Advertisement

Cyber Security: Analytics, Technology and Automation

  • Martti Lehto
  • Pekka Neittaanmäki

Table of contents

  1. Front Matter
    Pages i-x
  2. Cyber World Today

    1. Front Matter
      Pages 1-1
    2. Martti Lehto
      Pages 3-29
    3. Tuija Kuusisto, Rauno Kuusisto
      Pages 31-43
    4. Torsti Sirén, Aki-Mauri Huhtinen
      Pages 45-62
  3. Cyber Security Threats, Legality and Strategy

    1. Front Matter
      Pages 71-71
    2. Kenneth Geers
      Pages 73-87
    3. Rain Ottis
      Pages 89-96
    4. William Hutchinson
      Pages 97-107
    5. Eneken Tikk-Ringas
      Pages 109-127
    6. Antti Sillanpää, Harri Roivainen, Martti Lehto
      Pages 129-144
  4. Cyber Security Technology

    1. Front Matter
      Pages 145-145
    2. Nezer Zaidenberg, Amit Resh
      Pages 183-194
    3. Tuomo Sipola
      Pages 195-203
    4. Nezer Zaidenberg, Pekka Neittaanmäki, Michael Kiperberg, Amit Resh
      Pages 205-212
  5. Cyber Security and Automation

    1. Front Matter
      Pages 213-213
    2. Matthew J. Warren, Shona Leitch
      Pages 215-228
    3. Jari Seppälä, Mikko Salmenperä
      Pages 229-249
    4. Paulo Simões, Tiago Cruz, Jorge Proença, Edmundo Monteiro
      Pages 251-269

About this book

Introduction

Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out.

The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are  Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

Keywords

Critical Infrastructures Cyber Security Implementation Cyber Security Technology Cyber World Network Security SCADA Systems

Editors and affiliations

  • Martti Lehto
    • 1
  • Pekka Neittaanmäki
    • 2
  1. 1.Dept of Mathematical Information TechnologyUniversity of JyväskyläJyväskyläFinland
  2. 2.Mathematical Information TechnologyUniversity of JyväskyläJyväskyläFinland

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-18302-2
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Engineering
  • Print ISBN 978-3-319-18301-5
  • Online ISBN 978-3-319-18302-2
  • Series Print ISSN 2213-8986
  • Series Online ISSN 2213-8994
  • Buy this book on publisher's site