|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
The mobile threat landscape is evolving bringing about new forms of
data loss. No longer can organizations rely on security policies
designed during the PC era. Mobile is different and therefore
requires a revised approach to countermeasures to mitigate data
loss. Understanding these differences is fundamental to creating a
new defense-in-depth strategy designed for mobile. Mobile Data
Loss: Threats & Countermeasures reviews the mobile threat
landscape using a hacker mind-set to outline risks and attack
vectors that include malware, risky apps, operating system
compromises, network attacks, and user behaviours. This provides
the basis for then outlining countermeasures for defining a
holistic mobile security methodology that encompasses proactive
protections, response mechanisms, live monitoring, and incident
response. Designing a comprehensive mobile security strategy is
key. Mobile Data Loss: Threats & Countermeasures outlines the
threats and strategies for protecting devices from a plethora of
data loss vectors.
Implementing Digital Forensic Readiness: From Reactive to Proactive
Process shows information security and digital forensic
professionals how to increase operational efficiencies by
implementing a pro-active approach to digital forensics throughout
their organization. It demonstrates how digital forensics aligns
strategically within an organization's business operations and
information security's program. This book illustrates how the
proper collection, preservation, and presentation of digital
evidence is essential for reducing potential business impact as a
result of digital crimes, disputes, and incidents. It also explains
how every stage in the digital evidence lifecycle impacts the
integrity of data, and how to properly manage digital evidence
throughout the entire investigation. Using a digital forensic
readiness approach and preparedness as a business goal, the
administrative, technical, and physical elements included
throughout this book will enhance the relevance and credibility of
digital evidence. Learn how to document the available systems and
logs as potential digital evidence sources, how gap analysis can be
used where digital evidence is not sufficient, and the importance
of monitoring data sources in a timely manner. This book offers
standard operating procedures to document how an evidence-based
presentation should be made, featuring legal resources for
reviewing digital evidence.
Hiding Behind the Keyboard: Uncovering Covert Communication Methods
with Forensic Analysis exposes the latest electronic covert
communication techniques used by cybercriminals, along with the
needed investigative methods for identifying them. The book shows
how to use the Internet for legitimate covert communication, while
giving investigators the information they need for detecting
cybercriminals who attempt to hide their true identity. Intended
for practitioners and investigators, the book offers concrete
examples on how to communicate securely, serving as an ideal
reference for those who truly need protection, as well as those who
investigate cybercriminals.
Digital Forensics: Threatscape and Best Practices surveys the
problems and challenges confronting digital forensic professionals
today, including massive data sets and everchanging technology.
This book provides a coherent overview of the threatscape in a
broad range of topics, providing practitioners and students alike
with a comprehensive, coherent overview of the threat landscape and
what can be done to manage and prepare for it. Digital Forensics:
Threatscape and Best Practices delivers you with incisive analysis
and best practices from a panel of expert authors, led by John
Sammons, bestselling author of The Basics of Digital Forensics.
This book explores the use of Social Security Numbers (SSN) and
Identity Theft. The SSN was created in 1936 for the purpose of
tracking workers' earnings for benefits purposes. Since that time,
however, SSN usage has expanded to encompass a myriad of purposes
well beyond the operation of the Social Security system. This book
describes how criminals acquire SSNs and how they use them to
commit identity theft. How organisations such as financial
institutions, insurers, universities, health care entities,
government agencies, and innumerable other organisations use this
nine-digit sequence as a default identifier is also examined.
Furthermore, existing statutes, regulations and private sector
efforts designed to protect SSNs are looked at, including data
security and data breach notification laws. This book concludes
with specific FTC recommendations, which address both the supply
and demand aspects of the SSN problem by proposing actions that
would make SSNs less available to identify thieves, and would make
it more difficult for them to misuse those SSNs they are able to
obtain. This is an edited, excerpted and augmented edition of a
Federal Trade Commission and GAO publication.
The Blackstone's Guide Series delivers concise and accessible books
covering the latest legislation changes and amendments. Published
within weeks of an Act, they offer expert commentary by leading
names on the effects, extent and scope of the legislation, plus a
full copy of the Act itself. They offer a cost-effective solution
to key information needs and are the perfect companion for any
practitioner needing to get up to speed with the latest changes.
The Identity Cards Act 2006 is a major piece of legislation which
will fundamentally change the relationship between the state and
the individual for people of all nationalities residing in the UK
for more than three months. The Act will affect the operation of
much existing legislation, including; the Data Protection Act 1998;
the Police and Criminal Evidence Act 1984; the Regulation of
Investigatory Powers Act 2000; the Race Relations Act 1976; the
Immigration and Asylum Act 1999, and the Asylum and Immigration
(Treatment of Claimants) Act 2004. The Act will have an impact on a
wide range of legal areas, including; asylum and immigration; data
protection and freedom of information; privacy; criminal; human
rights; and civil liberties; and will introduce the following; - A
complex range of new civil and criminal penalties - a new
Commissioner's Office - New ways of working for those providing
public services, such as the police, the NHS, the Passport Service,
and benefit workers This Guide is written by two experienced
practitioners currently based at Liberty, the National Council for
Civil Liberties. Structured in a clear and logical way following
the parts of the Act, it provides an up-to-date and informative
guide, making it an essential purchase for practitioners and
organisations working in a number of legal areas.
Do we need a law of privacy? Should judges be allowed to stop us
reading about a footballer's adultery or enjoying pictures of a
film star's wedding? Is a super-model's cocaine addiction something
that she should be allowed to keep private? And aren't we entitled
to walk down the street without having our most intimate activities
recorded on security cameras and broadcast to the world? These
questions have divided not only the country but also our most
senior judges. Drawing a line between justified and unjustified
intrusion places great stresses on our legal traditions with some
judges favouring an approach which stretches existing laws to grant
relief to deserving victims, whilst other judges feel that it would
be more honest to simply recognize privacy as a new human right.
The latter approach creates further problems: should it be up to
Parliament alone to create such a right? And what about free
speech? Do the newspapers and the public not have rights too? The
issues raised are often highly emotive. Newspapers are not allowed
to identify Thompson and Venables, the young men who murdered
two-year-old James Bulger, because their lives would be in danger.
Nobody may identify Mary Bell, who also killed when she was a
child, even though there was no such risk. Will paedophiles be the
next to demand lifelong anonymity? Steering a course through this
minefield requires a grasp of legal concepts and principles and an
understanding of how the law develops. This book explores how the
English legal system has had to blend old laws on confidentiality
with modern human rights law in order to deal with these
problematic issues. Written for non-specialists by one of Britain s
best known legal journalists, this book provides a uniquely
accessible guide to the legal aspects of this public debate.
Stefan Brands proposes cryptographic building blocks for the design
of digital certificates that preserve privacy without sacrificing
security. As paper-based communication and transaction mechanisms
are replaced by automated ones, traditional forms of security such
as photographs and handwritten signatures are becoming outdated.
Most security experts believe that digital certificates offer the
best technology for safeguarding electronic communications. They
are already widely used for authenticating and encrypting email and
software, and eventually will be built into any device or piece of
software that must be able to communicate securely. There is a
serious problem, however, with this unavoidable trend: unless
drastic measures are taken, everyone will be forced to communicate
via what will be the most pervasive electronic surveillance tool
ever built. There will also be abundant opportunity for misuse of
digital certificates by hackers, unscrupulous employees, government
agencies, financial institutions, insurance companies, and so on.In
this book Stefan Brands proposes cryptographic building blocks for
the design of digital certificates that preserve privacy without
sacrificing security. Such certificates function in much the same
way as cinema tickets or subway tokens: anyone can establish their
validity and the data they specify, but no more than that.
Furthermore, different actions by the same person cannot be linked.
Certificate holders have control over what information is
disclosed, and to whom. Subsets of the proposed cryptographic
building blocks can be used in combination, allowing a cookbook
approach to the design of public key infrastructures. Potential
applications include electronic cash, electronic postage, digital
rights management, pseudonyms for online chat rooms, health care
information storage, electronic voting, and even electronic
gambling.
Securing the Internet of Things provides network and cybersecurity
researchers and practitioners with both the theoretical and
practical knowledge they need to know regarding security in the
Internet of Things (IoT). This booming field, moving from strictly
research to the marketplace, is advancing rapidly, yet security
issues abound. This book explains the fundamental concepts of IoT
security, describing practical solutions that account for resource
limitations at IoT end-node, hybrid network architecture,
communication protocols, and application characteristics.
Highlighting the most important potential IoT security risks and
threats, the book covers both the general theory and practical
implications for people working in security in the Internet of
Things.
Reimagining transparency and secrecy in the era of digital data
When total data surveillance delimits agency and revelations of
political wrongdoing fail to have consequences, is transparency the
social panacea liberal democracies purport it to be? This book sets
forth the provocative argument that progressive social goals would
be better served by a radical form of secrecy, at least while state
and corporate forces hold an asymmetrical advantage over the less
powerful in data control. Clare Birchall asks: How might
transparency actually serve agendas that are far from transparent?
Can we imagine a secrecy that could act in the service of, rather
than against, a progressive politics? To move beyond atomizing
calls for privacy and to interrupt the perennial tension between
state security and the public's right to know, Birchall adapts
Edouard Glissant's thinking to propose a digital "right to
opacity." As a crucial element of radical secrecy, she argues, this
would eventually give rise to a "postsecret" society, offering an
understanding and experience of the political that is free from the
false choice between secrecy and transparency. She grounds her
arresting story in case studies including the varied presidential
styles of George W. Bush, Barack Obama, and Donald Trump; the
Snowden revelations; conspiracy theories espoused or endorsed by
Trump; WikiLeaks and guerrilla transparency; and the opening of the
state through data portals. Postsecrecy is the necessary condition
for imagining, finally, an alternative vision of "the good," of
equality, as neither shaped by neoliberal incarnations of
transparency nor undermined by secret state surveillance. Not
least, postsecrecy reimagines collective resistance in the era of
digital data.
This book isn't about cybersecurity, it's about life. Specifically,
connected life in the 21st century. It's about the behaviours we
need to change and the threats we need to be aware of to ensure
that we can keep ourselves and our families as safe as possible in
the new connected world. We are the pioneers in connectivity and
this world is evolving in a way that none of us has ever seen
before. This book will cover elements of 21st century life which
will be familiar to all consumers - from social media, to email
hacking, to content theft, to connected devices and even connected
cars. It will steer clear of just dryly delivering facts but will
use true anecdotes to tell stories of the dangers of connectivity
to us all, every day, and how we can make simple changes to live
our connected lives more safely. * Honest, jargon-free advice on
how to keep your data safe in an increasingly complex digital world
* Topical and engaging examples from across the consumer, digital
and corporate worlds * Covers everything from passwords to talking
assistants, phishing to social media
Research Methods for Cyber Security teaches scientific methods for
generating impactful knowledge, validating theories, and adding
critical rigor to the cyber security field. This book shows how to
develop a research plan, beginning by starting research with a
question, then offers an introduction to the broad range of useful
research methods for cyber security research: observational,
mathematical, experimental, and applied. Each research method
chapter concludes with recommended outlines and suggested templates
for submission to peer reviewed venues. This book concludes with
information on cross-cutting issues within cyber security research.
Cyber security research contends with numerous unique issues, such
as an extremely fast environment evolution, adversarial behavior,
and the merging of natural and social science phenomena. Research
Methods for Cyber Security addresses these concerns and much more
by teaching readers not only the process of science in the context
of cyber security research, but providing assistance in execution
of research as well.
Questions of privacy are critical to the study of contemporary
media and society. When we're more and more connected to devices
and to content, it's increasingly important to understand how
information about ourselves is being collected, transmitted,
processed, and mediated. Privacy and the Media equips students to
do just that, providing a comprehensive overview of both the theory
and reality of privacy and the media in the 21st Century. Offering
a rich overview of this crucial and topical relationship, Andy
McStay: Explores the foundational topics of journalism, the Snowden
leaks, and encryption by companies such as Apple Considers
commercial applications including behavioural advertising, big
data, algorithms, and the role of platforms such as Google and
Facebook Introduces the role of the body with discussions of
emotion, wearable media, peer-based privacy, and sexting Encourages
students to put their understanding to work with suggestions for
further research, challenging them to explore how privacy functions
in practice. Privacy and the Media is not a polemic on privacy as
'good' or 'bad', but a call to assess the detail and the potential
implications of contemporary media technologies and practices. It
is essential reading for students and researchers of digital media,
social media, digital politics, and the creative and cultural
industries. 'Privacy and the Media is a thoughtful survey of the
privacy landscape. McStay reviews the intricate tensions and
seeming contradictions to offer an accessible book for anyone
curious about the contemporary debates in privacy.' - danah boyd,
author of It's Complicated and founder of Data & Society
'McStay's great achievement here is to confront many of the
pertinent and complex questions about media and privacy in a style
that is both authoritative and easy to read... His book will prove
an excellent companion for all students of this fascinating and
crucial topic.' - Mireille Hildebrandt, Vrije Universiteit Brussel
'Clearly and accessibly written, this book is a great resource for
anyone interested in the broad range of ways in which privacy and
contemporary media are entangled and in the big picture of
privacy/media relations today... I will definitely be assigning it
for my students.' - Helen Kennedy, University of Sheffield
Questions of privacy are critical to the study of contemporary
media and society. When we're more and more connected to devices
and to content, it's increasingly important to understand how
information about ourselves is being collected, transmitted,
processed, and mediated. Privacy and the Media equips students to
do just that, providing a comprehensive overview of both the theory
and reality of privacy and the media in the 21st Century. Offering
a rich overview of this crucial and topical relationship, Andy
McStay: Explores the foundational topics of journalism, the Snowden
leaks, and encryption by companies such as Apple Considers
commercial applications including behavioural advertising, big
data, algorithms, and the role of platforms such as Google and
Facebook Introduces the role of the body with discussions of
emotion, wearable media, peer-based privacy, and sexting Encourages
students to put their understanding to work with suggestions for
further research, challenging them to explore how privacy functions
in practice. Privacy and the Media is not a polemic on privacy as
'good' or 'bad', but a call to assess the detail and the potential
implications of contemporary media technologies and practices. It
is essential reading for students and researchers of digital media,
social media, digital politics, and the creative and cultural
industries. 'Privacy and the Media is a thoughtful survey of the
privacy landscape. McStay reviews the intricate tensions and
seeming contradictions to offer an accessible book for anyone
curious about the contemporary debates in privacy.' - danah boyd,
author of It's Complicated and founder of Data & Society
'McStay's great achievement here is to confront many of the
pertinent and complex questions about media and privacy in a style
that is both authoritative and easy to read... His book will prove
an excellent companion for all students of this fascinating and
crucial topic.' - Mireille Hildebrandt, Vrije Universiteit Brussel
'Clearly and accessibly written, this book is a great resource for
anyone interested in the broad range of ways in which privacy and
contemporary media are entangled and in the big picture of
privacy/media relations today... I will definitely be assigning it
for my students.' - Helen Kennedy, University of Sheffield
DNS Security: Defending the Domain Name System provides tactics on
how to protect a Domain Name System (DNS) framework by exploring
common DNS vulnerabilities, studying different attack vectors, and
providing necessary information for securing DNS infrastructure.
The book is a timely reference as DNS is an integral part of the
Internet that is involved in almost every attack against a network.
The book focuses entirely on the security aspects of DNS, covering
common attacks against DNS servers and the protocol itself, as well
as ways to use DNS to turn the tables on the attackers and stop an
incident before it even starts.
 |
Cyber Guerilla
(Paperback)
Jelle Van Haaster, Rickey Gevers, Martijn Sprengers
|
R1,587
Discovery Miles 15 870
|
Ships in 10 - 15 working days
|
|
Much as Che Guevara's book Guerilla Warfare helped define and
delineate a new type of warfare in the wake of the Cuban revolution
in 1961, Cyber Guerilla will help define the new types of threats
and fighters now appearing in the digital landscape. Cyber Guerilla
provides valuable insight for infosec professionals and
consultants, as well as government, military, and corporate IT
strategists who must defend against myriad threats from non-state
actors. The authors take readers inside the operations and tactics
of cyber guerillas, who are changing the dynamics of cyber warfare
and information security through their unconventional strategies
and threats. This book draws lessons from the authors' own
experiences but also from illustrative hacker groups such as
Anonymous, LulzSec and Rebellious Rose.
Analyzing and Securing Social Networks focuses on the two major
technologies that have been developed for online social networks
(OSNs): (i) data mining technologies for analyzing these networks
and extracting useful information such as location, demographics,
and sentiments of the participants of the network, and (ii)
security and privacy technologies that ensure the privacy of the
participants of the network as well as provide controlled access to
the information posted and exchanged by the participants. The
authors explore security and privacy issues for social media
systems, analyze such systems, and discuss prototypes they have
developed for social media systems whose data are represented using
semantic web technologies. These experimental systems have been
developed at The University of Texas at Dallas. The material in
this book, together with the numerous references listed in each
chapter, have been used for a graduate-level course at The
University of Texas at Dallas on analyzing and securing social
media. Several experimental systems developed by graduate students
are also provided. The book is divided into nine main sections: (1)
supporting technologies, (2) basics of analyzing and securing
social networks, (3) the authors' design and implementation of
various social network analytics tools, (4) privacy aspects of
social networks, (5) access control and inference control for
social networks, (6) experimental systems designed or developed by
the authors on analyzing and securing social networks, (7) social
media application systems developed by the authors, (8) secure
social media systems developed by the authors, and (9) some of the
authors' exploratory work and further directions.
With the proliferation of mobile devices and bring-your-own-devices
(BYOD) within enterprise networks, the boundaries of where the
network begins and ends have been blurred. Cisco Identity Services
Engine (ISE) is the leading security policy management platform
that unifies and automates access control to proactively enforce
role-based access to enterprise networks. In Practical Deployment
of Cisco Identity Services Engine (ISE), Andy Richter and Jeremy
Wood share their expertise from dozens of real-world
implementations of ISE and the methods they have used for
optimizing ISE in a wide range of environments. ISE can be
difficult, requiring a team of security and network professionals,
with the knowledge of many different specialties. Practical
Deployment of Cisco Identity Services Engine (ISE) shows you how to
deploy ISE with the necessary integration across multiple different
technologies required to make ISE work like a system. Andy Richter
and Jeremy Wood explain end-to-end how to make the system work in
the real world, giving you the benefit of their ISE expertise, as
well as all the required ancillary technologies and configurations
to make ISE work.
Digital data collection and surveillance gets more pervasive and
invasive by the day; but the best ways to protect yourself and your
data are all steps you can take yourself. The devices we use to get
just-in-time coupons, directions when we're lost, and maintain
connections with loved ones no matter how far away they are, also
invade our privacy in ways we might not even be aware of. Our
devices send and collect data about us whenever we use them, but
that data is not safeguarded the way we assume it would be. Privacy
is complex and personal. Many of us do not know the full extent to
which data is collected, stored, aggregated, and used. As recent
revelations indicate, we are subject to a level of data collection
and surveillance never before imaginable. While some of these
methods may, in fact, protect us and provide us with information
and services we deem to be helpful and desired, others can turn out
to be insidious and over-arching. Privacy in the Age of Big Data
highlights the many positive outcomes of digital surveillance and
data collection while also outlining those forms of data collection
to which we may not consent, and of which we are likely unaware.
Payton and Claypoole skillfully introduce readers to the many ways
we are 'watched,' and how to adjust our behaviors and activities to
recapture our privacy. The authors suggest the tools, behavior
changes, and political actions we can take to regain data and
identity security. Anyone who uses digital devices will want to
read this book for its clear and no-nonsense approach to the world
of big data and what it means for all of us.
|
|