TY - CHAP
T1 - Security and Intelligent Management
T2 - Survey
AU - Abbas, Zaigham
AU - Shahzad, Abdul Qahar
AU - Ayub, Muhammad Yaseen
AU - Rakha, Muhammad Allah
N1 - Publisher Copyright:
© 2024 selection and editorial matter, Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda and Muhammad Fazal Ijaz; individual chapters, the contributors.
PY - 2024/1/1
Y1 - 2024/1/1
N2 - In the modern world, the concern of cyber security and privacy is in the limelight. Also, technological advancement has led to an increase in complexity of interconnected systems and devices. Therefore, it is mandatory to improve the protection and resilience of systems against threats of contemporary cyberspace. However, network administrators and security personnel conducted several experiments in the wake of constantly arising threats to system. Also, such practices contribute to the effectiveness of information security management. This is essential for cyber trust to enhance automated auditing and intelligence reporting methods. In addition, intelligent systems provide uninterrupted observing and handling of function. These computing systems are completely based on intelligent approaches. Also, a reinforced mechanism ability is adopted to make wiser decisions in the timeframe in which the threat is identified by the system. However, this chapter mainly focuses on security and intelligent management in order to ensure the safety of the system.
AB - In the modern world, the concern of cyber security and privacy is in the limelight. Also, technological advancement has led to an increase in complexity of interconnected systems and devices. Therefore, it is mandatory to improve the protection and resilience of systems against threats of contemporary cyberspace. However, network administrators and security personnel conducted several experiments in the wake of constantly arising threats to system. Also, such practices contribute to the effectiveness of information security management. This is essential for cyber trust to enhance automated auditing and intelligence reporting methods. In addition, intelligent systems provide uninterrupted observing and handling of function. These computing systems are completely based on intelligent approaches. Also, a reinforced mechanism ability is adopted to make wiser decisions in the timeframe in which the threat is identified by the system. However, this chapter mainly focuses on security and intelligent management in order to ensure the safety of the system.
UR - https://www.scopus.com/pages/publications/85179283934
U2 - 10.1201/9781003404361-2
DO - 10.1201/9781003404361-2
M3 - Chapter
AN - SCOPUS:85179283934
SN - 9781032518992
SP - 16
EP - 38
BT - Cyber Security for Next-Generation Computing Technologies
PB - CRC Press
ER -