDhwMVK7CiW_Cx7PJ55j5DjhIXacxPpCKY8B21yRwitnaoPm3MomVQmmvD1nj88RG9v8ZPlvc2NnADPsmgwiL_-FWqoA7AxdfYPcBc_hQp4BtChBNihnLOIi1dLNDAUqmMd6GBa3xZ6p0Uo4UXzAzVCbDby0Galwz5mwgmH43iBWi83qZVXSDQxc1OP-lsqaxn36jPmbTanvQasOuc1qGHQx1Tk_cypMuIc82_ZKLn5xxrLDLc_cmWhEJzH-Ug9aI62OgbbIQrCRbLIQ1h5lq4vH1_uCu-Xh0czFqFg4rgzS8A16dwyokJ3JzOdlUk5yVuwBcD20M1nVHGMUVBfI0sKM0XWyYLKNsjqWB-D2uVyk7wbROgYETpBhAIiFIaaWkSoReSUnlHEgxo8aFubjywedILHFnm9uqyf3zhWysJJwEDzQkdVU5j7QrtgbitXKil8FUfQIgM3CbQnk0jHIvB8zTWPdcAS5QbaD0UcMw4mlrdNSlk7UzuE-hJJ1AQcnoMU_aJJkGoGfxWhFqniskKOpsan0f801-55Y2pwXV4h6zhsDds0Amv3t8o9sjKZQPuk1O301AFZTvvdZt45tMB-AycbMME
linkProvider ProQuest Ebooks
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Cyber+Security+Innovation+for+the+Digital+Economy%3A+A+Case+Study+of+the+Russian+Federation&rft.au=Petrenko%2C+Sergei&rft.date=2020-01-01&rft.pub=River+Publishers&rft.isbn=9788770220224&rft_id=info:doi/10.1201%2F9781003337782&rft.externalDocID=9218856
thumbnail_m http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97887702%2F9788770220217.jpg