Einschränkung Ihrer Suchanfrage auf den Bestand einer Bibliothek
Festlegung des Sortierkriteriums der Treffermenge
Die unscharfe Suche berücksichtigt auch Schreibfehler oder -varianten bei Ihrer Suche!
* Suchen (und) = ein Suchauftrag mit 2 oder mehr Suchbegriffen findet Titel, die alle Suchbegriffe enthalten. * Suchen (oder) = ein Suchauftrag mit 2 oder mehr Suchbegriffen zeigt alle Titel, die mindestens einen der Suchbegriffe enthalten * Mit Index blättern erhalten Sie eine alphabetisch sortierte Liste aller Begriffe, die wie Ihr Suchbegriff beginnen. * Nach einem Suchauftrag können Sie die Ergebnisse auch erweitern, eingrenzen oder neu sortieren.
zur Hilfe zum gewählten Suchschlüssel, bitte klicken
Introduction -- Data-centric security -- Software Defined Networks -- Cross-layer enforcement of data security in SDN -- Risk-aware routing in SDN -- Risk-aware routing applicability for DCS enforcement -- DCS deployment in SDN-based systems.
The book focuses on applying the data-centric security (DCS) concept and leveraging the unique capabilities of software-defined networks (SDN) to improve the security and resilience of corporate and government information systems used to process critical information and implement business processes requiring special protection. As organisations increasingly rely on information technology, cyber threats to data and infrastructure can significantly affect their operations and adversely impact critical business processes. Appropriate authentication, authorisation, monitoring, and response measures must be implemented within the perimeter of the system to protect against adversaries. However, sophisticated attackers can compromise the perimeter defences and even remain in the system for a prolonged time without the owner being aware of these facts. Therefore, new security paradigms such as Zero Trust and DCS aim to provide defence under the assumption that the boundary protections will be breached. Based on experience and lessons learned from research on the application of DCS to defence systems, the authors present an approach to integrating the DCS concept with SDN. They introduce a risk-aware approach to routing in SDN, enabling defence-in-depth and enhanced security for data in transit. The book describes possible paths for an organisation to transition towards DCS, indicating some open and challenging issues requiring further investigation. To allow interested readers to conduct detailed studies and evaluate the exemplary implementation of DCS over SDN, the text includes a short tutorial on using the emulation environment and links to the websites from which the software can be downloaded.