Muutke küpsiste eelistusi

Cyber Security in Parallel and Distributed Computing: Concepts, Techniques, Applications and Case Studies [Kõva köide]

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formaat: Hardback, 294 pages, kõrgus x laius x paksus: 10x10x10 mm, kaal: 454 g
  • Ilmumisaeg: 15-Mar-2019
  • Kirjastus: Wiley-Scrivener
  • ISBN-10: 1119488052
  • ISBN-13: 9781119488057
Teised raamatud teemal:
  • Formaat: Hardback, 294 pages, kõrgus x laius x paksus: 10x10x10 mm, kaal: 454 g
  • Ilmumisaeg: 15-Mar-2019
  • Kirjastus: Wiley-Scrivener
  • ISBN-10: 1119488052
  • ISBN-13: 9781119488057
Teised raamatud teemal:

The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field. It also includes various real-time/offline applications and case studies in the fields of engineering and computer science and the modern tools and technologies used. Information on cybersecurity technologies is organized in the fifteen chapters of this book.

This important book cover subjects such as:

  • Research and solutions for the problem of hidden image detection
  • Security aspects of data mining and possible solution techniques
  • A comparative analysis of various methods used in e-commerce security and how to perform secure payment transactions in an efficient manner
  • Blockchain technology and how it is crucial to the security industry
  • Security for the Internet of Things
  • Security issues and challenges in distributed computing security such as heterogeneous computing, cloud computing, fog computing, etc.
  • Demonstrates the administration task issue in unified cloud situations as a multi-target enhancement issue in light of security
  • Explores the concepts of cybercrime and cybersecurity and presents the statistical impact it is having on organizations
  • Highlights some strategies for maintaining the privacy, integrity, confidentiality and availability of cyber information and its real-world impacts such as mobile security software for secure email and online banking, cyber health check programs for business, cyber incident response management, cybersecurity risk management
  • Security policies and mechanisms, various categories of attacks (e.g., denial-of-service),  global security architecture, along with distribution of security mechanisms
  • Security issues in the healthcare sector with existing solutions and emerging threats.
List of Figures xv
List of Tables xvii
Foreword xix
Preface xxi
Acknowledgments xxv
Acronyms xxvii
Part 1 Cybersecurity Concept
1 Introduction on Cybersecurity
3(36)
Ishaani Priyadarshini
1.1 Introduction to Cybersecurity
5(1)
1.2 Cybersecurity Objectives
6(2)
1.3 Cybersecurity Infrastructure and Internet Architecture (NIST)
8(2)
1.4 Cybersecurity Roles
10(7)
1.5 Cybercrimes
17(6)
1.5.1 Overview
17(1)
1.5.2 Traditional Computer Crime and Contemporary Computer Crime
18(3)
1.5.3 Combating Crimes
21(2)
1.6 Security Models
23(2)
1.7 Computer Forensics
25(11)
1.8 Cyber Insurance
27(2)
1.8.1 Digital Citizenship
29(2)
1.8.2 Information Warfare and Its Countermeasures
31(2)
1.8.3 Network Neutrality
33(1)
1.8.4 Good Practices and Policies
34(1)
1.8.5 Cybersecurity and Human Rights
35(1)
1.9 Future of Cybersecurity
36(1)
1.10 Conclusion
36(1)
References
37(2)
2 Steganography and Steganalysis
39(12)
Ho Thi Huong Thom
Nguyen Kim Anh
2.1 Introduction
40(1)
2.2 Steganography
41(1)
2.2.1 Method for Evaluating Hidden Information Schema Security
41(1)
2.2.2 Peak Signal-to-Noise Ratio
42(1)
2.3 Steganalysis
42(4)
2.3.1 Blind Detection Based on LSB
43(2)
2.3.2 Constraint Steganalysis
45(1)
2.4 Conclusion
46(1)
References
46(5)
3 Security Threats and Vulnerabilities in E-business
51(10)
Satya Narayan Tripathy
Sisira Kumar Kapat
Susanta Kumar Das
3.1 Introduction to e-Business
52(2)
3.1.1 Benefits of e-Business
52(1)
3.1.2 Business Revolution
53(1)
3.2 Security Issues in e-Business
54(1)
3.2.1 Vulnerabilities
54(1)
3.2.2 Security Attacks
55(1)
3.2.3 Malware as a Threat
55(1)
3.3 Common Vulnerabilities in e-Business
55(1)
3.3.1 Phishing
55(1)
3.3.2 Cross-Site Scripting (XSS)
56(1)
3.4 Threats in e-Business
56(1)
3.4.1 Ransomware
56(1)
3.4.2 Spyware
56(1)
3.4.3 Worms
57(1)
3.4.4 Trojan Horse
57(1)
3.5 Prevention Mechanism
57(1)
3.6 Conclusion
58(1)
References
58(3)
4 e-Commerce Security: Threats, Issues, and Methods
61(18)
Prerna Sharma
Deepak Gupta
Ashish Khanna
4.1 Introduction
62(1)
4.2 Literature Review
63(1)
4.3 e-Commerce
63(4)
4.3.1 Characteristics of e-Commerce Technology
63(1)
4.3.2 Architectural Framework of e-Commerce
64(2)
4.3.3 Advantages and Disadvantages of e-Commerce
66(1)
4.4 Security Overview in e-Commerce
67(1)
4.4.1 Purpose of Security in e-Commerce
67(1)
4.4.2 Security Element at Different Levels of e-Commerce System
67(1)
4.5 Security Issues in e-Commerce
68(1)
4.5.1 Client Level
68(1)
4.5.2 Front-End Servers and Software Application Level
68(1)
4.5.3 Network and Server Level
68(1)
4.6 Security Threats in e-Commerce
69(3)
4.7 Security Approaches in e-Commerce
72(1)
4.8 Comparative Analysis of Various Security Threats in e-Commerce
73(1)
4.9 e-Commerce Security Life-Cycle Model
73(2)
4.10 Conclusion
75(1)
References
76(3)
5 Cyberwar is Coming
79(14)
T. Manikandan
B. Balamurugan
C. Senthilkumar
R. Rajesh Alias Harinarayan
R. Raja Subramanian
5.1 Introduction
80(2)
5.2 Ransomware Attacks
82(3)
5.2.1 Petya
83(1)
5.2.2 WannaCry
83(1)
5.2.3 Locky
84(1)
5.3 Are Nations Ready?
85(3)
5.4 Conclusion
88(1)
References
88(5)
Part 2 Cybersecurity in Parallel and Distributed Computing Techniques
6 Introduction to Blockchain Technology
93(16)
Ishaani Priyadarshini
6.1 Introduction
94(1)
6.2 Need for Blockchain Security
95(1)
6.3 Characteristics of Blockchain Technology
96(1)
6.4 Types of Blockchains
97(1)
6.5 The Architecture of Blockchain Technology
97(3)
6.6 How Blockchain Technology Works
100(2)
6.7 Some Other Case Studies for Blockchain Technology
102(1)
6.8 Challenges Faced by Blockchain Technology
103(2)
6.9 The Future of Blockchain Technology
105(1)
6.10 Conclusion
106(1)
References
106(3)
7 Cyber-Security Techniques in Distributed Systems, SLAB and other Cyber Regulations
109(20)
Soumitra Ghosh
Anjana Mishra
Brojo Kishore Mishra
7.1 Introduction
110(2)
7.1.1 Primary Characteristics of a Distributed System
110(1)
7.1.2 Major Challenges for Distributed Systems
111(1)
7.2 Identifying Cyber Requirements
112(1)
7.3 Popular security mechanisms in Distributed Systems
113(5)
7.3.1 Secure Communication
113(2)
7.3.2 Message Integrity and Confidentiality
115(1)
7.3.3 Access Controls
116(2)
7.4 Service Level Agreements
118(4)
7.4.1 Types of SLAs
118(1)
7.4.2 Critical Areas for SLAs
119(3)
7.5 The Cuckoo's Egg in the Context of IT Security
122(2)
7.6 Searching and Seizing Computer-Related Evidence
124(2)
7.6.1 Computerized Search Warrants
124(1)
7.6.2 Searching and Seizing
125(1)
7.7 Conclusion
126(1)
References
126(3)
8 Distributed Computing Security: Issues and Challenges
129(10)
Munmun Saha
Sanjaya Kumar Panda
Suvasini Panigrahi
8.1 Introduction
130(1)
8.2 Security Issues and Challenges
131(2)
8.2.1 Confidentiality, Integrity and Availability
131(1)
8.2.2 Authentication and Access Control Issue
132(1)
8.2.3 Broken Authentication, Session and Access
132(1)
8.3 Security Issues and Challenges in Advanced Areas
133(3)
8.4 Conclusion
136(1)
References
136(3)
9 Organization Assignment in Federated Cloud Environments based on Multi-Target Optimization of Security
139(10)
Abhishek Kumar
Palvadi Srinivas Kumar
T.V.M. Sairam
9.1 Introduction
140(1)
9.2 Background Work Related to Domain
141(1)
9.2.1 Basics on Cloud computing
141(1)
9.2.2 Clouds Which are Federated
141(1)
9.2.3 Cloud Resource Management
141(1)
9.3 Architectural-Based Cloud Security Implementation
142(2)
9.4 Expected Results of the Process
144(2)
9.5 Conclusion
146(1)
References
146(3)
10 An On-Demand and User-friendly Framework for Cloud Data Centre Networks with Performance Guarantee
149(14)
P. Srinivas Kumar
Abhishek Kumar
Pramod Singh Rathore
Jyotir Moy Chatterjee
10.1 Introduction
150(1)
10.1.1 Key Research Problems in This Area
150(1)
10.1.2 Problems with Interoperability
151(1)
10.2 Difficulties from a Cloud Adoption Perspective
151(1)
10.3 Security and Privacy
151(6)
10.3.1 Resource Provisioning
152(1)
10.3.2 How Do We Define Cloud?
153(1)
10.3.3 Public vs Private Cloud-Based Services
153(1)
10.3.4 Traffic-Aware VM Migration to Load Balance Cloud Servers
154(3)
10.4 Conclusion and Future Work
157(1)
References
157(6)
Part 3 Cybersecurity Applications and Case Studies
11 Cybersecurity at Organizations: A Delphi Pilot Study of Expert Opinions About Policy and Protection
163(24)
Holly Reitmeier
Jolanda Tromp
John Bottoms
11.1 Introduction
164(2)
11.1.1 What is Cybercrime?
164(1)
11.1.2 What is Cybersecurity?
165(1)
11.1.3 Purpose of This Cybersecurity Pilot Study
165(1)
11.1.4 Methods of Cybersecurity Professionals
165(1)
11.2 Shocking Statistics of Cybercrime
166(3)
11.2.1 Role of the Internet Crime Complaint Center
166(2)
11.2.2 2016 Global Economic Crime Survey Report
168(1)
11.2.3 Inadequate Preparation at Organizations
168(1)
11.2.4 Organizations: Be Aware, Be Secure
168(1)
11.3 Cybersecurity Policies for Organizations
169(3)
11.3.1 Classification of Cybersecurity at an Organization
171(1)
11.3.2 Pyramid of Cybersecurity
171(1)
11.4 Blockchain Technology
172(1)
11.5 Research Methodology
173(3)
11.5.1 Quantitative and Qualitative Data Collection
173(1)
11.5.2 Design of the Study
174(1)
11.5.3 Selection of the Delphi Method
174(1)
11.5.4 Procedure of Utilization of the Delphi Method
175(1)
11.5.5 Delphi Activities (Iteration Rounds) of This Pilot Study
175(1)
11.6 Results of the Cybersecurity Delphi Study
176(7)
11.6.1 Results from Round One
176(2)
11.6.2 Results of Round Two
178(3)
11.6.3 Discussion and Limitations Based on the Results
181(2)
11.7 Conclusion
183(1)
11.7.1 The Literature in the Field
183(1)
11.7.2 Next Steps for Future Research
184(1)
References
184(3)
12 Smartphone Triggered Security Challenges - Issues, Case Studies and Prevention
187(20)
Saurabh Ranjan Srivastava
Sachin Dube
Gulshan Shrivastava
Kavita Sharma
12.1 Introduction
188(1)
12.2 Classification of Mobile Security Threats
188(4)
12.2.1 Physical Threats
189(1)
12.2.2 Web-Based Threats
189(1)
12.2.3 Application-Based Threats
189(1)
12.2.4 Network-Based Threats
190(1)
12.2.5 Data Transfer-Based Threats
191(1)
12.2.6 Improper Session Management-Based Threats
191(1)
12.2.7 Bluetooth-Based Threats
191(1)
12.2.8 Application Platform-Based Threats
192(1)
12.3 Smartphones as a Tool of Crime
192(1)
12.4 Types of Mobile Phone-Related Crimes
193(3)
12.5 Types of Mobile Fraud
196(2)
12.6 Case Studies
198(3)
12.6.1 Mobile Identity Theft
198(2)
12.6.2 Data Theft by Applications
200(1)
12.6.3 SIM Card Fraud
200(1)
12.7 Preventive Measures and Precautions
201(3)
12.7.1 Against Physical Loss and Theft of the Mobile Device
201(1)
12.7.2 Against SMiShing Attacks
202(1)
12.7.3 Against App-Based Attacks
203(1)
12.7.4 Against Identity Theft and SIM Card Fraud
203(1)
12.8 Conclusion
204(1)
References
205(2)
13 Cybersecurity: A Practical Strategy Against Cyber Threats, Risks with Real World Usages
207(14)
Anjana Mishra
Soumitra Ghosh
Brojo Kishore Mishra
13.1 Introduction
208(1)
13.2 Cyberwar
209(1)
13.3 Arms Control in Cyberwar
210(1)
13.4 Internet Security Alliance
211(1)
13.5 Cybersecurity Information Sharing Act
212(2)
13.6 Market for Malware
214(1)
13.7 Mobile Cybersecurity
215(1)
13.8 Healthcare
216(1)
13.9 Human Rights
217(1)
13.10 Cybersecurity Application in Our Life
218(1)
13.11 Conclusion
219(1)
References
219(2)
14 Security in Distributed Operating System: A Comprehensive Study
221(10)
Sushree Bibhuprada B. Priyadarshini
Amiya Bhusan Bagjadab
Brojo Kishore Mishra
14.1 Introduction to Security and Distributed Systems
222(3)
14.2 Relevant Terminology
225(1)
14.3 Types of External Attacks
225(3)
14.4 Globus Security Architecture
228(1)
14.5 Distribution of Security Mechanism
229(1)
14.6 Conclusions
230(1)
References
230(1)
15 Security in Healthcare Applications based on Fog and Cloud Computing
231(14)
Rojalina Priyadarshini
Mohit Ranjan Panda
Brojo Kishore Mishra
15.1 Introduction
232(1)
15.2 Security Needs of Healthcare Sector
233(1)
15.2.1 Data Integrity
233(1)
15.2.2 Data Confidentiality
233(1)
15.2.3 Authentication and Authorization
233(1)
15.2.4 Availability
234(1)
15.2.5 Access Control
234(1)
15.2.6 Dependability
234(1)
15.2.7 Flexibility
234(1)
15.3 Solutions to Probable Attacks in e-Healthcare
234(6)
15.3.1 Jamming Attack
235(1)
15.3.2 Data Collision Attack
235(1)
15.3.3 Desynchronization Attack
235(1)
15.3.4 Spoofing Attack
236(1)
15.3.5 Man-in-the-Middle Attack
236(1)
15.3.6 Denial-of-Service (DoS) Attack
237(1)
15.3.7 Insider Attack
238(1)
15.3.8 Masquerade Attack
238(1)
15.3.9 Attacks on Virtual Machine and Hypervisor
239(1)
15.4 Emerging Threats in Cloud- and Fog-Based Healthcare System
240(1)
15.4.1 Software Supply Chain Attacks
240(1)
15.4.2 Ransomware Attacks
240(1)
15.4.3 Crypto-Mining and Crypto-Jacking Malware
240(1)
15.5 Conclusion
241(1)
References
241(4)
16 Mapping of e-Wallets with Features
245
Alisha Sikri
Surjeet Dalai
N.P Singh
Dac-Nhuong Le
16.1 Introduction
246(4)
16.1.1 e-Wallet
246(1)
16.1.2 Objectives
247(3)
16.2 Review of Literature
250(1)
16.3 Market Share of e-Wallet
251(2)
16.3.1 Technical Features
252(1)
16.3.2 Legal Features
252(1)
16.3.3 Operational Features
253(1)
16.3.4 Security Features
253(1)
16.4 Research Methodology
253(2)
16.5 Result Analysis
255(1)
16.6 Conclusions and future work
256(1)
References
256
Dac-Nhuong Le obtained his PhD in computer science from Vietnam National University, Vietnam in 2015. He is Deputy-Head of Faculty of Information Technology, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedicine. He has authored 4 computer science books and has multiple research articles in international journals.

Raghvendra Kumar completed his PhD in the Faculty of Engineering and Technology, Jodhpur National University, India. He has authored several research papers in Scopus indexed and impact factor research journals\international conferences as well as 6 authored and 9 edited books on computer science. His areas of interest include wireless sensor network (WSN), Internet of Things, mobile application programming, ad hoc networks, cloud computing, big data, mobile computing, data mining and software engineering.

Brojo Kishore Mishra is an Associate Professor at the C. V. Raman College of Engineering (Autonomous), Bhubaneswar, India. He received his PhD degree in Computer Science from the Berhampur University in 2012. He has published more than 40 research papers in peer-reviewed journals. His research interests include data mining and big data analysis, machine learning, soft computing, and evolutionary computation.

Jyotir Moy Chatterjee is working as an Assistant Professor in the Department of Computer Science and Engineering at GD-RCET, Bhilai, C.G, India. He received his M.Tech from KIIT University, Bhubaneswar, Odisha and B.Tech in Computer Science & Engineering from Dr. MGR Educational & Research Institute University, Chennai, (Tamil Nadu). His research interests include cloud computing, big data, privacy preservation and data mining.

Manju Khari is an Assistant Professor at the Ambedkar Institute of Advanced Communication Technology and Research, Delhi, India. She holds a PhD in Computer Science & Engineering from the National Institute of Technology Patna. She has published 60 papers in refereed national and international journals and conferences. Her research interests are in software testing, software quality, software metrics, information security and nature-inspired algorithms.