Overview
- Highlights the strong requirement for expert knowledge, and how a lack of this is preventing businesses from performing their own vulnerability assessments
- Approaches the challenges of IT vulnerability assessment from both technical and business perspectives, taking into consideration the latest IT trends
- Helps the reader to improve their understanding of the challenges and issues covered, through case studies suitable for readers of different abilities (e.g., both students and practitioners)
- Proposes solutions that utilise artificial intelligence to develop rich functionality whilst minimising the need for end-user expert knowledge
Part of the book series: Computer Communications and Networks (CCN)
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
This professional guide and reference examines the challenges of assessing security vulnerabilities in computing infrastructure. Various aspects of vulnerability assessment are covered in detail, including recent advancements in reducing the requirement for expert knowledge through novel applications of artificial intelligence. The work also offers a series of case studies on how to develop and perform vulnerability assessment techniques using start-of-the-art intelligent mechanisms.
Topics and features: provides tutorial activities and thought-provoking questions in each chapter, together with numerous case studies; introduces the fundamentals of vulnerability assessment, and reviews the state of the art of research in this area; discusses vulnerability assessment frameworks, including frameworks for industrial control and cloud systems; examines a range of applications that make use of artificial intelligence to enhance the vulnerability assessment processes; presents visualisation techniques that can be used to assist the vulnerability assessment process.In addition to serving the needs of security practitioners and researchers, this accessible volume is also ideal for students and instructors seeking a primer on artificial intelligence for vulnerability assessment, or a supplementary text for courses on computer security, networking, and artificial intelligence.
Similar content being viewed by others
Keywords
Table of contents (16 chapters)
-
Introduction and State-of-the-art
-
Vulnerability Assessment Frameworks
-
Applications of Artificial Intelligence
-
Visualisation
Editors and Affiliations
About the editors
Dr. Simon Parkinson is a Senior Lecturer in Computer Science in the School of Computing and Engineering, University of Huddersfield, UK.
Prof. Andrew Crampton is a Professor of Computational Mathematics in the School of Computing and Engineering, and the Associate Dean for Teaching and Learning at the University of Huddersfield.
Prof. Richard Hill is a Professor of Intelligent Systems, the Head of the Department of Informatics, and the Director of the Centre for Industrial Analytics at the University of Huddersfield. His other publications include the successful Springer titles Guide to Security Assurance for Cloud Computing, Big-Data Analytics and Cloud Computing, Guide to Cloud Computing, and Cloud Computing for Enterprise Architectures.
Bibliographic Information
Book Title: Guide to Vulnerability Analysis for Computer Networks and Systems
Book Subtitle: An Artificial Intelligence Approach
Editors: Simon Parkinson, Andrew Crampton, Richard Hill
Series Title: Computer Communications and Networks
DOI: https://doi.org/10.1007/978-3-319-92624-7
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing AG, part of Springer Nature 2018
Hardcover ISBN: 978-3-319-92623-0Published: 14 September 2018
Softcover ISBN: 978-3-030-06474-7Published: 25 January 2019
eBook ISBN: 978-3-319-92624-7Published: 04 September 2018
Series ISSN: 1617-7975
Series E-ISSN: 2197-8433
Edition Number: 1
Number of Pages: X, 384
Number of Illustrations: 14 b/w illustrations, 103 illustrations in colour
Topics: Computer Communication Networks, Systems and Data Security, Performance and Reliability, Information Systems and Communication Service, Cognitive Psychology