Description |
1 online resource (216 pages : 68 illustrations) |
Series |
Artificial Intelligence (AI): Elementary to Advanced Practices Ser |
|
Artificial Intelligence (AI): Elementary to Advanced Practices Ser
|
Contents |
Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Editors -- Contributors -- Chapter 1 Security Threat Analysis and Prevention towards Attack Strategies -- 1.1 Introduction -- 1.2 History of Security Breaches -- 1.3 Common Security Threats -- 1.3.1 Malware -- 1.3.2 Phishing -- 1.3.3 Spear Phishing -- 1.3.4 "Man in the Middle" (MitM) Attack -- 1.3.5 Trojans -- 1.3.6 Ransomware -- 1.3.7 Denial-of-Service Attack or Distributed Denial-of-Service Attack (DDoS) -- 1.3.8 Attacks on IoT Devices -- 1.3.9 Data Breaches -- 1.3.10 Malware on Mobile Apps |
|
1.4 Security Challenges in Modern Day -- 1.4.1 Cloud Computing -- 1.4.2 Social Media -- 1.4.3 Smart Phones -- 1.4.4 General Data Protection Regulations (GDPR) -- 1.4.5 Attacks Based on Machine Learning and AI -- 1.4.6 Attacks against Cryptocurrencies and Blockchain Systems -- 1.4.7 Switching to DevOps -- 1.4.8 Biometric Authentication -- 1.4.9 Fileless Malware -- 1.5 Attack Strategies and Brief Study on Advanced Persistent Threat (APT) -- 1.5.1 How an APT Attack Works -- 1.5.2 Some Instances of APTs -- 1.5.3 Characteristics of APTs -- 1.6 Prevention Measures -- 1.6.1 Identify the Threats |
|
1.6.2 Beware of Cybercrimes -- 1.6.3 Observe All Stakeholders -- 1.6.4 Usage of Two-Factor Authentication -- 1.6.5 Conduct Regular Audits -- 1.6.6 Draft a Credit Sign-Off Policy -- 1.6.7 Protect Vital Data -- 1.6.8 Perform Risk Assessments -- 1.6.9 Insure against Cybercrime -- 1.6.10 Gather In-Depth Knowledge about Risk Factors -- 1.7 Threat Modeling -- 1.8 Role of a Threat Analyst -- 1.9 Summary -- References -- Chapter 2 Defense against the Survivability to Network Strategies -- 2.1 Introduction -- 2.2 Survivability Network Architecture-SONET and Self-Healing Ring Transportation |
|
2.3 Single-Access Optical Network Ring Architecture -- 2.4 Multiaccess Optical Network Ring Architecture -- 2.5 Channel Demand Routing Ring Architecture -- 2.6 Result -- 2.7 Conclusion -- References -- Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security Systems -- 3.1 Introduction -- 3.2 Background Knowledge of CPS -- 3.3 Application Areas of Cyber-Physical System (CPS) -- 3.4 Philosophical Issues of CPS -- 3.5 Principle of CPS Operation -- 3.6 Architecture of CPS -- 3.6.1 Physical Layer -- 3.6.2 Data Link Layer -- 3.6.3 Network Layer -- 3.6.4 Transport Layer |
|
3.6.5 Session Layer -- 3.6.6 Presentation Layer -- 3.6.7 Application Layer -- 3.7 Self-Adaptive Patterns -- 3.7.1 Synthesis Utilized Pattern -- 3.7.2 Synthesis Command Patterns -- 3.7.3 Collect Organized Patterns -- 3.8 Security Threats of CPS -- 3.9 Attacks on CPS -- 3.10 Attacks and Its Consequences -- 3.11 Adversaries' Characteristics -- 3.12 Conclusion -- References -- Chapter 4 Secure Channel Allocation in Cognitive Radio-Wireless Sensor Networks -- 4.1 Introduction -- 4.2 Related Works -- 4.3 System Model -- 4.4 Common Attacks in CR-WSN -- 4.4.1 Replay Attack -- 4.4.2 Node-Targeted Attack |
Notes |
Chapter 1 Security Threat Analysis and Prevention towards Attack Strategies Chapter 2 Defense against the Survivability to Network Strategies Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security Systems Chapter 4 Secure Channel Allocation in Cognitive Radio-Wireless Sensor Networks Chapter 5 Security Issues in IoT Networks Chapter 6 IoT Ecosystem Implications to Real-World Security Scenario Chapter 7 Design Principles and Privacy in Cloud Computing Chapter 8 Big Data Analysis on Smart Tools and Techniques Chapter 9 Lightweight Security Protocols for Blockchain Technology Chapter 10 Privacy and Challenges to Data-Intensive Techniques Chapter 11 Dynamic Modeling on Malware and Its Defense in Wireless Computer Network Using Pre-Quarantine Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as Human-like Robotic Player for Fighting Game Using Rule-Based Method Chapter 13 Web-Based Smart Agriculture System Index |
|
Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force. WlAbNL |
Form |
Electronic book
|
Author |
Gautam, Kumar, editor
|
|
Saini, Dinesh Kumar, editor
|
|
Cuong, Nguyen Ha Huy, editor
|
ISBN |
9781000171983 |
|
1000171981 |
|