|
|
Showing 1 - 3 of
3 matches in All Departments
Digital forensics is the science of collecting evidence often used
in a court of law to prosecute those who engage in digital
activities that are deemed unlawful. ""Digital Crime and Forensic
Science in Cyberspace"" is unique in putting together a number of
contributions from leading experts in digital forensics and
associated fields, making information on this new and complex
subject available in one source of reference that addresses its
multifaceted nature. The chapters in this book depict the nature of
the crime and the motives of the criminals before proceeding to
analyze the type of attacks one must understand in order to be
prepared. ""Digital Crime and Forensic Science in Cyberspace"" also
covers incident preparedness and the tools that are available to
the digital investigator, as well as issues that pertain to the
education and skills that this new professional must be able to
display.
Internet of Things (IoT) is an ecosystem comprised of heterogeneous
connected devices that communicate to deliver capabilities making
our living, cities, transport, energy, and other areas more
intelligent. This book delves into the different cyber-security
domains and their challenges due to the massive amount and the
heterogeneity of devices. This book introduces readers to the
inherent concepts of IoT. It offers case studies showing how IoT
counteracts the cyber-security concerns for domains. It provides
suggestions on how to mitigate cyber threats by compiling a
catalogue of threats that currently comprise the contemporary
threat landscape. It then examines different security measures that
can be applied to system installations or operational environment
and discusses how these measures may alter the threat
exploitability level and/or the level of the technical impact.
Professionals, graduate students, researchers, academicians, and
institutions that are interested in acquiring knowledge in the
areas of IoT and cyber-security, will find this book of interest.
Cyber-Security Threats, Actors, and Dynamic Mitigation provides
both a technical and state-of-the-art perspective as well as a
systematic overview of the recent advances in different facets of
cyber-security. It covers the methodologies for modeling attack
strategies used by threat actors targeting devices, systems, and
networks such as smart homes, critical infrastructures, and
industrial IoT. With a comprehensive review of the threat
landscape, the book explores both common and sophisticated threats
to systems and networks. Tools and methodologies are presented for
precise modeling of attack strategies, which can be used both
proactively in risk management and reactively in intrusion
prevention and response systems. Several contemporary techniques
are offered ranging from reconnaissance and penetration testing to
malware detection, analysis, and mitigation. Advanced machine
learning-based approaches are also included in the area of
anomaly-based detection, that are capable of detecting attacks
relying on zero-day vulnerabilities and exploits. Academics,
researchers, and professionals in cyber-security who want an
in-depth look at the contemporary aspects of the field will find
this book of interest. Those wanting a unique reference for various
cyber-security threats and how they are detected, analyzed, and
mitigated will reach for this book often.
|
|