Skip to main content

Über dieses Buch

This timely book offers rare insight into the field of cybersecurity in Russia -- a significant player with regard to cyber-attacks and cyber war. Big Data Technologies for Monitoring of Computer Security presents possible solutions to the relatively new scientific/technical problem of developing an early-warning cybersecurity system for critically important governmental information assets. Using the work being done in Russia on new information security systems as a case study, the book shares valuable insights gained during the process of designing and constructing open segment prototypes of this system.
Most books on cybersecurity focus solely on the technical aspects. But Big Data Technologies for Monitoring of Computer Security demonstrates that military and political considerations should be included as well.
With a broad market including architects and research engineers in the field of information security, as well as managers of corporate and state structures, including Chief Information Officers of domestic automation services (CIO) and chief information security officers (CISO), this book can also be used as a case study in university courses.



Chapter 1. The Relevance of the Early Warning of Cyber-attacks

It is proved that the problem of information security of the critical infrastructure of the Russian Federation is one of the most important goals of ensuring digital sovereignty and defense capability of the state. The main threats to the information security of the Russian Federation are introduced. They include threats of military-political, terrorist, and criminogenic nature. The necessity of an integrated approach to information security not only at the national but also at the external policy level is explained. The current state of the problem of detection and prevention of cyber-attacks is assessed. Prospective assignments of alerting and anticipation tasks, as well as timely detection and neutralization of cyber-attacks, are considered.
Sergei Petrenko

Chapter 2. Finite Capabilities of Cybersecurity Technologies

In November 1988, the first computer security response center, CERT (Computer Emergency Response Team), was established at Carnegie Mellon University in Pittsburgh, Pennsylvania, USA. At present, around 300 CERT/CSIRT centers around the world have been established at various commercial, state, and educational organizations. These centers’ relevance owes to the necessity for timely and high-quality delivery of professional services to diverse state and commercial organizations for the prevention, detection, and response to cybersecurity incidents. This chapter will give the evolutionary development of CERTs from local to global solutions, implying the construction of an extensive national network of such centers while simultaneously clarifying the peculiarities of creating a promising “cloud” center for responding to security incidents within the national state program “Information-Oriented Society (2011–2020).”
Sergei Petrenko

Chapter 3. Limitations of Von Neumann Architecture

As part of its strategic goals for technological development, the Russian Federation aims to create ultrahigh productivity supercomputer technologies or exascale computing by 2025. To this end, it is necessary to effectively develop domestic production of highly productive and trusted computer aids; to overcome physical limitations relating to energy consumption, reliability, and structural dimension of modern processors; and also to develop and implement effective organization of exascale calculation. Intensive research work is taking place in Russian research and education institutions to solve these scientific and technical problems [1–5].
Sergei Petrenko

Chapter 4. Possible Scientific-Technical Solutions to the Problem of Giving Early Warning

This chapter investigates the complex issue of an early-warning system for cyber-attacks on Russian state and corporate information resources. An approach to create the required warning systems based on “computing cognitivism” is proposed; it is a relatively new scientific research area with cognition and cognitive processes being a kind of symbolic computation. It is shown that the cognitive approach makes it possible to create systems that are fundamentally different from the traditional systems for cyber-attack detection, prevention, and recovery (SOPCA). SOPCA has a unique ability to independently associate and synthesize new knowledge on qualitative characteristics and quantitative patterns of information confrontation. A feasible architecture of a cognitive early-warning system for a cyber-attack against Russian information resources based on convergent nano-, bio-, info-, and cognitive technologies, NBIC technologies is proposed [1–5].
Sergei Petrenko


Weitere Informationen

Premium Partner

BranchenIndex Online

Die B2B-Firmensuche für Industrie und Wirtschaft: Kostenfrei in Firmenprofilen nach Lieferanten, Herstellern, Dienstleistern und Händlern recherchieren.



Best Practices für die Mitarbeiter-Partizipation in der Produktentwicklung

Unternehmen haben das Innovationspotenzial der eigenen Mitarbeiter auch außerhalb der F&E-Abteilung erkannt. Viele Initiativen zur Partizipation scheitern in der Praxis jedoch häufig. Lesen Sie hier  - basierend auf einer qualitativ-explorativen Expertenstudie - mehr über die wesentlichen Problemfelder der mitarbeiterzentrierten Produktentwicklung und profitieren Sie von konkreten Handlungsempfehlungen aus der Praxis.
Jetzt gratis downloaden!