Introduction to the Cyber Ranges
- Length: 176 pages
- Edition: 1
- Language: English
- Publisher: Chapman & Hall
- Publication Date: 2022-05-04
- ISBN-10: 1032072407
- ISBN-13: 9781032072401
- Sales Rank: #0 (See Top 100 Books)
Introduction to the Cyber Ranges provides a comprehensive, integrative, easy-to-comprehend overview of different aspects involved in the cybersecurity arena. It expands on various concepts like cyber situational awareness, simulation and emulation environments, and cybersecurity exercises. It also focuses on detailed analysis and the comparison of various existing cyber ranges in military, academic, and commercial sectors. It highlights every crucial aspect necessary for developing a deeper insight about the working of the cyber ranges, their architectural design, and their need in the market. It conveys how cyber ranges are complex and effective tools in dealing with advanced cyber threats and attacks.
Enhancing the network defenses, resilience, and efficiency of different components of critical infrastructures is the principal objective of cyber ranges. Cyber ranges provide simulations of possible cyberattacks and training on how to thwart such attacks. They are widely used in urban enterprise sectors because they present a sturdy and secure setting for hands-on cyber skills training, advanced cybersecurity education, security testing/training, and certification.
Features:
- A comprehensive guide to understanding the complexities involved with cyber ranges and other cybersecurity aspects
- Substantial theoretical knowhow on cyber ranges, their architectural design, along with case studies of existing cyber ranges in leading urban sectors like military, academic, and commercial
- Elucidates the defensive technologies used by various cyber ranges in enhancing the security setups of private and government organizations
- Information organized in an accessible format for students (in engineering, computer science, and information management), professionals, researchers, and scientists working in the fields of IT, cybersecurity, distributed systems, and computer networks
Cover Half Title Series Page Title Page Copyright Page Contents Preface About the Authors List of Abbreviations Glossary 1. Introduction 1.1. CSA 1.2. Definition 1.3. Need of CRs 1.3.1. Use Cases of CRs 1.3.2. Merits of CRs Training 1.4. CRaaS 1.5. On-Premise CR 1.6. Types of CRs 1.7. Conclusions References 2. Architectural Design and Tools of Cyber Ranges 2.1. Architectural Modules and Their Functions 2.1.1. Portal 2.1.2. Run-Time Environments 2.1.2.1. Emulation-Based Tools 2.1.2.2. Simulation-Based Tools 2.1.2.3. Traffic Generation Tools 2.1.2.4. Management Tools References 3. Motivations for Construction of Cyber Ranges 3.1. IT and OT Infrastructures 3.1.1. Cybersecurity Challenges to OT/IT Systems 3.1.2. Cybersecurity Implementations in OT/IT Systems 3.1.2.1. Asset Management 3.1.2.2. Governance 3.1.2.3. Risk Assessment 3.1.2.4. Cyber-Risk Awareness 3.1.2.5. Cybersecurity Maintenance 3.1.2.6. Cyber-Risk Detection 3.1.2.7. Mitigation of Cyber Risk 3.1.2.8. Cyber-Risk Analyses 3.1.3. Need of CRs for WSS 3.1.4. Need of CRs for Logistic Systems 3.1.5. Need of CRs for Maritime Systems 3.1.6. Need of CRs for O&G Industries 3.1.7. Need of CRs for Power Systems 3.2. Cyberattacks 3.2.1. Cyberattacks on Critical Infrastructures 3.2.2. Cyberthreats to Critical Infrastructures References 4. Types of Cyber Ranges 4.1. Hybrid CRs 4.1.1. EVA 4.1.2. DIATEAM CR 4.1.3. CRATE 4.2. Physical CRs 4.2.1. SCADA Testbeds 4.2.2. SWAT 4.2.3. WADI 4.3. Virtual CRs 4.3.1. CYRA 4.3.2. GISOO 4.4. CRaaS References 5. Roles of Cyber Ranges: Testing, Training, and Research 5.1. CRs for Testing 5.1.1. Penetration Testing 5.1.2. Software Testing 5.1.3. Security Testing 5.1.3.1. Threat Model Testing 5.1.3.2. Web Security Testing 5.2. CRs for Training 5.2.1. How to Use CRs for Trainings 5.2.2. Cybersecurity Awareness Trainings 5.2.3. Incident Response Trainings 5.3. CRs for Research References 6. Cybersecurity Exercises and Teams Definition 6.1. Need of CEs 6.2. Life Cycle of a CE 6.3. Steps in Designing of a CE 6.4. Different Kinds of Approaches 6.5. Common Features of a CE 6.6. Types of CEs 6.6.1. Examples of CEs 6.7. Teams Definition 6.8. Conclusions References 7. Simulation and Emulation Environments 7.1. Emulation Environment 7.1.1. Need for Emulation Environment 7.1.2. Types of Emulation Models 7.1.3. Emulators 7.1.3.1. Dummynet 7.1.3.2. NetEm 7.1.3.3. NIST Net 7.2. Simulation Environment 7.2.1. Need for Simulation Environment 7.2.2. Simulators 7.2.2.1. NS2 7.2.2.2. NS3 7.2.2.3. OMNET++ 7.2.2.4. QualNet References 8. Designing a Cyber Range 8.1. Planning Phase 8.1.1. Security Challenges Supported by the CR 8.1.2. Components for CR 8.1.3. Defining CR Teams 8.2. Architectural Considerations 8.3. Implementation Phase 8.3.1. IaC References 9. Military Cyber Ranges 9.1. Need of MCRs 9.2. Simulation-Based MCRs 9.2.1. SIMTEX 9.2.1.1. Introduction 9.2.1.2. Origin 9.2.1.3. Architecture 9.2.1.4. Evolution 9.2.2. CAAJED 9.2.2.1. Introduction 9.2.2.2. Origin 9.2.2.3. Architecture 9.2.2.4. Evolution 9.2.3. SAST 9.2.3.1. Introduction 9.2.3.2. Origin 9.2.3.3. Architecture 9.2.3.4. Evolution 9.2.4. StealthNet 9.2.4.1. Introduction 9.2.4.2. Origin 9.2.4.3. Architecture 9.2.4.4. Evolution 9.2.5. Comparison of Simulation-Based MCRs 9.3. Emulation-Based MCRs 9.3.1. NCR 9.3.1.1. Introduction 9.3.1.2. Origin 9.3.1.3. Architecture 9.3.1.4. Evolution 9.3.2. JIOR 9.3.2.1. Introduction 9.3.2.2. Origin 9.3.2.3. Architecture 9.3.2.4. Evolution 9.3.3. DoD CSR 9.3.3.1. Introduction 9.3.3.2. Origin 9.3.3.3. Architecture 9.3.3.4. Evolution 9.3.4. Comparison of Emulation-Based MCRs 9.4. MACRs 9.4.1. USMA IWAR 9.4.1.1. Introduction 9.4.1.2. Origin 9.4.1.3. Architecture 9.4.1.4. Evolution 9.4.2. Estonian CR 9.4.2.1. Introduction 9.4.2.2. Origin 9.4.2.3. Architecture 9.4.2.4. Evolution 9.4.3. KYPO Czech 9.4.3.1. Introduction 9.4.3.2. Origin 9.4.3.3. Architecture 9.4.3.4. Evolution 9.4.4. Comparison of MACRs References 10. Existing Cyber Ranges in Academic Sector 10.1. Simulation-Based ACRs 10.1.1. SECUSIM 10.1.1.1. Introduction 10.1.1.2. Terminologies 10.1.1.3. Architecture 10.1.2. RINSE 10.1.2.1. Introduction 10.1.2.2. Architectural and Business Influences 10.1.2.3. Architecture 10.1.3. netEngine 10.1.3.1. Introduction 10.1.3.2. Architecture 10.1.4. OPNET CR 10.1.4.1. Introduction 10.1.4.2. Architecture 10.1.4.3. Simulation Workflow 10.1.5. Concordia Consortium 10.1.5.1. KYPO CR 10.1.5.2. TELECOM Nancy CR 10.1.5.3. RISE CR 10.1.5.4. Airbus CR 10.1.5.5. CODE CR 10.1.6. Comparison of Simulation-Based ACRs 10.2. Emulation-Based ACRs 10.2.1. VCSTC 10.2.1.1. Introduction 10.2.1.2. Architecture 10.2.2. LARIAT 10.2.2.1. Introduction 10.2.2.2. Architecture 10.2.3. Emulab 10.2.3.1. Introduction 10.2.3.2. Architecture 10.2.4. DETER 10.2.4.1. Introduction 10.2.4.2. DETERlab 10.2.4.3. Architecture 10.2.5. Virginia CR 10.2.5.1. Introduction 10.2.5.2. Architecture 10.2.6. Comparison of Emulation-Based ACRs References Index
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.