|
|
Books > Computing & IT > Computer communications & networking > Network security
Interdisciplinary and multidisciplinary research is slowly yet
steadily revolutionizing traditional education. However,
multidisciplinary research can and will also improve the extent to
which a country can protect its critical and vital assets. Applying
Methods of Scientific Inquiry Into Intelligence, Security, and
Counterterrorism is an essential scholarly publication that
provides personnel directly working in the fields of intelligence,
law enforcement, and science with the opportunity to understand the
multidisciplinary nature of intelligence and science in order to
improve current intelligence activities and contribute to the
protection of the nation. Each chapter of the book discusses
various components of science that should be applied to the
intelligence arena. Featuring coverage on a range of topics
including cybersecurity, economics, and political strategy, this
book is ideal for law enforcement, intelligence and security
practitioners, students, educators, and researchers.
Modern society has become dependent on technology, allowing
personal information to be input and used across a variety of
personal and professional systems. From banking to medical records
to e-commerce, sensitive data has never before been at such a high
risk of misuse. As such, organizations now have a greater
responsibility than ever to ensure that their stakeholder data is
secured, leading to the increased need for cybersecurity
specialists and the development of more secure software and
systems. To avoid issues such as hacking and create a safer online
space, cybersecurity education is vital and not only for those
seeking to make a career out of cybersecurity, but also for the
general public who must become more aware of the information they
are sharing and how they are using it. It is crucial people learn
about cybersecurity in a comprehensive and accessible way in order
to use the skills to better protect all data. The Research
Anthology on Advancements in Cybersecurity Education discusses
innovative concepts, theories, and developments for not only
teaching cybersecurity, but also for driving awareness of efforts
that can be achieved to further secure sensitive data. Providing
information on a range of topics from cybersecurity education
requirements, cyberspace security talents training systems, and
insider threats, it is ideal for educators, IT developers,
education professionals, education administrators, researchers,
security analysts, systems engineers, software security engineers,
security professionals, policymakers, and students.
This book presents a holistic view of the geopolitics of cyberspace
that have arisen over the past decade, utilizing recent events to
explain the international security dimension of cyber threat and
vulnerability, and to document the challenges of controlling
information resources and protecting computer systems. How are the
evolving cases of cyber attack and breach as well as the actions of
government and corporations shaping how cyberspace is governed?
What object lessons are there in security cases such as those
involving Wikileaks and the Snowden affair? An essential read for
practitioners, scholars, and students of international affairs and
security, this book examines the widely pervasive and enormously
effective nature of cyber threats today, explaining why cyber
attacks happen, how they matter, and how they may be managed. The
book addresses a chronology of events starting in 2005 to
comprehensively explain the international security dimension of
cyber threat and vulnerability. It begins with an explanation of
contemporary information technology, including the economics of
contemporary cloud, mobile, and control systems software as well as
how computing and networking-principally the Internet-are
interwoven in the concept of cyberspace. Author Chris Bronk, PhD,
then documents the national struggles with controlling information
resources and protecting computer systems. The book considers major
security cases such as Wikileaks, Stuxnet, the cyber attack on
Estonia, Shamoon, and the recent exploits of the Syrian Electronic
Army. Readers will understand how cyber security in the 21st
century is far more than a military or defense issue, but is a
critical matter of international law, diplomacy, commerce, and
civil society as well. Provides relevant, rigorous information to
those in the computer security field while also being accessible to
a general audience of policy, international security, and military
readers who seek to understand the cyber security issue and how it
has evolved Documents how contemporary society is dependent upon
cyberspace for its function, and that the understanding of how it
works and how it can be broken is knowledge held by a precious few
Informs both technically savvy readers who build and maintain the
infrastructure of cyberspace and the policymakers who develop
rules, processes, and laws on how the cyber security problem is
managed
Intelligent Data Analysis for e-Learning: Enhancing Security and
Trustworthiness in Online Learning Systems addresses information
security within e-Learning based on trustworthiness assessment and
prediction. Over the past decade, many learning management systems
have appeared in the education market. Security in these systems is
essential for protecting against unfair and dishonest conduct-most
notably cheating-however, e-Learning services are often designed
and implemented without considering security requirements. This
book provides functional approaches of trustworthiness analysis,
modeling, assessment, and prediction for stronger security and
support in online learning, highlighting the security deficiencies
found in most online collaborative learning systems. The book
explores trustworthiness methodologies based on collective
intelligence than can overcome these deficiencies. It examines
trustworthiness analysis that utilizes the large amounts of
data-learning activities generate. In addition, as processing this
data is costly, the book offers a parallel processing paradigm that
can support learning activities in real-time. The book discusses
data visualization methods for managing e-Learning, providing the
tools needed to analyze the data collected. Using a case-based
approach, the book concludes with models and methodologies for
evaluating and validating security in e-Learning systems. Indexing:
The books of this series are submitted to EI-Compendex and SCOPUS
Data Breach Preparation and Response: Breaches are Certain, Impact
is Not is the first book to provide 360 degree visibility and
guidance on how to proactively prepare for and manage a data breach
and limit impact. Data breaches are inevitable incidents that can
disrupt business operations and carry severe reputational and
financial impact, making them one of the largest risks facing
organizations today. The effects of a breach can be felt across
multiple departments within an organization, who will each play a
role in effectively managing the breach. Kevvie Fowler has
assembled a team of leading forensics, security, privacy, legal,
public relations and cyber insurance experts to create the
definitive breach management reference for the whole organization.
With the continued progression of technologies such as mobile
computing and the internet of things (IoT), cybersecurity has
swiftly risen to a prominent field of global interest. This has led
to cyberattacks and cybercrime becoming much more sophisticated to
a point where cybersecurity can no longer be the exclusive
responsibility of an organization's information technology (IT)
unit. Cyber warfare is becoming a national issue and causing
various governments to reevaluate the current defense strategies
they have in place. Cyber Security Auditing, Assurance, and
Awareness Through CSAM and CATRAM provides emerging research
exploring the practical aspects of reassessing current
cybersecurity measures within organizations and international
governments and improving upon them using audit and awareness
training models, specifically the Cybersecurity Audit Model (CSAM)
and the Cybersecurity Awareness Training Model (CATRAM). The book
presents multi-case studies on the development and validation of
these models and frameworks and analyzes their implementation and
ability to sustain and audit national cybersecurity strategies.
Featuring coverage on a broad range of topics such as forensic
analysis, digital evidence, and incident management, this book is
ideally designed for researchers, developers, policymakers,
government officials, strategists, security professionals,
educators, security analysts, auditors, and students seeking
current research on developing training models within cybersecurity
management and awareness.
The enormous spread of devices gives access to virtual networks and
to cyberspace areas where continuous flows of data and information
are exchanged, increasing the risk of information warfare,
cyber-espionage, cybercrime, and identity hacking. The number of
individuals and companies that suffer data breaches has increased
vertically with serious reputational and economic damage
internationally. Thus, the protection of personal data and
intellectual property has become a priority for many governments.
Political Decision-Making and Security Intelligence: Recent
Techniques and Technological Developments is an essential scholarly
publication that aims to explore perspectives and approaches to
intelligence analysis and performance and combines theoretical
underpinnings with practical relevance in order to sensitize
insights into training activities to manage uncertainty and risks
in the decision-making process. Featuring a range of topics such as
crisis management, policy making, and risk analysis, this book is
ideal for managers, analysts, politicians, IT specialists, data
scientists, policymakers, government officials, researchers,
academicians, professionals, and security experts.
Malware Diffusion Models for Wireless Complex Networks: Theory and
Applications provides a timely update on malicious software
(malware), a serious concern for all types of network users, from
laymen to experienced administrators. As the proliferation of
portable devices, namely smartphones and tablets, and their
increased capabilities, has propelled the intensity of malware
spreading and increased its consequences in social life and the
global economy, this book provides the theoretical aspect of
malware dissemination, also presenting modeling approaches that
describe the behavior and dynamics of malware diffusion in various
types of wireless complex networks. Sections include a systematic
introduction to malware diffusion processes in computer and
communications networks, an analysis of the latest state-of-the-art
malware diffusion modeling frameworks, such as queuing-based
techniques, calculus of variations based techniques, and game
theory based techniques, also demonstrating how the methodologies
can be used for modeling in more general applications and practical
scenarios.
As the confluence of networks that is the modern Internet grows to
encompass everything from nuclear reactors to home appliances, the
affordances offered to the average citizen grow as well-but so,
too, do the resources made available to those with malicious
intent. Through the rise of Big Data and the Internet of Things,
terrorist organizations today have been freed from geographic and
logistical confines and now have more power than ever before to
strike the average citizen directly at home. This, coupled with the
inherently asymmetrical nature of cyberwarfare-which grants great
advantage to the attacker-has created an unprecedented national
security risk that both governments and their citizens are woefully
ill-prepared to face. The Handbook of Research on Civil Society and
National Security in the Era of Cyber Warfare addresses the problem
of cyber terrorism head-on, first through a review of current
literature, and then through a series of progressive proposals
aimed at researchers, professionals, and policymakers. Touching on
such subjects as cyber-profiling, hacktivism, and digital
counterterrorism, this collection offers the tools to begin
formulating a ground-up resiliency to cybersecurity threats that
starts at the civilian level.
Denial of Service (DoS) attacks are a form of attack that seeks to
make a network resource unavailable due to overloading the resource
or machine with an overwhelming number of packets, thereby crashing
or severely slowing the performance of the resource. Distributed
Denial of Service (DDoS) is a large scale DoS attack which is
distributed in the Internet. Every computer which has access to the
Internet can behave as an attacker. Typically bandwidth depletion
can be categorized as either a flood or an amplification attack.
Flood attacks can be done by generating ICMP packets or UDP packets
in which it can utilize stationary or random variable ports. Smurf
and Fraggle attacks are used for amplification attacks. DDoS Smurf
attacks are an example of an amplification attack where the
attacker sends packets to a network amplifier with the return
address spoofed to the victim's IP address. This book presents new
research and methodologies along with a proposed algorithm for
prevention of DoS attacks that has been written based on
cryptographic concepts such as birthday attacks to estimate the
rate of attacks generated and passed along the routers.
Consequently, attackers would be identified and prohibited from
sending spam traffic to the server which can cause DDoS attacks.
Due to the prevalence of DoS attacks, there has been a lot of
research conducted on how to detect them and prevent them. The
authors of this short format title provide their research results
on providing an effective solution to DoS attacks, including
introduction of the new algorithm that can be implemented in order
to deny DoS attacks.
The Smart Grid security ecosystem is complex and
multi-disciplinary, and relatively under-researched compared to the
traditional information and network security disciplines. While the
Smart Grid has provided increased efficiencies in monitoring power
usage, directing power supplies to serve peak power needs and
improving efficiency of power delivery, the Smart Grid has also
opened the way for information security breaches and other types of
security breaches. Potential threats range from meter manipulation
to directed, high-impact attacks on critical infrastructure that
could bring down regional or national power grids. It is essential
that security measures are put in place to ensure that the Smart
Grid does not succumb to these threats and to safeguard this
critical infrastructure at all times. Dr. Florian Skopik is one of
the leading researchers in Smart Grid security, having organized
and led research consortia and panel discussions in this field.
Smart Grid Security will provide the first truly holistic view of
leading edge Smart Grid security research. This book does not focus
on vendor-specific solutions, instead providing a complete
presentation of forward-looking research in all areas of Smart Grid
security. The book will enable practitioners to learn about
upcoming trends, scientists to share new directions in research,
and government and industry decision-makers to prepare for major
strategic decisions regarding implementation of Smart Grid
technology.
Advancing technologies, especially computer technologies, have
necessitated the creation of a comprehensive investigation and
collection methodology for digital and online evidence. The goal of
cyber forensics is to perform a structured investigation while
maintaining a documented chain of evidence to find out exactly what
happened on a computing device or on a network and who was
responsible for it. Critical Concepts, Standards, and Techniques in
Cyber Forensics is a critical research book that focuses on
providing in-depth knowledge about online forensic practices and
methods. Highlighting a range of topics such as data mining,
digital evidence, and fraud investigation, this book is ideal for
security analysts, IT specialists, software engineers, researchers,
security professionals, criminal science professionals,
policymakers, academicians, and students.
Securing VoIP: Keeping Your VoIP Network Safe will show you how to
take the initiative to prevent hackers from recording and
exploiting your company's secrets. Drawing upon years of practical
experience and using numerous examples and case studies, technology
guru Bud Bates discusses the business realities that necessitate
VoIP system security and the threats to VoIP over both wire and
wireless networks. He also provides essential guidance on how to
conduct system security audits and how to integrate your existing
IT security plan with your VoIP system and security plans, helping
you prevent security breaches and eavesdropping.
|
|