000 04344nam a22006255i 4500
001 978-3-031-55517-6
003 DE-He213
005 20250516160022.0
007 cr nn 008mamaa
008 240411s2024 sz | s |||| 0|eng d
020 _a9783031555176
_9978-3-031-55517-6
050 4 _aTA345-345.5
072 7 _aUN
_2bicssc
072 7 _aCOM018000
_2bisacsh
072 7 _aUN
_2thema
082 0 4 _a620.00285
_223
100 1 _aAmanowicz, Marek.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aData-Centric Security in Software Defined Networks (SDN)
_h[electronic resource] /
_cby Marek Amanowicz, Sebastian Szwaczyk, Konrad Wrona.
250 _a1st ed. 2024.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2024.
300 _aXIX, 118 p. 38 illus., 2 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aStudies in Big Data,
_x2197-6511 ;
_v149
505 0 _aIntroduction -- Data-centric security -- Software Defined Networks -- Cross-layer enforcement of data security in SDN -- Risk-aware routing in SDN -- Risk-aware routing applicability for DCS enforcement -- DCS deployment in SDN-based systems.
520 _aThe book focuses on applying the data-centric security (DCS) concept and leveraging the unique capabilities of software-defined networks (SDN) to improve the security and resilience of corporate and government information systems used to process critical information and implement business processes requiring special protection. As organisations increasingly rely on information technology, cyber threats to data and infrastructure can significantly affect their operations and adversely impact critical business processes. Appropriate authentication, authorisation, monitoring, and response measures must be implemented within the perimeter of the system to protect against adversaries. However, sophisticated attackers can compromise the perimeter defences and even remain in the system for a prolonged time without the owner being aware of these facts. Therefore, new security paradigms such as Zero Trust and DCS aim to provide defence under the assumption that the boundary protections will be breached. Based on experience and lessons learned from research on the application of DCS to defence systems, the authors present an approach to integrating the DCS concept with SDN. They introduce a risk-aware approach to routing in SDN, enabling defence-in-depth and enhanced security for data in transit. The book describes possible paths for an organisation to transition towards DCS, indicating some open and challenging issues requiring further investigation. To allow interested readers to conduct detailed studies and evaluate the exemplary implementation of DCS over SDN, the text includes a short tutorial on using the emulation environment and links to the websites from which the software can be downloaded.
541 _fUABC ;
_cPerpetuidad
650 0 _aEngineering
_xData processing.
650 0 _aComputational intelligence.
650 0 _aData protection.
650 0 _aArtificial intelligence.
650 0 _aBig data.
650 1 4 _aData Engineering.
650 2 4 _aComputational Intelligence.
650 2 4 _aData and Information Security.
650 2 4 _aArtificial Intelligence.
650 2 4 _aBig Data.
700 1 _aSzwaczyk, Sebastian.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aWrona, Konrad.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031555169
776 0 8 _iPrinted edition:
_z9783031555183
776 0 8 _iPrinted edition:
_z9783031555190
830 0 _aStudies in Big Data,
_x2197-6511 ;
_v149
856 4 0 _zLibro electrónico
_uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-55517-6
912 _aZDB-2-INR
912 _aZDB-2-SXIT
942 _cLIBRO_ELEC
999 _c274752
_d274751