Muutke küpsiste eelistusi

E-raamat: Cyber Security: Issues and Current Trends

  • Formaat - PDF+DRM
  • Hind: 172,28 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book presents various areas related to cybersecurity. Different techniques and tools used by cyberattackers to exploit a system are thoroughly discussed and analyzed in their respective chapters. The content of the book provides an intuition of various issues and challenges of cybersecurity that can help readers to understand and have awareness about it. It starts with a very basic introduction of security, its varied domains, and its implications in any working organization; moreover, it will talk about the risk factor of various attacks and threats. The concept of privacy and anonymity has been taken into consideration in consecutive chapters. Various topics including, The Onion Router (TOR) and other anonymous services, are precisely discussed with a practical approach. Further, chapters to learn the importance of preventive measures such as intrusion detection system (IDS) are also covered. Due to the existence of severe cyberattacks, digital forensics is a must for investigating the crime and to take precautionary measures for the future occurrence of such attacks. A detailed description of cyberinvestigation is covered in a chapter to get readers acquainted with the need and demands. This chapter deals with evidence collection from the victim's device and the system that has importance in the context of an investigation. Content covered in all chapters is foremost and reported in the current trends in several journals and cybertalks.





 





The proposed book is helpful for any reader who is using a computer or any such electronic gadget in their daily routine. The content of the book is prepared to work as a resource to any undergraduate and graduate-level student to get aware about the concept of cybersecurity, various cyberattacks, and threats in the security.  In addition to that, it aimed at assisting researchers and developers to build a strong foundation for security provisioning in any newer technology which they are developing.
1 Introduction to Cybersecurity
1(16)
1 Introduction to Cybersecurity
1(2)
1.1 Introduction
1(1)
1.2 The Necessity of Cybersecurity
1(1)
1.3 Cybersecurity and Ethics
2(1)
2 Domains of Cybersecurity
3(5)
3 Threats and Actors
8(4)
3.1 Threats in Cyberspace
9(1)
3.2 Types of Threats
9(2)
3.3 Threat Actors and Types of Threat Actors
11(1)
4 Recent Attacks
12(1)
5 Awareness of Cybersecurity in Educational System
13(1)
6 The Outline of the Book
14(2)
References
16(1)
2 Being Hidden and Anonymous
17(20)
1 Introduction
17(4)
1.1 The Need for Anonymity
18(3)
2 The Onion Router
21(1)
3 Invisible Internet Project (IIP or I2P)
22(8)
3.1 Working of I2P
25(5)
4 Freenet
30(3)
5 Java Anon Proxy (JAP)
33(2)
6 Summary
35(1)
References
36(1)
3 TOR--The Onion Router
37(20)
1 Introduction
37(2)
2 TOR--The Onion Router
39(4)
2.1 Onion Routing
41(2)
3 TOR Browser Installation
43(3)
4 TOR Entities
46(2)
5 TOR Status
48(1)
6 TOR for Mobile--Orbot
49(3)
7 Loopholes in TOR
52(2)
8 What not to Use in TOR
54(1)
References
55(2)
4 DarkNet and Hidden Services
57(14)
1 Introduction
57(1)
2 TOR and Its Hidden Service
58(3)
3 Essential Concepts of TOR Hidden Services
61(2)
4 Installation of Hidden Service in Linux
63(5)
5 Countermeasures to Secure Your Own Hidden Service
68(1)
References
69(2)
5 Introduction to Digital Forensics
71(30)
1 Introduction to Forensics
71(1)
2 Cyberforensic Process
72(3)
3 Different Artifacts and Forensic Tools
75(8)
3.1 Autopsy
78(1)
3.2 Dumplt
79(3)
3.3 Belkasoft Live RAM Capturer
82(1)
4 Artifacts Gathering
83(9)
4.1 Browser Artifacts
83(2)
4.2 Registry Artifacts
85(4)
4.3 Bulk Extractor
89(3)
5 Network Forensics
92(8)
5.1 ARP Cache Poisoning
94(1)
5.2 Port Mirroring
95(2)
5.3 Flooding
97(1)
5.4 Dynamic Host Control Protocol (DHCP) Redirection
98(1)
5.5 Detection of TOR Traffic in the Captured Traffic
98(2)
6 Conclusion
100(1)
References
100(1)
6 Intrusion Detection Systems Fundamentals
101(28)
1 Introduction to Intrusion Detection System
101(1)
2 Techniques to Combat Cyberthreats
102(5)
2.1 Firewall
103(1)
2.2 Authentication
104(2)
2.3 Authorization
106(1)
2.4 Encryption
106(1)
2.5 Intrusion Detection System
106(1)
3 Network-Based Intrusion Detection System (NIDS)
107(1)
4 Host-Based Intrusion Detection System (HIDS)
108(2)
5 Distributed Intrusion Detection System (DIDS)
110(3)
5.1 Signature-Based Analysis
112(1)
5.2 Anomaly-Based Analysis
112(1)
6 Snort--Network-Based Intrusion Detection System
113(9)
6.1 Additional Snort Add-Ons
114(1)
6.2 Installation of Snort in Linux
115(5)
6.3 Snort Rules
120(1)
6.4 Rule Header
121(1)
6.5 Rules Options
122(1)
7 Open-Source Host-Based Intrusion Detection System (OSSEC)
122(4)
7.1 Installation of OSSEC in Linux
124(2)
8 Summary
126(1)
References
126(3)
7 Introduction to Malware Analysis
129(14)
1 Introduction of Malware
129(1)
2 Types of Malware
130(2)
3 Malware Symptoms
132(1)
4 Need of Malware Analysis and Spreading Mechanism
132(2)
4.1 Need for Malware Analysis
133(1)
4.2 Malware Spreading Mechanism
133(1)
5 Malware Analysis Prerequisites
134(1)
6 Malware Analysis Environment
135(1)
7 Malware Detection System and Analysis
135(4)
7.1 Malware Detection
136(1)
7.2 Malware Analysis
137(2)
8 Conclusion
139(1)
References
139(4)
8 Design of a Virtual Cybersecurity Lab
143(16)
1 Introduction of Cybersecurity
143(1)
2 Tools for Cybersecurity
144(1)
3 Virtualization for Cybersecurity
145(3)
4 Installation and Configuration of VMWare Workstation
148(1)
5 Network Modes in Virtual Machines
149(1)
6 Cybersecurity and Various Attacks
149(1)
7 Defense Strategies Against Various Attacks
150(4)
8 Case Study on Website Attacks
154(2)
9 Conclusion
156(1)
References
156(3)
9 Importance of Cyberlaw
159(15)
1 Introduction
159(2)
2 Why Cyberlaw is Necessary
161(2)
3 Global Landscape of Cyberlaw
163(3)
4 Cybercrimes
166(7)
4.1 Categories of Cybercrime
168(1)
4.2 Types of Cybercrime
168(5)
5 Conclusion
173(1)
References 174
Nitul Dutta is currently working as an Associate Professor in the Computer Science and Engineering Department at SRM University, Andhra Pradesh. He received his B.E. degree in Computer Science and Engineering from Jorhat Engineering College, Assam and M. Tech. in Information Technology from Tezpur University, Assam. He completed his Ph.D. (Engineering) in the field of Computer Networking from Jadavpur University, West Bengal (2013). He also worked as a Post-Doctoral Fellow (PDF) at Jan Wyzykowski University, Polkowice, Poland. He worked in Tezpur Central University, for nearly nine years, worked at Marwadi University Rajkot, Gujarat and Sikkim Manipal Institute of Technology, Sikkim prior to joining the current assignment. His current research interests are Information Centric Network, mobility management in IPv6 based networks and cognitive radio networks. He is a senior member of IEEE and vice-chair of IEEE Computational Intelligence Society, Gujarat section. He also published more than 30 papers in International journals of repute.  He also published two books, Recent Developments on Industrial Control Systems Resilience (Edited), Springer, 2020 and Information Centric Networks (ICN): Architecture & Current Trends, (Reference), Springer, 2021.  Nilesh Jadav is currently working as an assistant professor in the Computer Engineering Department of Marwadi University, Gujarat, India. He completed his Master of Engineering in the field of wireless network from Gujarat Technological University, India. His current research interest includes wireless communication, network traffic analysis and network security. Sudeep Tanwar (Senior Member, IEEE) is currently working as a Professor with the Computer Science and Engineering Department, Institute of Technology, Nirma University, India. He is also a Visiting Professor with Jan Wyzykowski University, Polkowice, Poland, and the University of Pitesti in Pitesti, Romania. He received B.Tech in 2002 from Kurukshetra University, India, M.Tech (Honors) in 2009 from Guru Gobind Singh Indraprastha University, Delhi, India and Ph.D. in 2016 with specialization in Wireless Sensor Network from Mewar University, India. He has authored two books and edited 13 books, more than 250 technical articles, including top journals and top conferences, such as IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, IEEE WIRELESS COMMUNICATIONS, IEEE NETWORKS, ICC, GLOBECOM, and INFOCOM. He initiated the research field of blockchain technology adoption in various verticals, in 2017. His H-index is 43. He actively serves his research communities in various roles. His research interests include blockchain technology, wireless sensor networks, fog computing, smart grid, and the IoT. He is a Final Voting Member of the IEEE ComSoc Tactile Internet Committee, in 2020. He is a Senior Member of IEEE, Member of CSI, IAENG, ISTE, and CSTA, and a member of the Technical Committee on Tactile Internet of IEEE Communication Society. He has been awarded the Best Research Paper Awards from IEEE IWCMC-2021, IEEE GLOBECOM 2018, IEEE ICC 2019, and Springer ICRIC-2019. He has served many international conferences as a member of the Organizing Committee, such as the Publication Chair for FTNCT-2020, ICCIC 2020, and WiMob2019, a member of the Advisory Board for ICACCT-2021 and ICACI 2020, a Workshop Co-Chair for CIS 2021, and a General Chair for IC4S 2019, 2020, and ICCSDF 2020. He is also serving the editorial boards of Physical Communication, Computer Communications, International Journal of Communication System, and Security and Privacy. He is also leading the ST Research Laboratory, where group members are working on the latest cutting-edge technologies. Hiren Kumar Deva Sarma is currently a professor in the Department of Information Technology, Sikkim Manipal Institute of Technology, Sikkim. He received a B.E. degree in Mechanical Engineering from Assam Engineering College in 1998. He completed Master of Technology in Information Technology from Tezpur University in 2000. He received his Ph.D. degree from Jadavpur University (Department of Computer Science and Engineering) in 2013. He is a recipient of Young Scientist Award from International Union of Radio Science (URSI) awarded in the XVIII General Assembly 2005, held at New Delhi, India. Dr. Sarma received IEEE Early Adopter Award in the year 2014. He has published more than seventy research papers in different International Journals, referred International and National Conferences of repute.  His current research interests are wireless sensor networks, mobility management in IPv6-based network, cognitive radio networks, ICN, network security, robotics, distributed computing and big data analytics. Emil Pricop is currently an Associate Professor and the Head of the Automatic Control, Computers and Electronics Department of the Petroleum-Gas University of Ploiesti, Romania. Also, he is an invited professor at the Computer Engineering Department of Faculty of Engineering (FoE), Marwadi University, Rajkot, Gujarat, India. He has held the position of Senior Lecturer since 2018. Dr. Pricop is teaching computer networking, software engineering, human-computer interaction, and critical infrastructure protection courses. He received his Ph.D. in Systems Engineering from Petroleum-Gas University of Ploiesti by defending in May 2017 the thesis Research regarding the security of control systems. His research interest is cybersecurity, focusing primarily on industrial control systems security. Dr. Emil Pricop is co-editor of two books published by Springer, namely Recent Advances in Systems Safety & Security (Springer, 2016) and Recent Developments on Industrial Control Systems Resilience (Springer, 2020). Also, Dr. Pricop is the author or co-author of 2 national (Romanian) patents, six (6) book chapters published in books edited by Springer and over 30 papers in journals or international conferences. Since 2013, Dr. Pricop is the initiator and chairman of the International Workshop on Systems Safety and Security IWSSS, a prestigious scientific event organized annually. Dr. Pricop participated in more than 100 technical program committees of prestigious international conferences organized under the auspices of IEEE. He has held the vice-chair position of the IEEE Young Professionals Affinity Group - Romania Section from 2017 to 2019.