Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Information Sphere

Handbook of Research on Cyber Crime and Information Privacy
It is a set of information, objects of informatization, information systems, sites in the information and telecommunication network of the Internet, communication networks, information technologies, subjects whose activities are related to the formation and processing of information, the development and use of these technologies, ensuring information security, as well as a set of mechanisms for regulating the relevant social relations.
Published in Chapter:
Hybrid Intelligence Framework for Improvement of Information Security of Critical Infrastructures
Alexander P. Ryjov (Lomonosov Moscow State University, Russia) and Igor F. Mikhalevich (Russian University of Transport (Moscow Institute of Transport Engineers), Russia)
Copyright: © 2021 |Pages: 28
DOI: 10.4018/978-1-7998-5728-0.ch016
Abstract
Information infrastructures for corporations and governments (information and automated systems, telecommunication networks, and other elements) have dramatically changed in the last decades due to the broad usage of IoT, AI, mobile internet, and other advanced technologies. Protection against cyberattacks requires new solutions that correspond to an increased level of complexity for these infrastructures. Important tasks for these new tools are forecasting cyberattacks, developing and applying preventive protective measures to reduce the risk of information security incidents. For the prediction of cyberattacks and the development of preventive protective measures, the authors propose to use one of the hybrid (or augmented) intelligence (HI) frameworks – evaluation and monitoring of complex processes. The mission of the chapter is to discuss the main issues, challenges, and opportunities related to HI applications for protection against cyberattacks to information infrastructures.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR