Limit search to available items
Book Cover
E-book
Author Maglaras, Leandros

Title Cybersecurity Issues in Emerging Technologies
Published Milton : Taylor & Francis Group, 2021

Copies

Description 1 online resource (227 p.)
Contents Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Foreword -- Preface -- Editors -- Contributors -- Chapter 1 The Evolution of Hardware-Assisted Security -- 1.1 Introduction -- 1.2 Threat Landscape -- 1.2.1 Common Software Vulnerabilities -- 1.2.2 Software Exploitation -- 1.3 Security Mechanisms in Hardware -- 1.3.1 Protection Rings -- 1.3.2 Supervisor Mode Execute/Access Prevention -- 1.3.3 Data Execution Prevention -- 1.3.4 Intel Memory Protection Extensions -- 1.3.5 Intel Memory Protection Keys -- 1.3.6 ARM Memory Tagging -- 1.3.7 Instruction Set Randomization
1.3.8 Control-Flow Integrity -- 1.3.8.1 Intel Control-flow Enforcement Technology -- 1.3.8.2 ARM Pointer Integrity -- 1.4 Trusted Execution Environments -- 1.4.1 Execute Only Memory -- 1.4.2 Aegis -- 1.4.3 ARM TrustZone -- 1.4.4 Intel Software Guard Extensions -- 1.5 Hardware Vulnerabilities -- 1.5.1 Transient Instruction Execution -- 1.5.2 Cache as a Side-Channel -- 1.5.3 Proposed Defenses -- 1.6 Conclusion -- References -- Chapter 2 Cybersecurity of the Unmanned Ship -- 2.1 Introduction -- 2.2 Architectural Views -- 2.2.1 TheExtended Maritime Architecture Framework
2.2.2 The CPSs of the Unmanned Ship -- 2.3 Cyber Risks of the Unmanned Ship -- 2.4 Cybersecurity Requirements for the Unmanned Ship -- 2.5 Treating the Cyber Risk of the Unmanned Ship -- 2.6 Conclusions -- References -- Chapter 3 Agile Incident Response in Industrial Control Environments -- 3.1 Introduction -- 3.2 Complying with Legal Requirements and Guidance for Operators -- 3.3 Current Issues in Managing Incidents in Industrial Control Environments -- 3.4 Agile Approach to Incident Management -- 3.5 Assessment Event -- 3.5.1 The Scenario -- 3.5.2 Blue Team Composition
3.5.3 Agile Methodologies -- 3.5.3.1 Sprints -- 3.5.3.2 Sprint Planning -- 3.5.3.3 Sprint Retrospectives -- 3.5.3.4 Scrum Meetings -- 3.5.4 Task Allocation -- 3.5.4.1 Self-Selection of Tasks -- 3.5.4.2 T-Shaped Team -- 3.5.5 Agile Tools -- 3.5.5.1 Incident Backlog -- 3.5.5.2 Scrum Board -- 3.5.5.3 Learning Matrix -- 3.5.6 Event Questionnaires -- 3.6 Discussion and Conclusions -- 3.7 Glossary -- References -- Chapter 4 Multi-Stage Threat Modeling and Security Monitoring in 5GCN -- 4.1 Introduction -- 4.2 Related Work -- 4.2.1 5GCN Threats -- 4.2.2 Multi-Stage Attack Modeling
4.3 Threat Modeling of the 5GCN -- 4.3.1 Identification -- 4.3.2 Threat Decomposition -- 4.3.3 Modeling 5GCN Threats as Graphs -- 4.3.4 A 5GCN Threat Graph Example -- 4.4 Graph-Based Security Monitoring for the 5GCN Infrastructure -- 4.5 Open Research Challenges and Future Work -- 4.5.1 Detection of Multi-Stage Attack Scenarios -- 4.5.2 A Centralized Threat Detection Engine -- 4.5.3 A 5G Network TTP Matrix -- Note -- References -- Chapter 5 Blockchain Technology for 6G Communication Networks: A Vision for the Future -- 5.1 Introduction -- 5.1.1 Blockchain Overview
Notes Description based upon print version of record
5.1.1.1 Blockchain Technology Architecture
Subject Computer security.
Computer security
Form Electronic book
Author Kantzavelou, Ioanna
ISBN 9781000459210
1000459217