Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Cyber security : analytics, technology and automation
Lehto M., Neittaanmäki P., Springer Publishing Company, Incorporated, New York, NY, 2015. 269 pp. Type: Book (978-3-319183-01-5)
Date Reviewed: Oct 7 2015

It is the best of times and the worst of times. We are living in an age when individuals treasure their privacy and lose it a thousand times an hour, every day they turn on their computers. The power of computers and the Internet to produce good is mind-boggling. The digital uses of medical information alone are miraculous. Nevertheless, the paraphrase of Dickens’ opening lines in A tale of two cities is eerily similar to what we are facing now: Perhaps not the guillotine, but certainly the possible death of personal privacy.

The contributing authors to this text are doing everything possible to keep our information private, while the bad guys are working just as hard to make it “un-private.” This wonderfully documented text explores the mechanics and methods of digital security and the steps necessary to ensure privacy.

Part 1 consists of four chapters, which lay the groundwork of terminology and cyber security viewed from the cyber world: the cyber world as a social system; citizens in the cyber world; and rights and privileges as far as the cyber world is concerned--even the rights of those trying to undermine that security.

Part 2 is a compendium of five chapters exploring cyber warfare, deception, and legal ramifications. It concludes with a practical schema of a model of security in Finland.

Part 3 is an in-depth, highly sophisticated mathematical treatment of the technology proposals for models of security. This part discusses the challenges of timing and side channel attacks. Side channel attacks use seemingly innocent, unrelated sources to gain information. For example, tracking the number of times pizza is delivered to an office can indicate the hours programmers are working on cyber software. Timing is a technique hackers use to measure the amount of time necessary for a system to engage. Other methods include the knowledge gained from a network log.

Part 4 details the efforts to develop cyber secure models in a specific country (Australia). It concludes with two chapters on dependable automation and specialized honeypots, that is, decoys designed to thwart any enemy attack for supervisory control and data acquisition (SCADA) systems.

For the professional who is mathematically literate, the book is a must-read. The reference sections that follow each chapter rival that of any PhD thesis ever written. It is magnificent in its scholarship.

Reviewer:  James Van Speybroeck Review #: CR143831 (1512-1043)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security and Protection (K.6.5 )
 
 
Automation (K.4.3 ... )
 
 
Security and Protection (C.2.0 ... )
 
 
Organizational Impacts (K.4.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy