|
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
Data has cemented itself as a building block of daily life.
However, surrounding oneself with great quantities of information
heightens risks to one's personal privacy. Additionally, the
presence of massive amounts of information prompts researchers into
how best to handle and disseminate it. Research is necessary to
understand how to cope with the current technological requirements.
Large-Scale Data Streaming, Processing, and Blockchain Security is
a collection of innovative research that explores the latest
methodologies, modeling, and simulations for coping with the
generation and management of large-scale data in both scientific
and individual applications. Featuring coverage on a wide range of
topics including security models, internet of things, and
collaborative filtering, this book is ideally designed for
entrepreneurs, security analysts, IT consultants, security
professionals, programmers, computer technicians, data scientists,
technology developers, engineers, researchers, academicians, and
students.
From transportation to healthcare, IoT has been heavily implemented
into practically every professional industry, making these systems
highly susceptible to security breaches. Because IoT connects not
just devices but also people and other entities, every component of
an IoT system remains vulnerable to attacks from hackers and other
unauthorized units. This clearly portrays the importance of
security and privacy in IoT, which should be strong enough to keep
the entire platform and stakeholders secure and smooth enough to
not disrupt the lucid flow of communication among IoT entities.
Applied Approach to Privacy and Security for the Internet of Things
is a collection of innovative research on the methods and applied
aspects of security in IoT-based systems by discussing core
concepts and studying real-life scenarios. While highlighting
topics including malware propagation, smart home vulnerabilities,
and bio-sensor safety, this book is ideally designed for security
analysts, software security engineers, researchers, computer
engineers, data scientists, security professionals, practitioners,
academicians, and students seeking current research on the various
aspects of privacy and security within IoT.
The notion of surveillance has become increasingly more crucial in
public conversation as new tools of observation are obtained by
many different players. The traditional notion of "overseeing" is
being increasingly replaced by multi-level surveillance where many
different actors, at different levels of hierarchy, from the child
surveilling the parent to the state surveilling its citizens, are
entering the surveillance theater. This creates a unique
surveillance ecosystem where the individual is observed not only as
an analog flesh-and-blood body moving through real spaces such as a
shopping mall, but also tracked as a data point where the volume of
data is perpetually and permanently expanding as the digital life
story is inscribed in the digital spaces. The combined narrative of
the individual is now under surveillance. Modern Day Surveillance
Ecosystem and Impacts on Privacy navigates the reader through an
understanding of the self as a narrative element that is open for
observation and analysis. This book provides a broad-based and
theoretically grounded look at the overall processes of
surveillance in a global system. Covering topics including
commodity, loss of privacy, and big data, this text is essential
for researchers, government officials, policymakers, security
analysts, lawmakers, teachers, professors, graduate and
undergraduate students, practitioners, and academicians interested
in communication, technology, surveillance, privacy, and more.
A quick, easy-to-read synthesis of theory, guidelines, and
evidence-based research, this book offers timely, practical
guidance for library and information professionals who must
navigate ethical crises in information privacy and stay on top of
emerging privacy trends. Emerging technologies create new concerns
about information privacy within library and information
organizations, and many information professionals lack guidance on
how to navigate the ethical crises that emerge when information
privacy and library policy clash. What should we do when a patron
leaves something behind? How do we justify filtering internet
access while respecting accessibility and privacy? How do we
balance new technologies that provide anonymity with the library's
need to prevent the illegal use of their facilities? Library
Patrons' Privacy presents clear, conversational, evidence-based
guidance on how to navigate these ethical questions in information
privacy. Ideas from professional organizations, government
entities, scholarly publications, and personal experiences are
synthesized into an approachable guide for librarians at all stages
of their career. This guide, designed by three experienced LIS
scholars and professionals, is a quick and enjoyable read that
students and professionals of all levels of technical knowledge and
skill will find useful and applicable to their libraries. Presents
practical, evidence-based guidance for navigating common ethical
problems in library and information science Introduces library and
information professionals and students to emerging issues in
information privacy Provides students and practitioners with a
foundation of practical problem-solving strategies for handling
information privacy issues in emerging technologies Guides the
design of new information privacy policy in all types of libraries
Encourages engagement with information privacy technologies to
assist in fulfilling the American Library Association's core values
Understand how to set up, configure, and use Azure Sentinel to
provide security incident and event management services for your
environment Key Features Secure your network, infrastructure, data,
and applications on Microsoft Azure effectively Integrate
artificial intelligence, threat analysis, and automation for
optimal security solutions Investigate possible security breaches
and gather forensic evidence to prevent modern cyber threats Book
DescriptionAzure Sentinel is a Security Information and Event
Management (SIEM) tool developed by Microsoft to integrate cloud
security and artificial intelligence (AI). Azure Sentinel not only
helps clients identify security issues in their environment, but
also uses automation to help resolve these issues. With this book,
you'll implement Azure Sentinel and understand how it can help find
security incidents in your environment with integrated artificial
intelligence, threat analysis, and built-in and community-driven
logic. This book starts with an introduction to Azure Sentinel and
Log Analytics. You'll get to grips with data collection and
management, before learning how to create effective Azure Sentinel
queries to detect anomalous behaviors and patterns of activity. As
you make progress, you'll understand how to develop solutions that
automate the responses required to handle security incidents.
Finally, you'll grasp the latest developments in security, discover
techniques to enhance your cloud security architecture, and explore
how you can contribute to the security community. By the end of
this book, you'll have learned how to implement Azure Sentinel to
fit your needs and be able to protect your environment from cyber
threats and other security issues. What you will learn Understand
how to design and build a security operations center Discover the
key components of a cloud security architecture Manage and
investigate Azure Sentinel incidents Use playbooks to automate
incident responses Understand how to set up Azure Monitor Log
Analytics and Azure Sentinel Ingest data into Azure Sentinel from
the cloud and on-premises devices Perform threat hunting in Azure
Sentinel Who this book is forThis book is for solution architects
and system administrators who are responsible for implementing new
solutions in their infrastructure. Security analysts who need to
monitor and provide immediate security solutions or threat hunters
looking to learn how to use Azure Sentinel to investigate possible
security breaches and gather forensic evidence will also benefit
from this book. Prior experience with cloud security, particularly
Azure, is necessary.
|
|