|
Showing 1 - 7 of
7 matches in All Departments
This book provides an overview of the topics of data, sovereignty,
and governance with respect to data and online activities through a
legal lens and from a cybersecurity perspective. This first chapter
explores the concepts of data, ownerships, and privacy with respect
to digital media and content, before defining the intersection of
sovereignty in law with application to data and digital media
content. The authors delve into the issue of digital governance, as
well as theories and systems of governance on a state level,
national level, and corporate/organizational level. Chapter three
jumps into the complex area of jurisdictional conflict of laws and
the related issues regarding digital activities in international
law, both public and private. Additionally, the book discusses the
many technical complexities which underlay the evolution and
creation of new law and governance strategies and structures. This
includes socio-political, legal, and industrial technical
complexities which can apply in these areas. The fifth chapter is a
comparative examination of the legal strategies currently being
explored by a variety of nations. The book concludes with a
discussion about emerging topics which either influence, or are
influenced by, data sovereignty and digital governance, such as
indigenous data sovereignty, digital human rights and
self-determination, artificial intelligence, and global digital
social responsibility. Cumulatively, this book provides the full
spectrum of information, from foundational principles underlining
the described topics, through to the larger, more complex, evolving
issues which we can foresee ahead of us.
This book discusses understand cybersecurity management in
decentralized finance (DeFi). It commences with introducing
fundamentals of DeFi and cybersecurity to readers. It emphasizes on
the importance of cybersecurity for decentralized finance by
illustrating recent cyber breaches, attacks, and financial losses.
The book delves into understanding cyber threats and adversaries
who can exploit those threats. It advances with cybersecurity
threat, vulnerability, and risk management in DeFi. The book helps
readers understand cyber threat landscape comprising different
threat categories for that can exploit different types of
vulnerabilities identified in DeFi. It puts forward prominent
threat modelling strategies by focusing on attackers, assets, and
software. The book includes the popular blockchains that support
DeFi include Ethereum, Binance Smart Chain, Solana, Cardano,
Avalanche, Polygon, among others. With so much monetary value
associated with all these technologies, the perpetrators are always
lured to breach security by exploiting the vulnerabilities that
exist in these technologies. For simplicity and clarity, all
vulnerabilities are classified into different categories:
arithmetic bugs, re-Entrancy attack, race conditions, exception
handling, using a weak random generator, timestamp dependency,
transaction-ordering dependence and front running, vulnerable
libraries, wrong initial assumptions, denial of service, flash loan
attacks, and vampire Since decentralized finance infrastructures
are the worst affected by cyber-attacks, it is imperative to
understand various security issues in different components of DeFi
infrastructures and proposes measures to secure all components of
DeFi infrastructures. It brings the detailed cybersecurity policies
and strategies that can be used to secure financial institutions.
Finally, the book provides recommendations to secure DeFi
infrastructures from cyber-attacks.
This book uncovers the idea of understanding cybersecurity
management in FinTech. It commences with introducing fundamentals
of FinTech and cybersecurity to readers. It emphasizes on the
importance of cybersecurity for financial institutions by
illustrating recent cyber breaches, attacks, and financial losses.
The book delves into understanding cyber threats and adversaries
who can exploit those threats. It advances with cybersecurity
threat, vulnerability, and risk management in FinTech. The book
helps readers understand cyber threat landscape comprising
different threat categories that can exploit different types of
vulnerabilties identified in FinTech. It puts forward prominent
threat modelling strategies by focusing on attackers, assets, and
software and addresses the challenges in managing cyber risks in
FinTech. The authors discuss detailed cybersecurity policies and
strategies that can be used to secure financial institutions and
provide recommendations to secure financial institutions from
cyber-attacks.
Cybersecurity, data privacy law, and the related legal implications
overlap into a relevant and developing area in the legal field.
However, many legal practitioners lack the foundational
understanding of computer processes which are fundamental for
applying existing and developing legal structures to the issue of
cybersecurity and data privacy. At the same time, those who work
and research in cybersecurity are often unprepared and unaware of
the nuances of legal application. This book translates the
fundamental building blocks of data privacy and (cyber)security law
into basic knowledge that is equally accessible and educational for
those working and researching in either field, those who are
involved with businesses and organizations, and the general public.
Cybersecurity, data privacy law, and the related legal implications
overlap into a relevant and developing area in the legal field.
However, many legal practitioners lack the foundational
understanding of computer processes which are fundamental for
applying existing and developing legal structures to the issue of
cybersecurity and data privacy. At the same time, those who work
and research in cybersecurity are often unprepared and unaware of
the nuances of legal application. This book translates the
fundamental building blocks of data privacy and (cyber)security law
into basic knowledge that is equally accessible and educational for
those working and researching in either field, those who are
involved with businesses and organizations, and the general public.
This book uncovers the idea of understanding cybersecurity
management in FinTech. It commences with introducing fundamentals
of FinTech and cybersecurity to readers. It emphasizes on the
importance of cybersecurity for financial institutions by
illustrating recent cyber breaches, attacks, and financial losses.
The book delves into understanding cyber threats and adversaries
who can exploit those threats. It advances with cybersecurity
threat, vulnerability, and risk management in FinTech. The book
helps readers understand cyber threat landscape comprising
different threat categories that can exploit different types of
vulnerabilties identified in FinTech. It puts forward prominent
threat modelling strategies by focusing on attackers, assets, and
software and addresses the challenges in managing cyber risks in
FinTech. The authors discuss detailed cybersecurity policies and
strategies that can be used to secure financial institutions and
provide recommendations to secure financial institutions from
cyber-attacks.
In this day and age, mobile communication has become a ubiquitous
part of the modern life and most likely covers all forms
communication in the near future. The goal of this book is to
provide a tutorial introduction to mobile communications by
illustrating the theories underpinning the layers within the mobile
networks along with surveys on the currently available mobile
operating systems. This book begins with a review of the wireless
communication emphasizing on mobile transmissions. It further
touches medium access controls in mobile and satellite systems. It
will also review mobile network layers and discussed how it
provides support for mobility. This book further explains and
illustrates the three categories of mobile operating systems namely
Linux, Windows and others. Finally, this book will touch the
programming and coding of three famous mobile operating systems
namely Symbian, Android and Windows Phone 7. This book was written
as an ideal reference material for science undergraduate and
postgraduate students. It can also be use as a guide for research
engineers, telecommunications researchers as well as mobile system
developers.
|
You may like...
Tenet
John David Washington, Robert Pattinson, …
DVD
(1)
R51
Discovery Miles 510
|