List of Figures |
|
xv | |
List of Tables |
|
xvii | |
Foreword |
|
xix | |
Preface |
|
xxi | |
Acknowledgments |
|
xxv | |
Acronyms |
|
xxvii | |
Part 1 Cybersecurity Concept |
|
|
1 Introduction on Cybersecurity |
|
|
3 | (36) |
|
|
1.1 Introduction to Cybersecurity |
|
|
5 | (1) |
|
1.2 Cybersecurity Objectives |
|
|
6 | (2) |
|
1.3 Cybersecurity Infrastructure and Internet Architecture (NIST) |
|
|
8 | (2) |
|
|
10 | (7) |
|
|
17 | (6) |
|
|
17 | (1) |
|
1.5.2 Traditional Computer Crime and Contemporary Computer Crime |
|
|
18 | (3) |
|
|
21 | (2) |
|
|
23 | (2) |
|
|
25 | (11) |
|
|
27 | (2) |
|
1.8.1 Digital Citizenship |
|
|
29 | (2) |
|
1.8.2 Information Warfare and Its Countermeasures |
|
|
31 | (2) |
|
|
33 | (1) |
|
1.8.4 Good Practices and Policies |
|
|
34 | (1) |
|
1.8.5 Cybersecurity and Human Rights |
|
|
35 | (1) |
|
1.9 Future of Cybersecurity |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
37 | (2) |
|
2 Steganography and Steganalysis |
|
|
39 | (12) |
|
|
|
|
40 | (1) |
|
|
41 | (1) |
|
2.2.1 Method for Evaluating Hidden Information Schema Security |
|
|
41 | (1) |
|
2.2.2 Peak Signal-to-Noise Ratio |
|
|
42 | (1) |
|
|
42 | (4) |
|
2.3.1 Blind Detection Based on LSB |
|
|
43 | (2) |
|
2.3.2 Constraint Steganalysis |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
46 | (5) |
|
3 Security Threats and Vulnerabilities in E-business |
|
|
51 | (10) |
|
|
|
|
3.1 Introduction to e-Business |
|
|
52 | (2) |
|
3.1.1 Benefits of e-Business |
|
|
52 | (1) |
|
3.1.2 Business Revolution |
|
|
53 | (1) |
|
3.2 Security Issues in e-Business |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
55 | (1) |
|
3.2.3 Malware as a Threat |
|
|
55 | (1) |
|
3.3 Common Vulnerabilities in e-Business |
|
|
55 | (1) |
|
|
55 | (1) |
|
3.3.2 Cross-Site Scripting (XSS) |
|
|
56 | (1) |
|
3.4 Threats in e-Business |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
58 | (3) |
|
4 e-Commerce Security: Threats, Issues, and Methods |
|
|
61 | (18) |
|
|
|
|
|
62 | (1) |
|
|
63 | (1) |
|
|
63 | (4) |
|
4.3.1 Characteristics of e-Commerce Technology |
|
|
63 | (1) |
|
4.3.2 Architectural Framework of e-Commerce |
|
|
64 | (2) |
|
4.3.3 Advantages and Disadvantages of e-Commerce |
|
|
66 | (1) |
|
4.4 Security Overview in e-Commerce |
|
|
67 | (1) |
|
4.4.1 Purpose of Security in e-Commerce |
|
|
67 | (1) |
|
4.4.2 Security Element at Different Levels of e-Commerce System |
|
|
67 | (1) |
|
4.5 Security Issues in e-Commerce |
|
|
68 | (1) |
|
|
68 | (1) |
|
4.5.2 Front-End Servers and Software Application Level |
|
|
68 | (1) |
|
4.5.3 Network and Server Level |
|
|
68 | (1) |
|
4.6 Security Threats in e-Commerce |
|
|
69 | (3) |
|
4.7 Security Approaches in e-Commerce |
|
|
72 | (1) |
|
4.8 Comparative Analysis of Various Security Threats in e-Commerce |
|
|
73 | (1) |
|
4.9 e-Commerce Security Life-Cycle Model |
|
|
73 | (2) |
|
|
75 | (1) |
|
|
76 | (3) |
|
|
79 | (14) |
|
|
|
|
R. Rajesh Alias Harinarayan |
|
|
|
|
80 | (2) |
|
|
82 | (3) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
85 | (3) |
|
|
88 | (1) |
|
|
88 | (5) |
Part 2 Cybersecurity in Parallel and Distributed Computing Techniques |
|
|
6 Introduction to Blockchain Technology |
|
|
93 | (16) |
|
|
|
94 | (1) |
|
6.2 Need for Blockchain Security |
|
|
95 | (1) |
|
6.3 Characteristics of Blockchain Technology |
|
|
96 | (1) |
|
|
97 | (1) |
|
6.5 The Architecture of Blockchain Technology |
|
|
97 | (3) |
|
6.6 How Blockchain Technology Works |
|
|
100 | (2) |
|
6.7 Some Other Case Studies for Blockchain Technology |
|
|
102 | (1) |
|
6.8 Challenges Faced by Blockchain Technology |
|
|
103 | (2) |
|
6.9 The Future of Blockchain Technology |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
106 | (3) |
|
7 Cyber-Security Techniques in Distributed Systems, SLAB and other Cyber Regulations |
|
|
109 | (20) |
|
|
|
|
|
110 | (2) |
|
7.1.1 Primary Characteristics of a Distributed System |
|
|
110 | (1) |
|
7.1.2 Major Challenges for Distributed Systems |
|
|
111 | (1) |
|
7.2 Identifying Cyber Requirements |
|
|
112 | (1) |
|
7.3 Popular security mechanisms in Distributed Systems |
|
|
113 | (5) |
|
7.3.1 Secure Communication |
|
|
113 | (2) |
|
7.3.2 Message Integrity and Confidentiality |
|
|
115 | (1) |
|
|
116 | (2) |
|
7.4 Service Level Agreements |
|
|
118 | (4) |
|
|
118 | (1) |
|
7.4.2 Critical Areas for SLAs |
|
|
119 | (3) |
|
7.5 The Cuckoo's Egg in the Context of IT Security |
|
|
122 | (2) |
|
7.6 Searching and Seizing Computer-Related Evidence |
|
|
124 | (2) |
|
7.6.1 Computerized Search Warrants |
|
|
124 | (1) |
|
7.6.2 Searching and Seizing |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
126 | (3) |
|
8 Distributed Computing Security: Issues and Challenges |
|
|
129 | (10) |
|
|
|
|
|
130 | (1) |
|
8.2 Security Issues and Challenges |
|
|
131 | (2) |
|
8.2.1 Confidentiality, Integrity and Availability |
|
|
131 | (1) |
|
8.2.2 Authentication and Access Control Issue |
|
|
132 | (1) |
|
8.2.3 Broken Authentication, Session and Access |
|
|
132 | (1) |
|
8.3 Security Issues and Challenges in Advanced Areas |
|
|
133 | (3) |
|
|
136 | (1) |
|
|
136 | (3) |
|
9 Organization Assignment in Federated Cloud Environments based on Multi-Target Optimization of Security |
|
|
139 | (10) |
|
|
|
|
|
140 | (1) |
|
9.2 Background Work Related to Domain |
|
|
141 | (1) |
|
9.2.1 Basics on Cloud computing |
|
|
141 | (1) |
|
9.2.2 Clouds Which are Federated |
|
|
141 | (1) |
|
9.2.3 Cloud Resource Management |
|
|
141 | (1) |
|
9.3 Architectural-Based Cloud Security Implementation |
|
|
142 | (2) |
|
9.4 Expected Results of the Process |
|
|
144 | (2) |
|
|
146 | (1) |
|
|
146 | (3) |
|
10 An On-Demand and User-friendly Framework for Cloud Data Centre Networks with Performance Guarantee |
|
|
149 | (14) |
|
|
|
|
|
|
150 | (1) |
|
10.1.1 Key Research Problems in This Area |
|
|
150 | (1) |
|
10.1.2 Problems with Interoperability |
|
|
151 | (1) |
|
10.2 Difficulties from a Cloud Adoption Perspective |
|
|
151 | (1) |
|
10.3 Security and Privacy |
|
|
151 | (6) |
|
10.3.1 Resource Provisioning |
|
|
152 | (1) |
|
10.3.2 How Do We Define Cloud? |
|
|
153 | (1) |
|
10.3.3 Public vs Private Cloud-Based Services |
|
|
153 | (1) |
|
10.3.4 Traffic-Aware VM Migration to Load Balance Cloud Servers |
|
|
154 | (3) |
|
10.4 Conclusion and Future Work |
|
|
157 | (1) |
|
|
157 | (6) |
Part 3 Cybersecurity Applications and Case Studies |
|
|
11 Cybersecurity at Organizations: A Delphi Pilot Study of Expert Opinions About Policy and Protection |
|
|
163 | (24) |
|
|
|
|
|
164 | (2) |
|
11.1.1 What is Cybercrime? |
|
|
164 | (1) |
|
11.1.2 What is Cybersecurity? |
|
|
165 | (1) |
|
11.1.3 Purpose of This Cybersecurity Pilot Study |
|
|
165 | (1) |
|
11.1.4 Methods of Cybersecurity Professionals |
|
|
165 | (1) |
|
11.2 Shocking Statistics of Cybercrime |
|
|
166 | (3) |
|
11.2.1 Role of the Internet Crime Complaint Center |
|
|
166 | (2) |
|
11.2.2 2016 Global Economic Crime Survey Report |
|
|
168 | (1) |
|
11.2.3 Inadequate Preparation at Organizations |
|
|
168 | (1) |
|
11.2.4 Organizations: Be Aware, Be Secure |
|
|
168 | (1) |
|
11.3 Cybersecurity Policies for Organizations |
|
|
169 | (3) |
|
11.3.1 Classification of Cybersecurity at an Organization |
|
|
171 | (1) |
|
11.3.2 Pyramid of Cybersecurity |
|
|
171 | (1) |
|
11.4 Blockchain Technology |
|
|
172 | (1) |
|
11.5 Research Methodology |
|
|
173 | (3) |
|
11.5.1 Quantitative and Qualitative Data Collection |
|
|
173 | (1) |
|
11.5.2 Design of the Study |
|
|
174 | (1) |
|
11.5.3 Selection of the Delphi Method |
|
|
174 | (1) |
|
11.5.4 Procedure of Utilization of the Delphi Method |
|
|
175 | (1) |
|
11.5.5 Delphi Activities (Iteration Rounds) of This Pilot Study |
|
|
175 | (1) |
|
11.6 Results of the Cybersecurity Delphi Study |
|
|
176 | (7) |
|
11.6.1 Results from Round One |
|
|
176 | (2) |
|
11.6.2 Results of Round Two |
|
|
178 | (3) |
|
11.6.3 Discussion and Limitations Based on the Results |
|
|
181 | (2) |
|
|
183 | (1) |
|
11.7.1 The Literature in the Field |
|
|
183 | (1) |
|
11.7.2 Next Steps for Future Research |
|
|
184 | (1) |
|
|
184 | (3) |
|
12 Smartphone Triggered Security Challenges - Issues, Case Studies and Prevention |
|
|
187 | (20) |
|
Saurabh Ranjan Srivastava |
|
|
|
|
|
|
188 | (1) |
|
12.2 Classification of Mobile Security Threats |
|
|
188 | (4) |
|
|
189 | (1) |
|
|
189 | (1) |
|
12.2.3 Application-Based Threats |
|
|
189 | (1) |
|
12.2.4 Network-Based Threats |
|
|
190 | (1) |
|
12.2.5 Data Transfer-Based Threats |
|
|
191 | (1) |
|
12.2.6 Improper Session Management-Based Threats |
|
|
191 | (1) |
|
12.2.7 Bluetooth-Based Threats |
|
|
191 | (1) |
|
12.2.8 Application Platform-Based Threats |
|
|
192 | (1) |
|
12.3 Smartphones as a Tool of Crime |
|
|
192 | (1) |
|
12.4 Types of Mobile Phone-Related Crimes |
|
|
193 | (3) |
|
12.5 Types of Mobile Fraud |
|
|
196 | (2) |
|
|
198 | (3) |
|
12.6.1 Mobile Identity Theft |
|
|
198 | (2) |
|
12.6.2 Data Theft by Applications |
|
|
200 | (1) |
|
|
200 | (1) |
|
12.7 Preventive Measures and Precautions |
|
|
201 | (3) |
|
12.7.1 Against Physical Loss and Theft of the Mobile Device |
|
|
201 | (1) |
|
12.7.2 Against SMiShing Attacks |
|
|
202 | (1) |
|
12.7.3 Against App-Based Attacks |
|
|
203 | (1) |
|
12.7.4 Against Identity Theft and SIM Card Fraud |
|
|
203 | (1) |
|
|
204 | (1) |
|
|
205 | (2) |
|
13 Cybersecurity: A Practical Strategy Against Cyber Threats, Risks with Real World Usages |
|
|
207 | (14) |
|
|
|
|
|
208 | (1) |
|
|
209 | (1) |
|
13.3 Arms Control in Cyberwar |
|
|
210 | (1) |
|
13.4 Internet Security Alliance |
|
|
211 | (1) |
|
13.5 Cybersecurity Information Sharing Act |
|
|
212 | (2) |
|
|
214 | (1) |
|
13.7 Mobile Cybersecurity |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
13.10 Cybersecurity Application in Our Life |
|
|
218 | (1) |
|
|
219 | (1) |
|
|
219 | (2) |
|
14 Security in Distributed Operating System: A Comprehensive Study |
|
|
221 | (10) |
|
Sushree Bibhuprada B. Priyadarshini |
|
|
|
|
14.1 Introduction to Security and Distributed Systems |
|
|
222 | (3) |
|
14.2 Relevant Terminology |
|
|
225 | (1) |
|
14.3 Types of External Attacks |
|
|
225 | (3) |
|
14.4 Globus Security Architecture |
|
|
228 | (1) |
|
14.5 Distribution of Security Mechanism |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
230 | (1) |
|
15 Security in Healthcare Applications based on Fog and Cloud Computing |
|
|
231 | (14) |
|
|
|
|
|
232 | (1) |
|
15.2 Security Needs of Healthcare Sector |
|
|
233 | (1) |
|
|
233 | (1) |
|
15.2.2 Data Confidentiality |
|
|
233 | (1) |
|
15.2.3 Authentication and Authorization |
|
|
233 | (1) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
234 | (1) |
|
15.3 Solutions to Probable Attacks in e-Healthcare |
|
|
234 | (6) |
|
|
235 | (1) |
|
15.3.2 Data Collision Attack |
|
|
235 | (1) |
|
15.3.3 Desynchronization Attack |
|
|
235 | (1) |
|
|
236 | (1) |
|
15.3.5 Man-in-the-Middle Attack |
|
|
236 | (1) |
|
15.3.6 Denial-of-Service (DoS) Attack |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
238 | (1) |
|
15.3.9 Attacks on Virtual Machine and Hypervisor |
|
|
239 | (1) |
|
15.4 Emerging Threats in Cloud- and Fog-Based Healthcare System |
|
|
240 | (1) |
|
15.4.1 Software Supply Chain Attacks |
|
|
240 | (1) |
|
15.4.2 Ransomware Attacks |
|
|
240 | (1) |
|
15.4.3 Crypto-Mining and Crypto-Jacking Malware |
|
|
240 | (1) |
|
|
241 | (1) |
|
|
241 | (4) |
|
16 Mapping of e-Wallets with Features |
|
|
245 | |
|
|
|
|
|
|
246 | (4) |
|
|
246 | (1) |
|
|
247 | (3) |
|
16.2 Review of Literature |
|
|
250 | (1) |
|
16.3 Market Share of e-Wallet |
|
|
251 | (2) |
|
16.3.1 Technical Features |
|
|
252 | (1) |
|
|
252 | (1) |
|
16.3.3 Operational Features |
|
|
253 | (1) |
|
|
253 | (1) |
|
16.4 Research Methodology |
|
|
253 | (2) |
|
|
255 | (1) |
|
16.6 Conclusions and future work |
|
|
256 | (1) |
|
|
256 | |