Limit search to available items
Book Cover
E-book
Author Küfeoğlu, Sinan

Title Cyber Resilience in Critical Infrastructure
Published Milton : Taylor & Francis Group, 2023

Copies

Description 1 online resource (275 p.)
Contents Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Acknowledgements -- About the Authors -- Preface -- 1 Critical Infrastructure and Cyber Resilience Frameworks -- 1.1 Cyber Resilience Framework Overview -- 1.1.1 Governance and Management -- 1.1.2 Identify -- 1.1.3 Protect -- 1.1.4 Detect -- 1.1.5 Respond -- 1.1.6 Recover -- 1.2 Identify Critical Assets, Systems, and Data -- 1.2.1 Methods for Identifying -- 1.2.2 Identify Process Based on FMI Example -- 1.2.2.1 Development -- 1.2.2.2 Advancement -- 1.2.2.3 Innovation -- 1.3 Protect Critical Infrastructure Services
1.3.1 Enhancement of the Protection of Critical Infrastructure -- 1.3.2 Zero-Trust Approach -- 1.3.3 Protect Process Based on FMI Example -- 1.4 Detect Suspected Data Breaches or Leaks -- 1.4.1 Methods for Detecting -- 1.4.2 Detection Process -- 1.4.3 Detect Process Based on FMI Example -- 1.5 Respond to a Detected Security Breach -- 1.5.1 Incident Response Teams -- 1.5.2 Response Plan -- 1.5.3 Common Sorts of Cyberattacks -- 1.5.3.1 Insider Attacks -- 1.5.3.2 Social Engineering -- 1.5.3.3 Malware Attacks -- 1.5.4 Response Types -- 1.5.4.1 Technical Response -- 1.5.4.2 Management Response
1.5.4.3 Communications Response -- 1.5.4.4 Legal Response -- 1.5.5 Incident Response Lifecycle -- 1.5.5.1 Preparation -- 1.5.5.2 Detection -- 1.5.5.3 Containment, Eradication, and Recovery -- 1.5.5.4 Post-Incident Activity -- 1.6 Recover to Restore During a Cybersecurity Incident -- 1.6.1 Determining a Recovery Strategy -- 1.6.1.1 Hot Site -- 1.6.1.2 Cold Site -- 1.6.1.3 Warm Site -- 1.6.1.4 Defining RPO and RTO -- 1.6.2 Recovery Plan Creation -- 1.6.2.1 Possible Effective Solutions for Incidents -- 1.6.2.2 Identify and Evaluate -- 1.6.2.3 Create -- 1.6.2.4 Training & Development
1.6.2.5 Additional Suggestions -- 1.6.3 Plan Testing -- 1.7 Other Frameworks -- 1.7.1 Center for Internet Security (CIS) Critical Security Controls -- 1.7.2 The Center on Local Government Research Framework -- 1.7.3 ISO 27001 and ISO 27002 (International Organisation for Standardisation) -- 1.7.4 Payment Card Industry Data Security Standard (PCI DSS) -- 1.7.5 Less commonly Used Frameworks -- 1.7.5.1 Control Objectives for Information Technology (COBIT) -- 1.7.5.2 Health Information Trust Alliance Cybersecurity Framework (HITRUST CSF) -- 1.7.5.3 Cybersecurity Maturity Model Certification (CMMC)
1.7.5.4 Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) -- References -- 2 Emergency Services Sector -- 2.1 What is Emergency Services as an Infrastructure? -- 2.2 Why are Emergency Services Important? -- 2.3 Key Players and Stakeholders -- 2.4 Cyber Resilience in Emergency Services Infrastructure -- 2.5 Case Studies -- 2.5.1 Case 1: BlueLeaks -- 2.5.2 Case 2: Baltimore's Emergency System -- 2.5.3 Case 3: DC Metropolitan Police Department -- 2.5.4 Case 4: AAA Ambulance Service -- References -- 3 Energy Sector -- 3.1 What is Energy as an Infrastructure?
Notes Description based upon print version of record
3.2 Why is Energy Infrastructure Important?
Subject Computer security.
Data protection.
Environmental management.
Environmental policy.
environmental control.
environmental policy.
Form Electronic book
Author Akgün, Abdullah Talip
ISBN 9781000983630
1000983633