|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
The PIPA provides a new right to individuals in Bermuda and brings
the country in line with international standards of privacy
protection. The PIPA "The path to compliance; the exercise of
rights" provides the reader with a practical guide to the Act both
from the perspective of organisations that must comply with its
requirements and individuals who might benefit for its protection.
It has been written in plain English with examples and suggestions
where relevant
Secure your Amazon Web Services (AWS) infrastructure with
permission policies, key management, and network security, along
with following cloud security best practices Key Features Explore
useful recipes for implementing robust cloud security solutions on
AWS Monitor your AWS infrastructure and workloads using CloudWatch,
CloudTrail, config, GuardDuty, and Macie Prepare for the AWS
Certified Security-Specialty exam by exploring various security
models and compliance offerings Book DescriptionAs a security
consultant, securing your infrastructure by implementing policies
and following best practices is critical. This cookbook discusses
practical solutions to the most common problems related to
safeguarding infrastructure, covering services and features within
AWS that can help you implement security models such as the CIA
triad (confidentiality, integrity, and availability), and the AAA
triad (authentication, authorization, and availability), along with
non-repudiation. The book begins with IAM and S3 policies and later
gets you up to speed with data security, application security,
monitoring, and compliance. This includes everything from using
firewalls and load balancers to secure endpoints, to leveraging
Cognito for managing users and authentication. Over the course of
this book, you'll learn to use AWS security services such as Config
for monitoring, as well as maintain compliance with GuardDuty,
Macie, and Inspector. Finally, the book covers cloud security best
practices and demonstrates how you can integrate additional
security services such as Glacier Vault Lock and Security Hub to
further strengthen your infrastructure. By the end of this book,
you'll be well versed in the techniques required for securing AWS
deployments, along with having the knowledge to prepare for the AWS
Certified Security - Specialty certification. What you will learn
Create and manage users, groups, roles, and policies across
accounts Use AWS Managed Services for logging, monitoring, and
auditing Check compliance with AWS Managed Services that use
machine learning Provide security and availability for EC2
instances and applications Secure data using symmetric and
asymmetric encryption Manage user pools and identity pools with
federated login Who this book is forIf you are an IT security
professional, cloud security architect, or a cloud application
developer working on security-related roles and are interested in
using AWS infrastructure for secure application deployments, then
this Amazon Web Services book is for you. You will also find this
book useful if you're looking to achieve AWS certification. Prior
knowledge of AWS and cloud computing is required to get the most
out of this book.
Understand how to set up, configure, and use Azure Sentinel to
provide security incident and event management services for your
environment Key Features Secure your network, infrastructure, data,
and applications on Microsoft Azure effectively Integrate
artificial intelligence, threat analysis, and automation for
optimal security solutions Investigate possible security breaches
and gather forensic evidence to prevent modern cyber threats Book
DescriptionAzure Sentinel is a Security Information and Event
Management (SIEM) tool developed by Microsoft to integrate cloud
security and artificial intelligence (AI). Azure Sentinel not only
helps clients identify security issues in their environment, but
also uses automation to help resolve these issues. With this book,
you'll implement Azure Sentinel and understand how it can help find
security incidents in your environment with integrated artificial
intelligence, threat analysis, and built-in and community-driven
logic. This book starts with an introduction to Azure Sentinel and
Log Analytics. You'll get to grips with data collection and
management, before learning how to create effective Azure Sentinel
queries to detect anomalous behaviors and patterns of activity. As
you make progress, you'll understand how to develop solutions that
automate the responses required to handle security incidents.
Finally, you'll grasp the latest developments in security, discover
techniques to enhance your cloud security architecture, and explore
how you can contribute to the security community. By the end of
this book, you'll have learned how to implement Azure Sentinel to
fit your needs and be able to protect your environment from cyber
threats and other security issues. What you will learn Understand
how to design and build a security operations center Discover the
key components of a cloud security architecture Manage and
investigate Azure Sentinel incidents Use playbooks to automate
incident responses Understand how to set up Azure Monitor Log
Analytics and Azure Sentinel Ingest data into Azure Sentinel from
the cloud and on-premises devices Perform threat hunting in Azure
Sentinel Who this book is forThis book is for solution architects
and system administrators who are responsible for implementing new
solutions in their infrastructure. Security analysts who need to
monitor and provide immediate security solutions or threat hunters
looking to learn how to use Azure Sentinel to investigate possible
security breaches and gather forensic evidence will also benefit
from this book. Prior experience with cloud security, particularly
Azure, is necessary.
Protecting Privacy in Video Surveillance offers the state of the
art from leading researchers and experts in the field. This broad
ranging volume discusses the topic from various technical points of
view and also examines surveillance from a societal
perspective.
A comprehensive introduction carefully guides the reader through
the collection of cutting-edge research and current thinking. The
technical elements of the field feature topics from MERL blind
vision, stealth vision and privacy by de-identifying face images,
to using mobile communications to assert privacy from video
surveillance, and using wearable computing devices for data
collection in surveillance environments. Surveillance and society
is approached with discussions of security versus privacy, the rise
of surveillance, and focusing on social control.
This rich array of the current research in the field will be an
invaluable reference for researchers, as well as graduate
students.
A comprehensive guide that will give you hands-on experience to
study and overcome financial cyber threats Key Features Protect
your financial environment with cybersecurity practices and
methodologies Identify vulnerabilities such as data manipulation
and fraudulent transactions Provide end-to-end protection within
organizations Book DescriptionOrganizations have always been a
target of cybercrime. Hands-On Cybersecurity for Finance teaches
you how to successfully defend your system against common cyber
threats, making sure your financial services are a step ahead in
terms of security. The book begins by providing an overall
description of cybersecurity, guiding you through some of the most
important services and technologies currently at risk from cyber
threats. Once you have familiarized yourself with the topic, you
will explore specific technologies and threats based on case
studies and real-life scenarios. As you progress through the
chapters, you will discover vulnerabilities and bugs (including the
human risk factor), gaining an expert-level view of the most recent
threats. You'll then explore information on how you can achieve
data and infrastructure protection. In the concluding chapters, you
will cover recent and significant updates to procedures and
configurations, accompanied by important details related to
cybersecurity research and development in IT-based financial
services. By the end of the book, you will have gained a basic
understanding of the future of information security and will be
able to protect financial services and their related
infrastructures. What you will learn Understand the cyber threats
faced by organizations Discover how to identify attackers Perform
vulnerability assessment, software testing, and pentesting Defend
your financial cyberspace using mitigation techniques and
remediation plans Implement encryption and decryption Understand
how Artificial Intelligence (AI) affects cybersecurity Who this
book is forHands-On Cybersecurity for Finance is for you if you are
a security architect, cyber risk manager, or pentester looking to
secure your organization. Basic understanding of cybersecurity
tools and practices will help you get the most out of this book.
|
|