Cyber Security Innovation for the Digital Economy: A Case Study of the Russian Federation

Cyber Security Innovation for the Digital Economy considers possible solutions to the relatively new scientific-technical problem of developing innovative solutions in the field of cyber security for the Digital Economy. The solutions proposed are based on the results of exploratory studies conducte...

Celý popis

Uloženo v:
Podrobná bibliografie
Hlavní autor: Petrenko, Sergei
Médium: E-kniha
Jazyk:angličtina
Vydáno: River Publishers 2020
Edice:River publishers series in security and digital forensics
Témata:
ISBN:9788770220224, 8770220220
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Obsah:
  • Foreword ix Preface xv Acknowledgements xvii List of Figures xix List of Tables xxvii List of Abbreviations xxix Introduction 1 1 Relevance of Cyber Security Innovations 7 1.1 Digital Transformation of State and Society 7 1.1.1 State Program “Digital Economy” 8 1.1.2 Main Information Infrastructure Development Objectives 28 1.1.3 Implementation of the Long-Term Evolution (LTE) Technology 39 1.1.4 IIoT/IoT Technologies Development 53 1.2 Typical Cyber Security Threats 68 1.2.1 Possible Scenarios of Cyber-Attack on the Information Infrastructure 68 1.2.2 Threats and Consequences of Wireless LAN IEEE 802.1x Implementation 106 1.2.3 Cyber Security Threats of Corporate Digital and IP-ATX (Private Automatic Telephone Exchanges) 117 1.2.4 Threats and Security Profile of the Mobile Operating System OS Sailfish and Tizen 123 1.3 Cyber Security Threats Monitoring Necessity 136 1.3.1 Cyber Security Incidents Factual Account 136 1.3.2 Need for Joint Initiatives of Society and States 144 1.3.3 Capture the Flag Competition on Vulnerability Detection 148 1.3.4 Security Operations Center (SOC) Key Role 150 2 MSSP/MDR National Operator Development 163 2.1 Ultimate Opportunity of National MSSP/MDR Operators 163 2.1.1 Relevance of MSSP/MDR Cyber Security Services 164 2.1.2 MSSP/MDR Best Organization Practice 167 2.1.3 Sample of MSSP by AT&T 171 2.1.4 Sample of MSSP Model by UBIqube 173 2.1.5 Feasible Technical Solutions 174 2.2 Possible Ways of Providing Cyber Security Services 181 2.2.1 Typical MSSR/MDR Services 184 2.2.2 IS Sourcing Model Analysis 192 2.2.3 The IS Sourcing Practice 193 2.2.4 Sample SLA Content for the Provision of Cyber Security Services 200 2.2.5 Best Practices for Providing Cyber Security Service 204 2.3 Development of National MSSP/MDR Based on Big Data 208 2.3.1 Big Data Processing Requirements Analysis 208 2.3.2 Best Big Data Processing Practice 211 2.3.3 MSSP/MDR Subsystem Functionality for Big Data Processing 215 2.3.4 Sensor Cloud Architecture Advantages 219 2.4 New Methods of Cyber Security Knowledge Management 221 2.4.1 Possible State of the Art 221 2.4.2 Cyber Security MDM Principles 228 2.4.3 MDM Cyber Security System Example 230 3 Innovative Methods for Detecting Anomalies 237 3.1 Justification of a New Method for Detecting Anomalies 237 3.1.1 Analysis of the Existing Approaches to the TCP/IP Network Abnormal Functioning Detection 237 3.1.2 Possible Statement of the Detecting Anomalies’ Problem 242 3.1.3 Definition of New Informative Features 244 3.1.4 Detection of Anomalies Based on Dimensions 248 3.1.5 Investigation of Properties of Invariants of Dimension 252 3.2 The Main Provisions of the New Method for Detecting Anomalies 261 3.2.1 The Main Hypotheses for Detecting Anomalies 261 3.2.2 Control of Semantic Correctness Criteria 268 3.2.3 Sufficient Condition for the Criteria Fulfillment 273 3.2.4 Implementation of the New Method of TCP Transport Layer Protocol 277 3.3 Startup of Anomaly Detection Based on Dimensions 283 3.3.1 Possible Architecture Solutions 283 3.3.2 Features of the Transfer and Control Criteria 287 3.3.3 Experiment Results 290 3.3.4 Trends and Development Prospects 293 3.4 New Method of Analytical Verification 299 3.4.1 Data Processing Model on the Example of Oracle Solution 299 3.4.2 Marked Data Visualization 301 3.4.3 Formalization of HTTP and SQL * Net Protocols 304 3.4.4 Presentation of the Transport Layer Protocol (TCP) 309 3.4.5 Presentation of the Networking Layer IP 313 3.4.6 Control of the Platform Semantic Correctness 314 3.4.7 Platform Semantic Correctness Control 317 3.4.8 Verification of Applied Queries 323 3.4.9 TCP Verification 326 3.4.10 IP Verification 327 4 Development of Cyber Security Technologies 335 4.1 Cyber Security R&D Best Practice 335 4.1.1 Cyber Security R&D Importance 336 4.1.2 Cyber Security Project Management 340 4.1.3 New Cyber Security Problems Statement 344 4.2 Development of the Cyber Security Requirements in Terms of GOST R IEC 61508 346 4.2.1 Analysis of the Cyber Security Requirements 346 4.2.2 Need for GOST R IEC 61508 Development 351 4.2.3 Method for Anomaly Detection in the CF CPCS Behavior 355 4.3 Creation of New Cyber Security Ontologies 362 4.3.1 Analysis of New Requirements of Cyber Security 362 4.3.2 Known Cyber Security Ontologies 365 4.3.3 Proposed Cyber Security Ontology 373 4.3.4 Ontology Structure Example 379 4.4 Development of Cyber Security Platforms 385 4.4.1 Principles of Designing Special Computing Systems 386 4.4.2 Feasible Computing Classifications 390 4.4.3 Characteristics of the Known Computing Systems 395 4.4.4 Development of the Supercomputer Technologies 398 4.5 Security Software Development based on Agile Methodology 406 4.5.1 Main Ideas and Principles of the Agile Methodology 406 4.5.2 Best Practices of Agile Methodology 407 4.5.3 Adapting Agile for Secure Application Development 409 4.6 Development of BI-platforms for Cyber Security Predictive Analytics 414 4.6.1 BI-security Platform Requirements 415 4.6.2 BI Security Platform Startup 419 4.6.3 Expected Results 426 Conclusion 433 References 441 Index 455 About the Author 457