This book brings together the essential methodologies required to
understand the advancement of digital technologies into digital
transformation, as well as to protect them against cyber threat
vulnerabilities (in this context cybersecurity attack ontology is
included, modeling different types of adversary knowledge). It covers
such essential methodologies as CIA Triad, Security Risk, Likelihood,
and Consequence Level, Threat Attack Profiling, Threat Intelligence,
Threat Lifecycle and more.
The idea behind digital transformation is to use digital technologies
not only to replicate an existing process in a digital form, but to use
digital technology to transform that process into something intelligent
(where anything is connected with everything at any time and accessible
and controlled and designed advanced). Against this background, cyber
threat attacks become reality, using advanced digital technologies with
their extreme interconnected capability which call for sophisticated
cybersecurity protecting digital technologies of digital
transformation.
Scientists, advanced-level students and researchers working in computer
science, electrical engineering and applied mathematics will find this
book useful as a reference guide. Professionals working in the field of
big data analytics or digital/intelligent manufacturing will also find
this book to be a valuable tool.