Limit search to available items
Book Cover
E-book

Title Cyber Defense Mechanisms : Security, Privacy, and Challenges / Gautam Kumar, Dinesh Kumar Saini, Nguyen Ha Huy Cuong
Edition 1st
Published CRC Press, 2020

Copies

Description 1 online resource (216 pages : 68 illustrations)
Series Artificial Intelligence (AI): Elementary to Advanced Practices Ser
Artificial Intelligence (AI): Elementary to Advanced Practices Ser
Contents Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Editors -- Contributors -- Chapter 1 Security Threat Analysis and Prevention towards Attack Strategies -- 1.1 Introduction -- 1.2 History of Security Breaches -- 1.3 Common Security Threats -- 1.3.1 Malware -- 1.3.2 Phishing -- 1.3.3 Spear Phishing -- 1.3.4 "Man in the Middle" (MitM) Attack -- 1.3.5 Trojans -- 1.3.6 Ransomware -- 1.3.7 Denial-of-Service Attack or Distributed Denial-of-Service Attack (DDoS) -- 1.3.8 Attacks on IoT Devices -- 1.3.9 Data Breaches -- 1.3.10 Malware on Mobile Apps
1.4 Security Challenges in Modern Day -- 1.4.1 Cloud Computing -- 1.4.2 Social Media -- 1.4.3 Smart Phones -- 1.4.4 General Data Protection Regulations (GDPR) -- 1.4.5 Attacks Based on Machine Learning and AI -- 1.4.6 Attacks against Cryptocurrencies and Blockchain Systems -- 1.4.7 Switching to DevOps -- 1.4.8 Biometric Authentication -- 1.4.9 Fileless Malware -- 1.5 Attack Strategies and Brief Study on Advanced Persistent Threat (APT) -- 1.5.1 How an APT Attack Works -- 1.5.2 Some Instances of APTs -- 1.5.3 Characteristics of APTs -- 1.6 Prevention Measures -- 1.6.1 Identify the Threats
1.6.2 Beware of Cybercrimes -- 1.6.3 Observe All Stakeholders -- 1.6.4 Usage of Two-Factor Authentication -- 1.6.5 Conduct Regular Audits -- 1.6.6 Draft a Credit Sign-Off Policy -- 1.6.7 Protect Vital Data -- 1.6.8 Perform Risk Assessments -- 1.6.9 Insure against Cybercrime -- 1.6.10 Gather In-Depth Knowledge about Risk Factors -- 1.7 Threat Modeling -- 1.8 Role of a Threat Analyst -- 1.9 Summary -- References -- Chapter 2 Defense against the Survivability to Network Strategies -- 2.1 Introduction -- 2.2 Survivability Network Architecture-SONET and Self-Healing Ring Transportation
2.3 Single-Access Optical Network Ring Architecture -- 2.4 Multiaccess Optical Network Ring Architecture -- 2.5 Channel Demand Routing Ring Architecture -- 2.6 Result -- 2.7 Conclusion -- References -- Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security Systems -- 3.1 Introduction -- 3.2 Background Knowledge of CPS -- 3.3 Application Areas of Cyber-Physical System (CPS) -- 3.4 Philosophical Issues of CPS -- 3.5 Principle of CPS Operation -- 3.6 Architecture of CPS -- 3.6.1 Physical Layer -- 3.6.2 Data Link Layer -- 3.6.3 Network Layer -- 3.6.4 Transport Layer
3.6.5 Session Layer -- 3.6.6 Presentation Layer -- 3.6.7 Application Layer -- 3.7 Self-Adaptive Patterns -- 3.7.1 Synthesis Utilized Pattern -- 3.7.2 Synthesis Command Patterns -- 3.7.3 Collect Organized Patterns -- 3.8 Security Threats of CPS -- 3.9 Attacks on CPS -- 3.10 Attacks and Its Consequences -- 3.11 Adversaries' Characteristics -- 3.12 Conclusion -- References -- Chapter 4 Secure Channel Allocation in Cognitive Radio-Wireless Sensor Networks -- 4.1 Introduction -- 4.2 Related Works -- 4.3 System Model -- 4.4 Common Attacks in CR-WSN -- 4.4.1 Replay Attack -- 4.4.2 Node-Targeted Attack
Notes Chapter 1 Security Threat Analysis and Prevention towards Attack Strategies Chapter 2 Defense against the Survivability to Network Strategies Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security Systems Chapter 4 Secure Channel Allocation in Cognitive Radio-Wireless Sensor Networks Chapter 5 Security Issues in IoT Networks Chapter 6 IoT Ecosystem Implications to Real-World Security Scenario Chapter 7 Design Principles and Privacy in Cloud Computing Chapter 8 Big Data Analysis on Smart Tools and Techniques Chapter 9 Lightweight Security Protocols for Blockchain Technology Chapter 10 Privacy and Challenges to Data-Intensive Techniques Chapter 11 Dynamic Modeling on Malware and Its Defense in Wireless Computer Network Using Pre-Quarantine Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as Human-like Robotic Player for Fighting Game Using Rule-Based Method Chapter 13 Web-Based Smart Agriculture System Index
Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force. WlAbNL
Form Electronic book
Author Gautam, Kumar, editor
Saini, Dinesh Kumar, editor
Cuong, Nguyen Ha Huy, editor
ISBN 9781000171983
1000171981