Limit search to available items
Book Cover
E-book
Author Khajuria, Samant

Title Cybersecurity and Privacy - Bridging the Gap
Published Aalborg : River Publishers, 2017

Copies

Description 1 online resource (240 pages)
Series River Publishers Series in Communications
River Publishers series in communications.
Contents Front Cover -- Half Title Page -- RIVER PUBLISHERS SERIES IN COMMUNICATIONS -- Title Page -- Cybersecurity and Privacy -- Bridging the Gap -- Copyright Page -- Contents -- Foreword -- Preface -- List of Figures -- List of Tables -- List of Abbreviations -- Introduction -- Chapter 1 -- An Introduction to Security Challenges in User-Facing Cryptographic Software -- 1.1 Usability and Security -- 1.2 Background -- 1.3 Practical Cryptographic Implementation -- 1.4 Analysis of a Selection of Android Encryption Apps -- 1.4.1 Main Findings -- 1.5 Priorities to Improve upon Existing Applications -- 1.6 Implementation Considerations -- 1.6.1 Key Derivation Stage -- 1.6.2 Master Key Generation and Use -- 1.6.3 Cipher Use and Initialisation -- 1.6.4 Indistinguishability and Resistance to Malleability -- 1.6.5 Authentication of Ciphertexts -- 1.6.6 Padding Attacks -- 1.7 Discussion -- 1.8 Conclusions -- References -- Chapter 2 -- "Take It or Leave It": Effective Visualization of Privacy Policies -- 2.1 Introduction -- 2.2 Related Work -- 2.2.1 Survey and Machine Learning-based Methodologies -- 2.2.2 Privacy Enhancing Tools -- 2.3 Privacy Policy Elucidator Tool (PPET) -- 2.3.1 Privacy Categories Definition (Core Contents of a Privacy Policy) -- 2.3.2 General Description of the Tool -- 2.3.3 Corpus Design -- 2.3.4 Preprocessing -- 2.3.5 Privacy Policy Detector -- 2.3.6 Database Description -- 2.4 PPET Architecture and Modelling -- 2.4.1 Classification -- 2.4.2 Summarization and Ranking -- 2.5 Results -- 2.6 Recommendations -- 2.7 Conclusion and FutureWork -- References -- Chapter 3 -- A Secure Channel Using Social Messaging for Distributed Low-Entropy Steganography -- 3.1 Introduction -- 3.1.1 Outline of Proposed Method -- 3.1.2 Research Contributions -- 3.1.3 Chapter Organisation -- 3.2 Previous Work -- 3.2.1 UP Anonymity -- 3.2.2 UGC Confidentiality
3.2.3 Distributed High-Entropy Steganography Approach -- 3.3 Proposed Architecture -- 3.4 Implementation -- 3.5 Conclusion -- References -- Chapter 4 -- Computational Trust -- 4.1 Introduction -- 4.2 Trust -- 4.3 Security and Trust -- 4.4 Trust Models -- 4.4.1 Fuzzy Trust Model Description -- 4.4.2 Reputation Evaluation -- 4.4.3 Eigen Trust Algorithm -- 4.4.4 Notion of Trust -- 4.5 Example: PGP Web of Trust -- 4.6 Example: X.509 Certificates -- 4.7 Summary -- References -- Chapter 5 -- Security in Internet of Things -- 5.1 Introduction -- 5.2 Examples of Problematic IoT Devices -- 5.2.1 IP Camera -- 5.2.2 Internet Gateways -- 5.2.3 Smart Energy Meters -- 5.2.4 Automotive IoT -- 5.2.5 IoT and Health -- 5.2.6 The Smart Home and Appliances -- 5.3 Security Challenges in IoT -- 5.4 Security Recommendations -- 5.5 Conclusion -- References -- Chapter 6 -- Security in the Industrial Internet of Things -- 6.1 Introduction -- 6.2 Background -- 6.3 Introducing Penetration Testing -- 6.4 Methods -- 6.5 Tools -- 6.6 Findings -- 6.7 Results -- 6.8 Recommendations -- 6.9 Conclusion -- References -- Chapter 7 -- Modern & Resilient Cybersecurity The Need for Principles, Collaboration, Innovation, Education & the Occasional Application of Power -- 7.1 Introduction -- 7.2 Trends -- 7.2.1 Trends in Summary -- 7.3 Protect, Detect & Respond -- 7.3.1 Protect -- 7.3.2 Detect -- 7.3.3 Respond -- 7.4 Beyond Protect, Detect and Respond -- 7.4.1 Cyber-Offense -- 7.4.2 Deterrence & Disruption -- 7.4.2.1 Resilience -- 7.4.3 Importance of Culture to a Resilient Cybersecurity Strategy -- 7.5 Global Security Intelligence Graph -- 7.5.1 The Use of Big Data -- 7.6 Emerging Innovative Technologies -- 7.6.1 Cloud Computing -- 7.6.2 Internet of Things -- 7.6.3 Artificial Intelligence -- 7.7 Partnerships -- 7.8 Conclusion
Chapter 8 -- Building Secure Data Centers for Cloud Based Services -- A Case Study -- 8.1 The Emergence of a New Industrial Era -- 8.2 Cloud Based Services and Data Centers -- 8.3 Types of Data Centers -- 8.4 Security Considerations -- 8.5 Case:Teracom A/S -- 8.6 Future Perspectives -- References -- Chapter 9 -Pervasive Governance -- Understand and SecureYour Transaction Data & Content -- 9.1 Introduction -- 9.2 The Challenges and Risks of Unmanaged Data & Content -- 9.2.1 The Fragmented Approach -- 9.2.2 The Classic Records Management Approach -- 9.2.3 Keeping Legacy Systems Alive -- Just In Case -- 9.2.4 The Ideal Scenario -- 9.2.4.1 Enterprise content management -- 9.2.4.2 Core retention capability -- 9.2.4.3 Formal records management capability -- 9.2.4.4 Archiving & decommissioning -- privacy by design -- 9.3 The Need for a Pervasive Governance Strategy -- 9.4 UnderstandingYour Unstructured Content -- 9.4.1 Automated Intelligence -- 9.4.2 Content Classification -- 9.4.3 Actionable Intelligence through Reporting -- 9.4.4 Automating Policy -- 9.5 An Application Decommissioning Program -- 9.5.1 The Decommissioning Factory -- 9.5.2 Developing a Roadmap -- 9.5.3 Phase 1: Program Governance -- 9.5.4 Phase 2: Application Decommissioning Factory Bootstrap -- 9.5.4.1 Train IT staff -- 9.5.4.2 Coordinate with other business services -- 9.5.4.3 Automate technology selection -- 9.5.4.4 Use proof of concept to reduce risk -- 9.5.5 Phase 3: Application Decommissioning Projects -- 9.5.5.1 Business and data analysis -- 9.5.5.2 Design and build -- 9.6 Conclusion -- Solving the Challenges of Unmanaged Data & Content -- References -- Chapter 10 -- Challenges of Cyber Security and a Fundamental Way to Address Cyber Security -- 10.1 Introduction -- 10.2 Security by Design -- 10.2.1 Functional Design over Security Design -- 10.2.2 Proliferation of Internet
10.2.3 Being a Big Target -- 10.2.4 Quick to Market -- 10.2.5 Design Aspect -- 10.3 Cyber Security Paradigm Shift -- 10.3.1 Security Assurance -- 10.3.2 Security Assurance Challenges -- 10.3.3 Market Place Challenges -- 10.3.4 Regulatory Challenges -- 10.3.5 Requirements of Security Assurance -- 10.4 Security Assurance Process -- 10.4.1 Goals of Security Assurance -- 10.4.2 Challenges of Security Assurance -- 10.4.3 3GPP Security Assurance -- 10.4.4 3GPP Security Assurance Approach -- 10.4.5 Security Assurance around the Globe -- 10.5 Conclusion -- References -- Index -- About the Editors -- Back Cover
Notes Print version record
Subject Computer security
Computer security
Genre/Form Electronic books
Form Electronic book
Author Sørensen, Lene
Skouby, Knud Erik
ISBN 9788793519657
8793519656