|
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
The successes and failures of an industry that claims to protect
and promote our online identities What does privacy mean in the
digital era? As technology increasingly blurs the boundary between
public and private, questions about who controls our data become
harder and harder to answer. Our every web view, click, and online
purchase can be sold to anyone to store and use as they wish. At
the same time, our online reputation has become an important part
of our identity-a form of cultural currency. The Identity Trade
examines the relationship between online visibility and privacy,
and the politics of identity and self-presentation in the digital
age. In doing so, Nora Draper looks at the revealing two-decade
history of efforts by the consumer privacy industry to give
individuals control over their digital image through the sale of
privacy protection and reputation management as a service. Through
in-depth interviews with industry experts, as well as analysis of
media coverage, promotional materials, and government policies,
Draper examines how companies have turned the protection and
promotion of digital information into a business. Along the way,
she also provides insight into how these companies have responded
to and shaped the ways we think about image and reputation in the
digital age. Tracking the successes and failures of companies
claiming to control our digital ephemera, Draper takes us inside an
industry that has commodified strategies of information control.
This book is a discerning overview of the debate around who
controls our data, who buys and sells it, and the consequences of
treating privacy as a consumer good.
Understand how to set up, configure, and use Azure Sentinel to
provide security incident and event management services for your
environment Key Features Secure your network, infrastructure, data,
and applications on Microsoft Azure effectively Integrate
artificial intelligence, threat analysis, and automation for
optimal security solutions Investigate possible security breaches
and gather forensic evidence to prevent modern cyber threats Book
DescriptionAzure Sentinel is a Security Information and Event
Management (SIEM) tool developed by Microsoft to integrate cloud
security and artificial intelligence (AI). Azure Sentinel not only
helps clients identify security issues in their environment, but
also uses automation to help resolve these issues. With this book,
you'll implement Azure Sentinel and understand how it can help find
security incidents in your environment with integrated artificial
intelligence, threat analysis, and built-in and community-driven
logic. This book starts with an introduction to Azure Sentinel and
Log Analytics. You'll get to grips with data collection and
management, before learning how to create effective Azure Sentinel
queries to detect anomalous behaviors and patterns of activity. As
you make progress, you'll understand how to develop solutions that
automate the responses required to handle security incidents.
Finally, you'll grasp the latest developments in security, discover
techniques to enhance your cloud security architecture, and explore
how you can contribute to the security community. By the end of
this book, you'll have learned how to implement Azure Sentinel to
fit your needs and be able to protect your environment from cyber
threats and other security issues. What you will learn Understand
how to design and build a security operations center Discover the
key components of a cloud security architecture Manage and
investigate Azure Sentinel incidents Use playbooks to automate
incident responses Understand how to set up Azure Monitor Log
Analytics and Azure Sentinel Ingest data into Azure Sentinel from
the cloud and on-premises devices Perform threat hunting in Azure
Sentinel Who this book is forThis book is for solution architects
and system administrators who are responsible for implementing new
solutions in their infrastructure. Security analysts who need to
monitor and provide immediate security solutions or threat hunters
looking to learn how to use Azure Sentinel to investigate possible
security breaches and gather forensic evidence will also benefit
from this book. Prior experience with cloud security, particularly
Azure, is necessary.
A comprehensive guide that will give you hands-on experience to
study and overcome financial cyber threats Key Features Protect
your financial environment with cybersecurity practices and
methodologies Identify vulnerabilities such as data manipulation
and fraudulent transactions Provide end-to-end protection within
organizations Book DescriptionOrganizations have always been a
target of cybercrime. Hands-On Cybersecurity for Finance teaches
you how to successfully defend your system against common cyber
threats, making sure your financial services are a step ahead in
terms of security. The book begins by providing an overall
description of cybersecurity, guiding you through some of the most
important services and technologies currently at risk from cyber
threats. Once you have familiarized yourself with the topic, you
will explore specific technologies and threats based on case
studies and real-life scenarios. As you progress through the
chapters, you will discover vulnerabilities and bugs (including the
human risk factor), gaining an expert-level view of the most recent
threats. You'll then explore information on how you can achieve
data and infrastructure protection. In the concluding chapters, you
will cover recent and significant updates to procedures and
configurations, accompanied by important details related to
cybersecurity research and development in IT-based financial
services. By the end of the book, you will have gained a basic
understanding of the future of information security and will be
able to protect financial services and their related
infrastructures. What you will learn Understand the cyber threats
faced by organizations Discover how to identify attackers Perform
vulnerability assessment, software testing, and pentesting Defend
your financial cyberspace using mitigation techniques and
remediation plans Implement encryption and decryption Understand
how Artificial Intelligence (AI) affects cybersecurity Who this
book is forHands-On Cybersecurity for Finance is for you if you are
a security architect, cyber risk manager, or pentester looking to
secure your organization. Basic understanding of cybersecurity
tools and practices will help you get the most out of this book.
The PIPA provides a new right to individuals in Bermuda and brings
the country in line with international standards of privacy
protection. The PIPA "The path to compliance; the exercise of
rights" provides the reader with a practical guide to the Act both
from the perspective of organisations that must comply with its
requirements and individuals who might benefit for its protection.
It has been written in plain English with examples and suggestions
where relevant
Protecting Privacy in Video Surveillance offers the state of the
art from leading researchers and experts in the field. This broad
ranging volume discusses the topic from various technical points of
view and also examines surveillance from a societal
perspective.
A comprehensive introduction carefully guides the reader through
the collection of cutting-edge research and current thinking. The
technical elements of the field feature topics from MERL blind
vision, stealth vision and privacy by de-identifying face images,
to using mobile communications to assert privacy from video
surveillance, and using wearable computing devices for data
collection in surveillance environments. Surveillance and society
is approached with discussions of security versus privacy, the rise
of surveillance, and focusing on social control.
This rich array of the current research in the field will be an
invaluable reference for researchers, as well as graduate
students.
|
|