Part I Theories and foundations |
|
1 | (188) |
|
1 Introduction to information security foundations and applications |
|
|
3 | (10) |
|
|
|
3 | (1) |
|
1.2 The structure of this book |
|
|
4 | (3) |
|
1.2.1 Part I: Theories and foundations |
|
|
4 | (2) |
|
1.2.2 Part II: Technologies and applications |
|
|
6 | (1) |
|
|
7 | (6) |
|
2 Information security foundation, theories and future vision |
|
|
13 | (28) |
|
|
|
13 | (6) |
|
2.2 Security threats and protection |
|
|
19 | (7) |
|
2.3 Appreciating the breadth of information security |
|
|
26 | (6) |
|
|
32 | (5) |
|
|
37 | (4) |
|
3 Information systems security issues in the context of developing countries |
|
|
41 | (16) |
|
|
|
|
|
41 | (1) |
|
|
41 | (2) |
|
|
42 | (1) |
|
3.1.2 ISS in the context of developing countries |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
44 | (2) |
|
|
45 | (1) |
|
|
46 | (4) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
50 | (2) |
|
|
52 | (1) |
|
|
52 | (5) |
|
4 Biometric systems, modalities and attacks |
|
|
57 | (36) |
|
|
|
57 | (1) |
|
4.2 Biometric components and attributes |
|
|
58 | (3) |
|
4.3 Biometric performance characteristics |
|
|
61 | (6) |
|
4.4 Physiological biometric approaches |
|
|
67 | (5) |
|
|
67 | (1) |
|
|
68 | (1) |
|
|
69 | (1) |
|
4.4.4 Fingerprint recognition |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
70 | (1) |
|
4.4.7 Retinal recognition |
|
|
71 | (1) |
|
4.4.8 Vascular pattern recognition |
|
|
71 | (1) |
|
4.5 Behavioural biometric approaches |
|
|
72 | (3) |
|
4.5.1 Behavioural profiling |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
74 | (1) |
|
4.5.4 Signature recognition |
|
|
74 | (1) |
|
4.5.5 Speaker recognition (or voice verification) |
|
|
74 | (1) |
|
4.6 Attacks against biometrics |
|
|
75 | (4) |
|
|
79 | (8) |
|
|
81 | (4) |
|
4.7.2 Performance of multimodal systems |
|
|
85 | (2) |
|
|
87 | (2) |
|
|
89 | (1) |
|
|
89 | (4) |
|
5 Foundation of healthcare cybersecurity |
|
|
93 | (28) |
|
|
|
93 | (1) |
|
|
93 | (2) |
|
5.2 Health system architecture |
|
|
95 | (6) |
|
5.2.1 Healthcare infrastructure |
|
|
95 | (1) |
|
|
96 | (1) |
|
5.2.3 Data access infrastructure |
|
|
97 | (1) |
|
5.2.4 Privacy and security requirements |
|
|
98 | (3) |
|
5.3 Health data breach incidents |
|
|
101 | (3) |
|
5.3.1 Cyberattacks against health care |
|
|
102 | (1) |
|
5.3.2 Impact of cyberattacks |
|
|
103 | (1) |
|
5.4 Healthcare vulnerability landscape |
|
|
104 | (3) |
|
5.4.1 Medical device vulnerability |
|
|
104 | (1) |
|
5.4.2 Outsourcing vulnerabilities |
|
|
105 | (1) |
|
5.4.3 Software and hardware vulnerabilities |
|
|
105 | (1) |
|
5.4.4 End user vulnerability |
|
|
106 | (1) |
|
5.4.5 Business vulnerability |
|
|
106 | (1) |
|
5.5 Healthcare threat landscape |
|
|
107 | (3) |
|
|
107 | (1) |
|
5.5.2 Social engineering threat |
|
|
107 | (1) |
|
|
108 | (1) |
|
5.5.4 Malicious software threats |
|
|
108 | (1) |
|
5.5.5 Mobile health technologies threats |
|
|
109 | (1) |
|
5.5.6 Managing vendor security threats |
|
|
110 | (1) |
|
5.6 Cybersecurity controls |
|
|
110 | (4) |
|
5.6.1 Regulatory authorities |
|
|
111 | (1) |
|
5.6.2 Healthcare data protection |
|
|
111 | (1) |
|
5.6.3 Planning for cybersecurity |
|
|
112 | (2) |
|
5.6.4 Cybersecurity policies |
|
|
114 | (1) |
|
5.7 Analysis of cyberattack impacts |
|
|
114 | (3) |
|
|
114 | (1) |
|
5.7.2 Financial impact on patients |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
118 | (3) |
|
6 Security challenges and solutions for e-business |
|
|
121 | (28) |
|
|
|
|
|
|
|
121 | (1) |
|
|
121 | (1) |
|
6.2 Current security threats in e-commerce |
|
|
122 | (4) |
|
|
123 | (1) |
|
6.2.2 Unauthorized access |
|
|
123 | (1) |
|
|
124 | (1) |
|
6.2.4 Summary of attacks and methods |
|
|
125 | (1) |
|
6.3 Current security solutions |
|
|
126 | (3) |
|
6.4 New developments in security for e-business |
|
|
129 | (11) |
|
6.4.1 Biometrics for authentication |
|
|
129 | (2) |
|
6.4.2 Parallelism to increase power and speed of defenses |
|
|
131 | (4) |
|
6.4.3 Data mining and machine learning to identify attacks |
|
|
135 | (1) |
|
6.4.4 Peer-to-peer security using blockchains |
|
|
136 | (1) |
|
6.4.5 Enterprise security modeling and security as a service |
|
|
137 | (2) |
|
6.4.6 User education and engagement |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
140 | (9) |
|
7 Recent security issues in Big Data: from past to the future of information systems |
|
|
149 | (24) |
|
|
|
|
|
149 | (1) |
|
|
150 | (4) |
|
7.2.1 Big Data technologies |
|
|
152 | (1) |
|
|
153 | (1) |
|
7.3 Main challenges in Big Data security |
|
|
154 | (7) |
|
7.3.1 Infrastructure security |
|
|
154 | (1) |
|
|
155 | (1) |
|
7.3.3 Integrity and reactive security |
|
|
156 | (1) |
|
|
157 | (1) |
|
7.3.5 Access control and cryptography |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
159 | (2) |
|
7.4 Scientific community reaction against Big Data security challenges |
|
|
161 | (5) |
|
7.4.1 Cloud Security Alliance |
|
|
161 | (1) |
|
7.4.2 National Institute of Standards and Technology |
|
|
162 | (2) |
|
7.4.3 Information Systems Audit and Control Association |
|
|
164 | (1) |
|
7.4.4 Scientific community perspective |
|
|
164 | (2) |
|
7.5 Case of use: how to use Big Data for security |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
168 | (5) |
|
8 Recent advances in unconstrained face recognition |
|
|
173 | (16) |
|
|
|
|
173 | (1) |
|
|
174 | (2) |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
8.2.4 Point-and-shoot face recognition challenge |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
176 | (3) |
|
8.3.1 Local appearance features |
|
|
177 | (1) |
|
8.3.2 Descriptors learned by encoding local microstructures |
|
|
178 | (1) |
|
8.3.3 Aggregation of local appearance features |
|
|
178 | (1) |
|
8.3.4 Features learned by deep neural networks |
|
|
178 | (1) |
|
8.4 Metric learning approaches |
|
|
179 | (1) |
|
8.5 Background information investigation |
|
|
180 | (1) |
|
8.6 Pose-invariant face recognition |
|
|
181 | (1) |
|
8.7 Performance evaluation |
|
|
181 | (1) |
|
|
182 | (1) |
|
8.8.1 Large-scale face recognition in real-world security scenarios |
|
|
183 | (1) |
|
8.8.2 Pose-invariant face recognition |
|
|
183 | (1) |
|
8.8.3 Age-invariant face recognition |
|
|
183 | (1) |
|
8.8.4 Dependence on large amount of labeled training data |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
183 | (6) |
Part II Technologies and applications |
|
189 | (204) |
|
9 Hardware security: side-channel attacks and hardware Trojans |
|
|
191 | (24) |
|
|
|
|
191 | (3) |
|
9.2 Side-channel attacks and their countermeasures |
|
|
194 | (12) |
|
9.2.1 Power analysis attack |
|
|
195 | (2) |
|
9.2.2 Fault analysis attack |
|
|
197 | (2) |
|
9.2.3 Electromagnetic analysis |
|
|
199 | (1) |
|
9.2.4 Timing analysis attack |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
200 | (4) |
|
9.2.7 Low-power asynchronous AES core |
|
|
204 | (2) |
|
9.3 Malicious hardware: Trojans |
|
|
206 | (3) |
|
|
206 | (1) |
|
9.3.2 Classification of HT |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
209 | (1) |
|
|
210 | (5) |
|
10 Cybersecurity: timeline malware analysis and classification |
|
|
215 | (26) |
|
|
|
215 | (3) |
|
|
216 | (1) |
|
|
217 | (1) |
|
10.2 Timeline malware analysis and classification |
|
|
218 | (1) |
|
|
219 | (1) |
|
10.4 Malware sample collection |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
221 | (1) |
|
10.5 Cumulative timeline analysis |
|
|
221 | (11) |
|
10.5.1 CTA data preprocessing |
|
|
221 | (2) |
|
10.5.2 CTA feature vector generation |
|
|
223 | (9) |
|
10.6 CTA malware detection method |
|
|
232 | (2) |
|
|
233 | (1) |
|
10.6.2 Evaluation process |
|
|
234 | (1) |
|
10.7 Experiments and results |
|
|
234 | (2) |
|
10.7.1 Timeline classification results using FLF features |
|
|
234 | (1) |
|
10.7.2 Timeline classification results using PSI features |
|
|
235 | (1) |
|
10.7.3 Timeline classification results using dynamic features |
|
|
235 | (1) |
|
10.8 Conclusions and future work |
|
|
236 | (1) |
|
|
237 | (4) |
|
11 Recent trends in the cryptanalysis of block ciphers |
|
|
241 | (38) |
|
|
|
|
11.1 Introduction and overview |
|
|
241 | (3) |
|
11.1.1 Symmetric cryptographic primitives |
|
|
242 | (2) |
|
11.2 Introduction to block ciphers |
|
|
244 | (3) |
|
11.2.1 Block ciphers definition |
|
|
244 | (1) |
|
11.2.2 Block ciphers' design |
|
|
244 | (3) |
|
11.3 Block ciphers' security |
|
|
247 | (3) |
|
|
247 | (1) |
|
|
248 | (2) |
|
11.4 Attacks on block ciphers |
|
|
250 | (14) |
|
11.4.1 Differential cryptanalysis |
|
|
251 | (1) |
|
11.4.2 Linear cryptanalysis |
|
|
252 | (1) |
|
11.4.3 Differential-linear cryptanalysis |
|
|
253 | (1) |
|
11.4.4 Higher order differential cryptanalysis |
|
|
253 | (1) |
|
11.4.5 Truncated differential cryptanalysis |
|
|
254 | (1) |
|
11.4.6 Integral cryptanalysis |
|
|
254 | (1) |
|
11.4.7 Impossible differential cryptanalysis |
|
|
255 | (1) |
|
11.4.8 Zero-correlation cryptanalysis |
|
|
256 | (1) |
|
11.4.9 Basic Meet-in-the-Middle cryptanalysis |
|
|
257 | (1) |
|
11.4.10 3-Subset MitM technique |
|
|
258 | (1) |
|
11.4.11 Splice-and-cut technique |
|
|
259 | (1) |
|
11.4.12 Multidimensional MitM and generalized MitM cryptanalysis technique |
|
|
260 | (1) |
|
11.4.13 MitM with differential enumeration cryptanalysis |
|
|
260 | (1) |
|
11.4.14 Biclique cryptanalysis |
|
|
261 | (1) |
|
11.4.15 Unbalanced biclique cryptanalysis |
|
|
262 | (1) |
|
11.4.16 Invariant subspace cryptanalysis |
|
|
263 | (1) |
|
|
264 | (1) |
|
|
264 | (15) |
|
12 Image provenance inference through content-based device fingerprint analysis |
|
|
279 | (32) |
|
|
|
|
279 | (1) |
|
12.2 Why not digital watermark? |
|
|
280 | (1) |
|
|
280 | (2) |
|
|
282 | (7) |
|
12.4.1 Optical aberrations |
|
|
282 | (2) |
|
12.4.2 CFA and demosaicing |
|
|
284 | (3) |
|
12.4.3 Camera response function |
|
|
287 | (1) |
|
12.4.4 Quantization table |
|
|
288 | (1) |
|
|
288 | (1) |
|
12.5 Sensor pattern noise |
|
|
289 | (15) |
|
|
290 | (1) |
|
12.5.2 Source device identification |
|
|
291 | (3) |
|
|
294 | (1) |
|
12.5.4 Source-oriented image clustering |
|
|
295 | (4) |
|
12.5.5 Image forgery detection |
|
|
299 | (5) |
|
|
304 | (1) |
|
|
305 | (6) |
|
13 EEG-based biometrics for person identification and continuous authentication |
|
|
311 | (36) |
|
|
|
|
13.1 Brain and brainwaves |
|
|
311 | (9) |
|
|
312 | (1) |
|
13.1.2 Brain activity recording techniques |
|
|
313 | (2) |
|
13.1.3 EEG sensors and distribution |
|
|
315 | (1) |
|
13.1.4 EEG rhythms and oscillations |
|
|
316 | (1) |
|
|
317 | (3) |
|
13.2 EEG as biometric identifiers |
|
|
320 | (16) |
|
|
321 | (4) |
|
13.2.2 Elicitation of brain response and the protocols |
|
|
325 | (3) |
|
13.2.3 Feature extraction |
|
|
328 | (7) |
|
13.2.4 Classification algorithms |
|
|
335 | (1) |
|
13.3 EEG biometrics for continuous authentication |
|
|
336 | (4) |
|
13.3.1 Authentication systems |
|
|
336 | (1) |
|
13.3.2 Multi-modal biometrics |
|
|
337 | (2) |
|
|
339 | (1) |
|
13.3.4 EEG-based multi-modal continuous authentication |
|
|
340 | (1) |
|
13.4 Research directions and challenges |
|
|
340 | (1) |
|
|
341 | (6) |
|
14 Data security and privacy in the Internet-of-Things |
|
|
347 | (28) |
|
|
|
|
349 | (2) |
|
14.1.1 Examples of threats to security and privacy |
|
|
349 | (2) |
|
|
351 | (2) |
|
14.2.1 Resource constraints |
|
|
351 | (1) |
|
14.2.2 Device heterogeneity |
|
|
351 | (1) |
|
|
352 | (1) |
|
14.2.4 Heterogeneity of access levels |
|
|
352 | (1) |
|
|
352 | (1) |
|
14.2.6 Deployment environment |
|
|
353 | (1) |
|
14.2.7 Transparent deployment and lack of interfaces |
|
|
353 | (1) |
|
14.3 Security and privacy solutions for IoT |
|
|
353 | (11) |
|
14.3.1 Solutions for the IoT layer |
|
|
354 | (1) |
|
14.3.2 Solutions for the IoT communication layer |
|
|
355 | (1) |
|
14.3.3 Solutions for IoT services and applications layer |
|
|
356 | (8) |
|
14.4 Human factors in IoT security and privacy |
|
|
364 | (1) |
|
|
365 | (1) |
|
|
366 | (9) |
|
15 Information security algorithm on embedded hardware |
|
|
375 | (18) |
|
|
|
375 | (1) |
|
15.2 Classification of embedded systems |
|
|
376 | (2) |
|
15.2.1 Application specific integrated circuits |
|
|
376 | (1) |
|
15.2.2 Field programmable gate arrays |
|
|
376 | (1) |
|
15.2.3 Microprocessor-based embedded systems |
|
|
377 | (1) |
|
15.2.4 Single-board computers |
|
|
377 | (1) |
|
15.2.5 General purpose mobile platforms |
|
|
378 | (1) |
|
15.3 Security requirements and mechanisms |
|
|
378 | (8) |
|
15.3.1 Information exchange |
|
|
379 | (4) |
|
|
383 | (2) |
|
15.3.3 User- and service-related security |
|
|
385 | (1) |
|
15.3.4 Hardware vulnerabilities |
|
|
385 | (1) |
|
15.4 Implementation of security mechanisms in embedded systems |
|
|
386 | (3) |
|
15.4.1 Software-based implementations |
|
|
386 | (1) |
|
15.4.2 The use of a security co-processor |
|
|
387 | (1) |
|
15.4.3 Smart cards and common criteria |
|
|
388 | (1) |
|
|
389 | (1) |
|
|
389 | (4) |
Index |
|
393 | |