|
|
Books > Computing & IT > Computer communications & networking > Network security
Vehicular networks were first developed to ensure safe driving and
to extend the Internet to the road. However, we can now see that
the ability of vehicles to engage in cyber-activity may result in
tracking and privacy violations through the interception of
messages, which are frequently exchanged on road. This book serves
as a guide for students, developers and researchers who are
interested in vehicular networks and the associated security and
privacy issues. It facilitates the understanding of the
technologies used and their various types, highlighting the
importance of privacy and security issues and the direct impact
they have on the safety of their users. It also explains various
solutions and proposals to protect location and identity privacy,
including two anonymous authentication methods that preserve
identity privacy and a total of five schemes that preserve location
privacy in the vehicular ad hoc networks and the cloud-enabled
internet of vehicles, respectively.
Society is continually transforming into a digitally powered
reality due to the increased dependence of computing technologies.
The landscape of cyber threats is constantly evolving because of
this, as hackers are finding improved methods of accessing
essential data. Analyzing the historical evolution of cyberattacks
can assist practitioners in predicting what future threats could be
on the horizon. Real-Time and Retrospective Analyses of Cyber
Security is a pivotal reference source that provides vital research
on studying the development of cybersecurity practices through
historical and sociological analyses. While highlighting topics
such as zero trust networks, geopolitical analysis, and cyber
warfare, this publication explores the evolution of cyber threats,
as well as improving security methods and their socio-technological
impact. This book is ideally designed for researchers,
policymakers, strategists, officials, developers, educators,
sociologists, and students seeking current research on the
evolution of cybersecurity methods through historical analysis and
future trends.
Safety and security are crucial to the operations of nuclear power
plants, but cyber threats to these facilities are increasing
significantly. Instrumentation and control systems, which play a
vital role in the prevention of these incidents, have seen major
design modifications with the implementation of digital
technologies. Advanced computing systems are assisting in the
protection and safety of nuclear power plants; however, significant
research on these computational methods is deficient. Cyber
Security and Safety of Nuclear Power Plant Instrumentation and
Control Systems is a pivotal reference source that provides vital
research on the digital developments of instrumentation and control
systems for assuring the safety and security of nuclear power
plants. While highlighting topics such as accident monitoring
systems, classification measures, and UAV fleets, this publication
explores individual cases of security breaches as well as future
methods of practice. This book is ideally designed for engineers,
industry specialists, researchers, policymakers, scientists,
academicians, practitioners, and students involved in the
development and operation of instrumentation and control systems
for nuclear power plants, chemical and petrochemical industries,
transport, and medical equipment.
Modern society has become dependent on technology, allowing
personal information to be input and used across a variety of
personal and professional systems. From banking to medical records
to e-commerce, sensitive data has never before been at such a high
risk of misuse. As such, organizations now have a greater
responsibility than ever to ensure that their stakeholder data is
secured, leading to the increased need for cybersecurity
specialists and the development of more secure software and
systems. To avoid issues such as hacking and create a safer online
space, cybersecurity education is vital and not only for those
seeking to make a career out of cybersecurity, but also for the
general public who must become more aware of the information they
are sharing and how they are using it. It is crucial people learn
about cybersecurity in a comprehensive and accessible way in order
to use the skills to better protect all data. The Research
Anthology on Advancements in Cybersecurity Education discusses
innovative concepts, theories, and developments for not only
teaching cybersecurity, but also for driving awareness of efforts
that can be achieved to further secure sensitive data. Providing
information on a range of topics from cybersecurity education
requirements, cyberspace security talents training systems, and
insider threats, it is ideal for educators, IT developers,
education professionals, education administrators, researchers,
security analysts, systems engineers, software security engineers,
security professionals, policymakers, and students.
Smart Cities Cybersecurity and Privacy examines the latest research
developments and their outcomes for safe, secure, and trusting
smart cities residents. Smart cities improve the quality of life of
citizens in their energy and water usage, healthcare, environmental
impact, transportation needs, and many other critical city
services. Recent advances in hardware and software, have fueled the
rapid growth and deployment of ubiquitous connectivity between a
city's physical and cyber components. This connectivity however
also opens up many security vulnerabilities that must be mitigated.
Smart Cities Cybersecurity and Privacy helps researchers,
engineers, and city planners develop adaptive, robust, scalable,
and reliable security and privacy smart city applications that can
mitigate the negative implications associated with cyber-attacks
and potential privacy invasion. It provides insights into
networking and security architectures, designs, and models for the
secure operation of smart city applications.
In today's modern age of information, new technologies are quickly
emerging and being deployed into the field of information
technology. Cloud computing is a tool that has proven to be a
versatile piece of software within IT. Unfortunately, the high
usage of Cloud has raised many concerns related to privacy,
security, and data protection that have prevented cloud computing
solutions from becoming the prevalent alternative for mission
critical systems. Up-to-date research and current techniques are
needed to help solve these vulnerabilities in cloud computing.
Modern Principles, Practices, and Algorithms for Cloud Security is
a pivotal reference source that provides vital research on the
application of privacy and security in cloud computing. While
highlighting topics such as chaos theory, soft computing, and cloud
forensics, this publication explores present techniques and
methodologies, as well as current trends in cloud protection. This
book is ideally designed for IT specialists, scientists, software
developers, security analysts, computer engineers, academicians,
researchers, and students seeking current research on the defense
of cloud services.
Nowadays it is impossible to imagine a business without technology
as most industries are becoming ""smarter"" and more tech-driven,
ranging from small individual tech initiatives to complete business
models with intertwined supply chains and ""platform""-based
business models. New ways of working, such as agile and DevOps,
have been introduced, leading to new risks. These risks come in the
form of new challenges for teams working together in a distributed
manner, privacy concerns, human autonomy, and cybersecurity
concerns. Technology is now integrated into the business discipline
and is here to stay leading to the need for a thorough
understanding of how to address these risks and all the potential
problems that could arise. With the advent of organized crime, such
as hacks and denial-of-service attacks, all kinds of malicious
actors are infiltrating the digital society in new and unique ways.
Systems with poor design, implementation, and configurations are
easily taken advantage of. When it comes to integrating business
and technology, there needs to be approaches for assuring security
against risks that can threaten both businesses and their digital
platforms. Strategic Approaches to Digital Platform Security
Assurance offers comprehensive design science research approaches
to extensively examine risks in digital platforms and offer
pragmatic solutions to these concerns and challenges. This book
addresses significant problems when transforming an organization
embracing API-based platform models, the use of DevOps teams, and
issues in technological architectures. Each section will examine
the status quo for business technologies, the current challenges,
and core success factors and approaches that have been used. This
book is ideal for security analysts, software engineers, computer
engineers, executives, managers, IT consultants, business
professionals, researchers, academicians, and students who want to
gain insight and deeper knowledge of security in digital platforms
and gain insight into the most important success factors and
approaches utilized by businesses.
The Dark Web is a known hub that hosts myriad illegal activities
behind the veil of anonymity for its users. For years now, law
enforcement has been struggling to track these illicit activities
and put them to an end. However, the depth and anonymity of the
Dark Web has made these efforts difficult, and as cyber criminals
have more advanced technologies available to them, the struggle
appears to only have the potential to worsen. Law enforcement and
government organizations also have emerging technologies on their
side, however. It is essential for these organizations to stay up
to date on these emerging technologies, such as computational
intelligence, in order to put a stop to the illicit activities and
behaviors presented in the Dark Web. Using Computational
Intelligence for the Dark Web and Illicit Behavior Detection
presents the emerging technologies and applications of
computational intelligence for the law enforcement of the Dark Web.
It features analysis into cybercrime data, examples of the
application of computational intelligence in the Dark Web, and
provides future opportunities for growth in this field. Covering
topics such as cyber threat detection, crime prediction, and
keyword extraction, this premier reference source is an essential
resource for government organizations, law enforcement agencies,
non-profit organizations, politicians, computer scientists,
researchers, students, and academicians.
Cyber-attacks are rapidly becoming one of the most prevalent issues
globally, and as they continue to escalate, it is imperative to
explore new approaches and technologies that help ensure the
security of the online community. Beyond cyber-attacks, personal
information is now routinely and exclusively housed in cloud-based
systems. The rising use of information technologies requires
stronger information security and system procedures to reduce the
risk of information breaches. Advanced Methodologies and
Technologies in System Security, Information Privacy, and Forensics
presents emerging research and methods on preventing information
breaches and further securing system networks. While highlighting
the rising concerns in information privacy and system security,
this book explores the cutting-edge methods combatting digital
risks and cyber threats. This book is an important resource for
information technology professionals, cybercrime researchers,
network analysts, government agencies, business professionals,
academicians, and practitioners seeking the most up-to-date
information and methodologies on cybercrime, digital terrorism,
network security, and information technology ethics.
Wireless sensor networks have gained significant attention
industrially and academically due to their wide range of uses in
various fields. Because of their vast amount of applications,
wireless sensor networks are vulnerable to a variety of security
attacks. The protection of wireless sensor networks remains a
challenge due to their resource-constrained nature, which is why
researchers have begun applying several branches of artificial
intelligence to advance the security of these networks. Research is
needed on the development of security practices in wireless sensor
networks by using smart technologies. Deep Learning Strategies for
Security Enhancement in Wireless Sensor Networks provides emerging
research exploring the theoretical and practical advancements of
security protocols in wireless sensor networks using artificial
intelligence-based techniques. Featuring coverage on a broad range
of topics such as clustering protocols, intrusion detection, and
energy harvesting, this book is ideally designed for researchers,
developers, IT professionals, educators, policymakers,
practitioners, scientists, theorists, engineers, academicians, and
students seeking current research on integrating intelligent
techniques into sensor networks for more reliable security
practices.
Interest in developing smart cities has grown exponentially over
the years with many governments across the world hoping to initiate
these projects in their own countries. One of the key challenges
for the success of any smart city project is the assurance of smart
security and privacy of the citizens. Due to the use of a wide
range of interconnected cyber-physical systems, traditional
security solutions cannot be applied to smart city applications,
and new practices must be sought. Secure Cyber-Physical Systems for
Smart Cities is an essential reference publication that examines
information security and privacy in smart city settings including
discussions on new security frameworks, solutions, cybersecurity
laws and regulations, and risk management frameworks for smart city
environments. Covering a wide range of topics including wireless
networks, security, and cyber-physical systems, this book is
ideally designed for IT specialists and consultants, engineers,
government officials, policymakers, researchers, academicians, and
industry professionals.
Digital transformation is a revolutionary technology that will play
a vital role in major industries, including global governments.
These administrations are taking the initiative to incorporate
digital programs with their objective being to provide digital
infrastructure as a basic utility for every citizen, provide on
demand services with superior governance, and empower their
citizens digitally. However, security and privacy are major
barriers in adopting these mechanisms, as organizations and
individuals are concerned about their private and financial data.
Impact of Digital Transformation on Security Policies and Standards
is an essential research book that examines the policies,
standards, and mechanisms for security in all types of digital
applications and focuses on blockchain and its imminent impact on
financial services in supporting smart government, along with
bitcoin and the future of digital payments. Highlighting topics
such as cryptography, privacy management, and e-government, this
book is ideal for security analysts, data scientists, academicians,
policymakers, security professionals, IT professionals, government
officials, finance professionals, researchers, and students.
As the applications of the Internet of Things continue to progress,
so do the security concerns for this technology. The study of
threat prevention in the Internet of Things is necessary, as
security breaches in this field can ruin industries and lives.
Security Breaches and Threat Prevention in the Internet of Things
provides a comprehensive examination of the latest strategies and
methods for tracking and blocking threats within industries that
work heavily with this technology. Featuring chapters on emerging
topics such as security threats in autonomous vehicles, digital
forensics, secure communications, and image encryption, this
critical reference source is a valuable tool for all academicians,
graduate students, practitioners, professionals, and researchers
who are interested in expanding their knowledge of security
practices pertaining to the Internet of Things.
As society continues to heavily rely on software and databases, the
risks for cyberattacks have increased rapidly. As the dependence on
computers has become gradually widespread throughout communities
and governments, there is a need for cybersecurity programs that
can assist in protecting sizeable networks and significant amounts
of data at once. Implementing overarching security policies for
software systems is integral to protecting community-wide data from
harmful attacks. Establishing Cyber Security Programs Through the
Community Cyber Security Maturity Model (CCSMM) is an essential
reference source that discusses methods in applying sustainable
cybersecurity programs and policies within organizations,
governments, and other communities. Featuring research on topics
such as community engagement, incident planning methods, and
information sharing, this book is ideally designed for
cybersecurity professionals, security analysts, managers,
researchers, policymakers, students, practitioners, and
academicians seeking coverage on novel policies and programs in
cybersecurity implementation.
|
You may like...
Die Verevrou
Jan van Tonder
Paperback
R385
R344
Discovery Miles 3 440
|