|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
In the world as we know it, you can be attacked both physically and
virtually. For today's organisations, which rely so heavily on
technology - particularly the Internet - to do business, the latter
is the far more threatening of the two. The cyber threat landscape
is complex and constantly changing. For every vulnerability fixed,
another pops up, ripe for exploitation. This book is a
comprehensive cyber security implementation manual which gives
practical guidance on the individual activities identified in the
IT Governance Cyber Resilience Framework (CRF) that can help
organisations become cyber resilient and combat the cyber threat
landscape. Suitable for senior directors (CEO, CISO, CIO),
compliance managers, privacy managers, IT managers, security
analysts and others, the book is divided into six parts: Part 1:
Introduction. The world of cyber security and the approach taken in
this book. Part 2: Threats and vulnerabilities. A discussion of a
range of threats organisations face, organised by threat category,
to help you understand what you are defending yourself against
before you start thinking about your actual defences. Part 3: The
CRF processes. Detailed discussions of each of the 24 CRF
processes, explaining a wide range of security areas by process
category and offering guidance on how to implement each. Part 4:
Eight steps to implementing cyber security. Our eight-step approach
to implementing the cyber security processes you need and
maintaining them. Part 5: Reference frameworks. An explanation of
how standards and frameworks work, along with their benefits. It
also presents ten framework options, introducing you to some of the
best-known standards and giving you an idea of the range available.
Part 6: Conclusion and appendices. The appendices include a
glossary of all the acronyms and abbreviations used in this book.
Whether you are just starting out on the road to cyber security or
looking to enhance and improve your existing cyber resilience
programme, it should be clear that cyber security is no longer
optional in today's information age; it is an essential component
of business success. Make sure you understand the threats and
vulnerabilities your organisation faces and how the Cyber
Resilience Framework can help you tackle them. Start your journey
to cyber security now - buy this book today!
The fastest-growing malware in the world The core functionality of
ransomware is two-fold: to encrypt data and deliver the ransom
message. This encryption can be relatively basic or maddeningly
complex, and it might affect only a single device or a whole
network. Ransomware is the fastest-growing malware in the world. In
2015, it cost companies around the world $325 million, which rose
to $5 billion by 2017 and is set to hit $20 billion in 2021. The
threat of ransomware is not going to disappear, and while the
number of ransomware attacks remains steady, the damage they cause
is significantly increasing. It is the duty of all business leaders
to protect their organisations and the data they rely on by doing
whatever is reasonably possible to mitigate the risk posed by
ransomware. To do that, though, they first need to understand the
threats they are facing. The Ransomware Threat Landscape This book
sets out clearly how ransomware works, to help business leaders
better understand the strategic risks, and explores measures that
can be put in place to protect the organisation. These measures are
structured so that any organisation can approach them. Those with
more resources and more complex environments can build them into a
comprehensive system to minimise risks, while smaller organisations
can secure their profiles with simpler, more straightforward
implementation. Suitable for senior directors, compliance managers,
privacy managers, privacy officers, IT staff, security analysts and
admin staff - in fact, all staff who use their organisation's
network/online systems to perform their role - The Ransomware
Threat Landscape - Prepare for, recognise and survive ransomware
attacks will help readers understand the ransomware threat they
face. From basic cyber hygiene to more advanced controls, the book
gives practical guidance on individual activities, introduces
implementation steps organisations can take to increase their cyber
resilience, and explores why cyber security is imperative. Topics
covered include: Introduction About ransomware Basic measures An
anti-ransomware The control framework Risk management Controls
Maturity Basic controls Additional controls for larger
organisations Advanced controls Don't delay - start protecting your
organisation from ransomware and buy this book today!
This book makes the case that traditional security design does not
take the end-user into consideration, and therefore, fails. This
book goes on to explain, using a series of examples, how to rethink
security solutions to take users into consideration. By
understanding the limitations and habits of users - including
malicious users, aiming to corrupt the system - this book
Illustrates how better security technologies are made possible.
Traditional security books focus on one of the following areas:
cryptography, security protocols, or existing standards. They
rarely consider the end user as part of the security equation, and
when they do, it is in passing. This book considers the end user as
the most important design consideration, and then shows how to
build security and privacy technologies that are both secure and
which offer privacy. This reduces the risk for social engineering
and, in general, abuse. Advanced-level students interested in
software engineering, security and HCI (Human Computer Interaction)
will find this book useful as a study guide. Engineers and security
practitioners concerned with abuse and fraud will also benefit from
the methodologies and techniques in this book.
Tools and technologies have long complemented and extended our
physical abilities: from pre-historic spearheads to steam-propelled
ploughs and high-tech prosthetics. While the development of lenses
granted us insights into the micro and macrocosms, new sensors and
technologies increasingly augment our cognitive abilities,
including memory and perception. This book integrates current
research efforts, results, and visions from the fields of computer
science, neuroscience, and psychology. It provides a comprehensive
overview of the state-of-the-art and future applications of how
technologies assist and augment human perception and cognition.
Experts in the field share their research and findings on: Working
memory enhancements Digitization of memories through lifelog
archives The consequences of technology-induced disruptions and
forgetting The creation and utilization of new human senses Ethical
and security concerns that arise with augmentation technologies. As
technology weaves itself ever deeper into our lives, careful
examination of its capabilities, risks and benefits is warranted.
While this book focuses on the complementation and augmentation of
human capabilities, it serves as a foundation for students,
researchers and designers of technologies that push the boundaries
of perception and cognition.
This book provides the state-of-the-art development on security and
privacy for fog/edge computing, together with their system
architectural support and applications. This book is organized into
five parts with a total of 15 chapters. Each area corresponds to an
important snapshot. The first part of this book presents an
overview of fog/edge computing, focusing on its relationship with
cloud technology and the future with the use of 5G communication.
Several applications of edge computing are discussed. The second
part of this book considers several security issues in fog/edge
computing, including the secure storage and search services,
collaborative intrusion detection method on IoT-fog computing, and
the feasibility of deploying Byzantine agreement protocols in
untrusted environments. The third part of this book studies the
privacy issues in fog/edge computing. It first investigates the
unique privacy challenges in fog/edge computing, and then discusses
a privacy-preserving framework for the edge-based video analysis, a
popular machine learning application on fog/edge. This book also
covers the security architectural design of fog/edge computing,
including a comprehensive overview of vulnerabilities in fog/edge
computing within multiple architectural levels, the security and
intelligent management, the implementation of
network-function-virtualization-enabled multicasting in part four.
It explains how to use the blockchain to realize security services.
The last part of this book surveys applications of fog/edge
computing, including the fog/edge computing in Industrial IoT,
edge-based augmented reality, data streaming in fog/edge computing,
and the blockchain-based application for edge-IoT. This book is
designed for academics, researchers and government officials,
working in the field of fog/edge computing and cloud computing.
Practitioners, and business organizations (e.g., executives, system
designers, and marketing professionals), who conduct teaching,
research, decision making, and designing fog/edge technology will
also benefit from this book The content of this book will be
particularly useful for advanced-level students studying computer
science, computer technology, and information systems, but also
applies to students in business, education, and economics, who
would benefit from the information, models, and case studies
therein.
This open access book provides the first comprehensive collection
of papers that provide an integrative view on cybersecurity. It
discusses theories, problems and solutions on the relevant ethical
issues involved. This work is sorely needed in a world where
cybersecurity has become indispensable to protect trust and
confidence in the digital infrastructure whilst respecting
fundamental values like equality, fairness, freedom, or privacy.
The book has a strong practical focus as it includes case studies
outlining ethical issues in cybersecurity and presenting guidelines
and other measures to tackle those issues. It is thus not only
relevant for academics but also for practitioners in cybersecurity
such as providers of security software, governmental CERTs or Chief
Security Officers in companies.
This book revises the strategic objectives of Information Warfare,
interpreting them according to the modern canons of information
age, focusing on the fabric of society, the economy, and critical
Infrastructures. The authors build plausible detailed real-world
scenarios for each entity, showing the related possible threats
from the Information Warfare point of view. In addition, the
authors dive into the description of the still open problems,
especially when it comes to critical infrastructures, and the
countermeasures that can be implemented, possibly inspiring further
research in the domain. This book intends to provide a conceptual
framework and a methodological guide, enriched with vivid and
compelling use cases for the readers (e.g. technologists,
academicians, military, government) interested in what Information
Warfare really means, when its lenses are applied to current
technology. Without sacrificing accuracy, rigor and, most
importantly, the big picture of Information Warfare, this book
dives into several relevant and up-to-date critical domains. The
authors illustrate how finance (an always green target of
Information Warfare) is intertwined with Social Media, and how an
opponent could exploit these latter ones to reach its objectives.
Also, how cryptocurrencies are going to reshape the economy, and
the risks involved by this paradigm shift. Even more compelling is
how the very fabric of society is going to be reshaped by
technology, for instance how our democratic elections are exposed
to risks that are even greater than what appears in the current
public discussions. Not to mention how our Critical Infrastructure
is becoming exposed to a series of novel threats, ranging from
state-supported malware to drones. A detailed discussion of
possible countermeasures and what the open issues are for each of
the highlighted threats complete this book. This book targets a
widespread audience that includes researchers and advanced level
students studying and working in computer science with a focus on
security. Military officers, government officials and professionals
working in this field will also find this book useful as a
reference.
This book introduces the state-of-the-art algorithms for data and
computation privacy. It mainly focuses on searchable symmetric
encryption algorithms and privacy preserving multi-party
computation algorithms. This book also introduces algorithms for
breaking privacy, and gives intuition on how to design algorithm to
counter privacy attacks. Some well-designed differential privacy
algorithms are also included in this book. Driven by lower cost,
higher reliability, better performance, and faster deployment, data
and computing services are increasingly outsourced to clouds. In
this computing paradigm, one often has to store privacy sensitive
data at parties, that cannot fully trust and perform privacy
sensitive computation with parties that again cannot fully trust.
For both scenarios, preserving data privacy and computation privacy
is extremely important. After the Facebook-Cambridge Analytical
data scandal and the implementation of the General Data Protection
Regulation by European Union, users are becoming more privacy aware
and more concerned with their privacy in this digital world. This
book targets database engineers, cloud computing engineers and
researchers working in this field. Advanced-level students studying
computer science and electrical engineering will also find this
book useful as a reference or secondary text.
|
|