Offensive and Defensive Cyber Security Strategies: Fundamentals, Theory and Practices (Cyber Shorts)
Author: Mariya Ouaissa (Author), Mariyam Ouaissa (Author)
Publisher finelybook 出版社: CRC Press
Edition 版次: 1st
Publication Date 出版日期: 2024-11-22
Language 语言: English
Print Length 页数: 106 pages
ISBN-10: 1032823410
ISBN-13: 9781032823416
Book Description
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats. The book offers strategies of practical aspects of cybersecurity, covers the main disciplines needed to understand cybersecurity, and demonstrates ethical and legal concepts of cyber activities. It presents important concepts relevant for cybersecurity strategies, including the concept of cybercrime, cyber defense, protection of IT systems, and analysis of risks.
About the Author
Mariya Ouaissa is currently an Assistant Professor in Cybersecurity and Networks at Faculty of Sciences Semlalia, Cadi Ayyad University, Marrakech, Morocco. She is a Ph.D. graduated in 2019 in Computer Science and Networks, at the Laboratory of Modelisation of Mathematics and Computer Science from ENSAM-Moulay Ismail University, Meknes, Morocco. She is a Networks and Telecoms Engineer, graduated in 2013 from National School of Applied Sciences Khouribga, Morocco. She is a Co-Founder and IT Consultant at IT Support and Consulting Center.
Mariyam Ouaissa is currently an Assistant Professor in Networks and Systems at ENSA, Chouaib Doukkali University, El Jadida, Morocco. She received her Ph.D. degree in 2019 from National Graduate School of Arts and Crafts, Meknes, Morocco and her Engineering Degree in 2013 from the National School of Applied Sciences, Khouribga, Morocco. She is a communication and networking researcher and practitioner with industry and academic experience. Dr Ouaissa’s research is multidisciplinary that focuses on Internet of Things, M2M, WSN, vehicular communications and cellular networks, security networks, congestion overload problem and the resource allocation management and access control.