{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T14:17:58Z","timestamp":1758637078686,"version":"3.40.5"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031451614"},{"type":"electronic","value":"9783031451621"}],"license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-45162-1_9","type":"book-chapter","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T22:04:44Z","timestamp":1701381884000},"page":"141-161","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cybersecurity as a Service"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2811-1055","authenticated-orcid":false,"given":"John","family":"Morris","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2288-9010","authenticated-orcid":false,"given":"Stefan","family":"Tatschner","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1094-4828","authenticated-orcid":false,"given":"Michael P.","family":"Heinl","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1594-2119","authenticated-orcid":false,"given":"Patrizia","family":"Heinl","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3375-8200","authenticated-orcid":false,"given":"Thomas","family":"Newe","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1658-1140","authenticated-orcid":false,"given":"Sven","family":"Plaga","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,1]]},"reference":[{"unstructured":"Cloud Security Alliance \u2013 Security as a Service Working Group. Defined Categories of Security as a Service. https:\/\/downloads.cloudsecurityalliance.org\/assets\/research\/security-as-a-service\/csa-categories-securitiesprep.pdf. 2016","key":"9_CR1"},{"unstructured":"Sahay M (2023) Who Invented the Antivirus? A History of Antivirus Software. https:\/\/downloads.cloudsecurityalliance.org\/assets\/research\/security-as-a-service\/csa-categories-securities-prep.pdf, 2016","key":"9_CR2"},{"unstructured":"Statista Annual number of data compromises and individuals impacted in the United States from 2005 to 2022. https:\/\/www.statista.com\/statistics\/273550\/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed\/. 2023","key":"9_CR3"},{"unstructured":"Johnson R (2019) percent of small companies close within 6 months of being hacked (2019). https:\/\/www.isc2.org\/\/-\/media\/ISC2\/Research\/","key":"9_CR4"},{"unstructured":"Kirat D, Jang J, Stoecklin M (2018) Deeplocker\u2013concealing targeted attacks with ai locksmithing. Blackhat USA 1:1-29","key":"9_CR5"},{"unstructured":"WorkForce-Study\/ISC2-Cybersecurity-Workforce-Study.ashx (2022) International Information System Security Certification Consortium (ISC)\u00b2.Cybersecurity","key":"9_CR6"},{"unstructured":"Sullivan F (2022 ) European Managed and Professional Security Services Market. https:\/\/store.frost.com\/european-managed-and-professionalsecurity-services-market.html.","key":"9_CR7"},{"unstructured":"Statista. (2023) Size of the Security as a Service (SECaaS) market worldwide from 2022 to 2033. security-services-market. https:\/\/www.statista.com\/statistics\/595164\/worldwidesecurity-as-a-service-market-size\/.","key":"9_CR8"},{"doi-asserted-by":"crossref","unstructured":"Security I (2022) X-Force Threat Intelligence Index 2022. Page 16, Sum of top infection vectors linked to human error cas. https:\/\/www.ibm.com\/downloads\/cas\/ADLMYLAZ","key":"9_CR9","DOI":"10.12968\/S1361-3723(22)70561-1"},{"unstructured":"Security. H (2020) New Office 365 phishing tactics are difficult to spot but easy to prevent. https:\/\/www.rmtechteam.com\/blog\/new-office-365-phishingtactics-are-difficult-to-spot-but-easy-to-preve","key":"9_CR10"},{"unstructured":"Security H (2023) Next-Gen Vulnerability Management. https:\/\/www.holmsecurity.com\/","key":"9_CR11"},{"doi-asserted-by":"publisher","unstructured":"Khan RA, Khan SU, Khan HU, Ilyas M (2021) Systematic mapping study on security approaches in secure software engineering. IEEE Access 9:19139\u201319160. https:\/\/doi.org\/10.1109\/ACCESS.2021.3052311","key":"9_CR12","DOI":"10.1109\/ACCESS.2021.3052311"},{"doi-asserted-by":"crossref","unstructured":"Hardt D (2012) The OAuth 2.0 Authorization Framework. RFC 6749. https:\/\/www.rfc-editor.org\/info\/rfc6749.","key":"9_CR13","DOI":"10.17487\/rfc6749"},{"unstructured":"Sakimura N (2014) OpenID Connect Core 1.0. http:\/\/openid.net\/specs\/openid-connect-core-1%5C_0.html","key":"9_CR14"},{"doi-asserted-by":"crossref","unstructured":"Campbell B, Mortimore C, Jones M (2015) Security assertion markup language (SAML) 2.0 profile for OAuth 2.0 client authentication and authorization grants. https:\/\/www.rfc-editor.org\/rfc\/rfc7522","key":"9_CR15","DOI":"10.17487\/RFC7522"},{"unstructured":"Mclean M (2023) Must-Know Cyber Attack Statistics and Trends. 2023. url:. https:\/\/www.embroker.com\/blog\/cyber-attack-statistics\/.","key":"9_CR16"},{"unstructured":"Beamer T (2022) What Industries Are Most Vulnerable to Cyber Attacks In 2022? 2023. https:\/\/www.techbusinessnews.com.au\/what-industries-are-mostvulnerable-to-cyberattacks-in-2022\/","key":"9_CR17"},{"unstructured":"Cichonski P, Millar T, Grance T, Scarfone K (2012) Computer security incident handling guide. NIST Special Publication 800 (61):1\u2013147","key":"9_CR18"},{"doi-asserted-by":"publisher","unstructured":"Stephanow P, Banse C (2017) Clouditor-continuous cloud assurance. Technical report, Fraunhofer AISEC. https:\/\/doi.org\/10.1145\/3338466.3358917","key":"9_CR19","DOI":"10.1145\/3338466.3358917"},{"unstructured":"Hogben G, Dekker M (2012) European union agency for network and information security (enisa). Procure Secure-A guide to monitoring of security service levels in cloud contracts, Br\u00fcssel","key":"9_CR20"},{"doi-asserted-by":"crossref","unstructured":"Heinl MP, Giehl A, Wiedermann N, Plaga S, Kargl F MERCAT: A metric for the evaluation and reconsideration of certificate authority trustworthiness. In: Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019. pp 1\u201315","key":"9_CR21","DOI":"10.1145\/3338466.3358917"},{"unstructured":"Morgan S (2023) Security Awareness Training Market To Hit $10 Billion Annually By 2027. https:\/\/cybersecurityventures.com\/security-awarenesstraining-market-to-hit-10-billion-annually-by-2027\/","key":"9_CR22"},{"unstructured":"Ankura (2023) The Cybersecurity Insurance Market: What to Expect in 2023. Mar. 2023. url:. https:\/\/www.jdsupra.com\/legalnews%20\/the-cybersecurity-insurance-market-what-2446460\/.","key":"9_CR23"}],"container-title":["Internet of Things","Cybersecurity Vigilance and Security Engineering of Internet of Everything"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-45162-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T22:05:27Z","timestamp":1701381927000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-45162-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,1]]},"ISBN":["9783031451614","9783031451621"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-45162-1_9","relation":{},"ISSN":["2199-1073","2199-1081"],"issn-type":[{"type":"print","value":"2199-1073"},{"type":"electronic","value":"2199-1081"}],"subject":[],"published":{"date-parts":[[2023,12,1]]},"assertion":[{"value":"1 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}