ebook img

Cybersecurity in Digital Transformation: Scope and Applications PDF

126 Pages·2020·2.444 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Cybersecurity in Digital Transformation: Scope and Applications

SPRINGER BRIEFS ON CYBER SECURITY SYSTEMS AND NETWORKS Dietmar P.F. Möller Cybersecurity in Digital Transformation Scope and Applications SpringerBriefs on Cyber Security Systems and Networks Editor-in-Chief Yang Xiang, Digital Research and Innovation Capability Platform, Swinburne University of Technology, Hawthorn, Melbourne, VIC, Australia Series editors Liqun Chen , Department of Computer Science, University of Surrey, Guildford, Surrey, UK Kim-Kwang Raymond Choo , Department of Information Systems, University of Texas at San Antonio, San Antonio,TX, USA Sherman S. M. Chow , Department of Information Engineering, The Chinese University of Hong Kong, Shatin, Hong Kong Robert H. Deng , School of Information Systems, Singapore Management University, Singapore, Singapore Dieter Gollmann, Hamburg University of Technology, Hamburg, Germany Kuan-Ching Li, Department of Computer Science and Information Engineering, Providence University, Taichung, Taiwan Javier Lopez, Computer Science Department, University of Málaga, Málaga, Spain Kui Ren, University at Buffalo, Buffalo, NY, USA Jianying Zhou , Infocomm Security Department, Institute for Infocomm Research, Singapore, Singapore The series aims to develop and disseminate an understanding of innovations, paradigms, techniques, and technologies in the contexts of cyber security systems and networks related research and studies. It publishes thorough and cohesive overviews of state-of-the-art topics in cyber security, as well as sophisticated techniques, original research presentations and in-depth case studies in cyber systems and networks. The series also provides a single point of coverage of advanced and timely emerging topics as well as a forum for core concepts that may not have reached a level of maturity to warrant a comprehensive textbook. It addresses security, privacy, availability, and dependability issues for cyber systems and networks, and welcomes emerging technologies, such as artificial intelligence, cloud computing, cyber physical systems, and big data analytics related to cyber security research. The mainly focuses on the following research topics: Fundamentals and theories • Cryptography for cyber security • Theories of cyber security • Provable security Cyber Systems and Networks • Cyber systems security • Network security • Security services • Social networks security and privacy • Cyber attacks and defense • Data-driven cyber security • Trusted computing and systems Applications and others • Hardware and device security • Cyber application security • Human and social aspects of cyber security More information about this series at http://www.springer.com/series/15797 Dietmar P. F. Möller Cybersecurity in Digital Transformation Scope and Applications Dietmar P. F. Möller Computer Engineering Clausthal University of Technology Clausthal-Zellerfeld, Germany ISSN 2522-5561 ISSN 2522-557X (electronic) SpringerBriefs on Cyber Security Systems and Networks ISBN 978-3-030-60569-8 ISBN 978-3-030-60570-4 (eBook) https://doi.org/10.1007/978-3-030-60570-4 © The Author(s), under exclusive license to Springer Nature Switzerland AG 2020 This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors, and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Switzerland AG The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland Foreword Modern market dynamics are reviving up the industry. New industry is turning more to the combine of automation and information technology, in order to improve quality, productivity, safety, speed, competitiveness, flexibilities, and reducing costs. The recent innovations on digital transformation have been at the forefront in setting a new industrial model, which is named as fourth Industrial Revolution in Germany today. The German Industry 4.0 raised new intelligent applications, such as intelligent manufacturing, powered by different advanced technologies as intelligent and con- nected components from the cyber and the physical world, which have to be designed by security measures to prevent cyber threat attacks by cyber-criminals. Beside this, security against cyber-criminal threat attacks is an essential issue in the data processing through various intelligent network and communication systems. This book shows the importance and the basic concept of cybersecurity, a systematic overview of the latest development in methods and technologies, and provides a whole framework of cybersecurity in digital transformation. The con- cepts of threat intelligence, intrusion detection and prevention, machine learning and deep learning, attack models and scenarios, cybersecurity ontology, and challenges for cybersecurity leadership are introduced, and discussed in detail. Author has also analyzed the threat intelligence, how to prevent threat intrusion detection, system complexity under varying constrains and scenarios in intelli- gent manufacturing. In this context, the Sino-German Lighthouse Cooperation project TEDUNET with its focus on Intelligent Manufacturing, supported by the Chinese Ministry of Industry and Information Technology (MIIT), should be mentioned. The TEDUNET project is between Zhengzhou University (ZZU), China, and Technology University Clausthal (TUC), Germany, and focus on CPS, cybersecurity in intelligent manu- facturing. Cybersecurity and intelligent manufacturing are two important issues in Chinese national policy. I have studied many from the draft of this book! I think this book has shown many creative ideas of ongoing research work and fundamentals focusing on cybersecurity in digital transformation, which are derived from the practices by authors in TU Claustahl. The chapters of this book are well written and organized, showing the deep understanding thorough professional v vi Foreword knowledge about the cybersecurity. Therefore, I would like to strongly recommend: this book should be looked as a very important book or textbook to gain knowledge in cybersecurity in digital transformation. Foreword vii Sino-German Institute, Zhengzhou University Weiyan Hou Zhengzhou, Henan, China Preface The goal of this monograph is to provide a comprehensive, in-depth, and state-of- the-art summary of cybersecurity in the era of digital transformation, which has achieved great interest recently, particularly in public and private organizations. The monograph provides a systematic overview of the latest development in methods and technologies in cybersecurity in the era of digital transformation with the focus on cybersecurity, threat intelligence, intrusion detection and prevention, machine learning and deep learning, attack models and scenarios, cybersecurity ontology, and challenges for cybersecurity leadership. Thus, the monograph provides a frame- work within which the reader can assimilate the associated requirements. Without such a reference, the practitioner is left to ponder the plethora of terms, standards, and practices that have been developed independently and that often lack cohesion, particularly in nomenclature and emphasis. Therefore, this monograph is intended to both cover all aspects of cybersecurity in digital transformation and to provide a framework for consideration of the many issues associated with cybersecurity in digital transformation. The outline is as follows: Chapter 1 describes the importance of cybersecurity in the era of digital transfor- mation with regard to the impact of the fourth technological wave and their impor- tance to circular economy. Chapter 2 provides the relevant cybersecurity background which is among the most important board-level issues for nearly every public and private organization. Thus, the protection of data, generated in connected digital transformative environ- ments, accessible from any location and at any time, is important in order to stay secure through cybersecurity methods. Chapter 3 introduces threat intelligence as an evidence-based knowledge that allows preventing or mitigating cyber threat attacks to data. Threat intelligence results in methods of informed decisions about security by answering questions such as who is attacking, what is attacker’s motivation as well as capability, and others. This requires a detailed analysis of well-known and documented attack inci- dents, which may reveal identifiable cyber threat interactions or dependency patterns. ix x Preface Chapter 4 discusses threat intrusion, detection, and prevention methods to iden- tifying malicious incidents, logging information about them, attempting to stop them and reporting the identified malicious attack to incident response teams for support. In this regard, intrusion detection and prevention strategies are becoming important knowledge to decide about the right approach to secure critical and cru- cial infrastructure against malicious cyber threat attack incidents. Chapter 5 surveys machine learning and deep learning, two methodologies which have gained importance due to the impact of digital transformation and the increas- ing growth of data sets, to improve intrusion detection system performance. Two use case examples are introduced. Chapter 6 provides knowledge about cyber attackers, to develop attack models for security analysis of different cyber-attack scenarios. This allows simulating dis- tinct attack paths or alternative approaches on how to secure the targets the cyber attacker tries to attack. This methodology is introduced as a profiling approach to gain prior knowledge for potential cyber-criminal attacker scenarios, based on cyber threat attackers’ motivation. Chapter 7 discusses ontologies which are explicit conceptualizations of subject domains and therefore an important method for knowledge acquisition and knowl- edge sharing. Ontologies are an essential methodological approach for knowledge- intensive problem-solving that involves reasoning about objects and concepts in a particular domain or information resource with the scope enhancing cybersecurity in the respective data space. Chapter 8 concludes this monograph by providing an overview of the challenges to gain the respective knowledge for cybersecurity leadership in the era of digital transformation. I thank all authors who have published cybersecurity material and directly or indirectly contributed to this monograph through citation. In particular I thank the president of TU Clausthal, Germany, Prof. Dr. Joachim Schachtner, for supporting my research work on the fourth technological wave. This research is partly sup- ported by “Study of the Sino-German Joint- Training- Model for Engineering Students of the Sino-German Lighthouse Cooperation Projects on Intelligent Manufacturing” of the Chinese Ministry of Industry and Information Technology (MIIT), and the “Strategic Consultant Research Project of the Henan Sub-branch of the Chinese Academy of Engineering 2020.” I also would like to thank Mr. Ashwin Bala Vidya of QSO-Technologies India Pvt. Ltd. for his excellent assistance in proof reading. Most notably I would like to deeply thank my wife Angelika, my daughter Christina, and my grandchildren Hannah, Karl, and Teresa, for their encouragement, patience, and understanding while I was writing the monograph. Clausthal-Zellerfeld, Germany Dietmar P. F. Möller

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.