0%

Book Description

The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field. It also includes various real-time/offline applications and case studies in the fields of engineering and computer science and the modern tools and technologies used. Information on cybersecurity technologies is organized in the fifteen chapters of this book.

This important book cover subjects such as:

  • Research and solutions for the problem of hidden image detection
  • Security aspects of data mining and possible solution techniques
  • A comparative analysis of various methods used in e-commerce security and how to perform secure payment transactions in an efficient manner
  • Blockchain technology and how it is crucial to the security industry
  • Security for the Internet of Things
  • Security issues and challenges in distributed computing security such as heterogeneous computing, cloud computing, fog computing, etc.
  • Demonstrates the administration task issue in unified cloud situations as a multi-target enhancement issue in light of security
  • Explores the concepts of cybercrime and cybersecurity and presents the statistical impact it is having on organizations
  • Highlights some strategies for maintaining the privacy, integrity, confidentiality and availability of cyber information and its real-world impacts such as mobile security software for secure email and online banking, cyber health check programs for business, cyber incident response management, cybersecurity risk management
  • Security policies and mechanisms, various categories of attacks (e.g., denial-of-service),  global security architecture, along with distribution of security mechanisms
  • Security issues in the healthcare sector with existing solutions and emerging threats.

Table of Contents

  1. Cover
  2. Title page
  3. Copyright page
  4. Dedication
  5. List of Figures
  6. List of Tables
  7. Foreword
  8. Preface
  9. Acknowledgement
  10. Acronyms
  11. Part I: Cybersecurity Concept
    1. Chapter 1: Introduction on Cybersecurity
      1. 1.1 Introduction to Cybersecurity
      2. 1.2 Cybersecurity Objectives
      3. 1.3 Cybersecurity Infrastructure and Internet Architecture (NIST)
      4. 1.4 Cybersecurity Roles
      5. 1.5 Cybercrimes
      6. 1.6 Security Models
      7. 1.7 Computer Forensics
      8. 1.8 Cyber Insurance
      9. 1.9 Future of Cybersecurity
      10. 1.10 Conclusion
      11. References
    2. Chapter 2: Steganography and Steganalysis
      1. 2.1 Introduction
      2. 2.2 Steganography
      3. 2.3 Steganalysis
      4. 2.4 Conclusion
      5. References
    3. Chapter 3: Security Threats and Vulnerabilities in E-business
      1. 3.1 Introduction to e-Business
      2. 3.2 Security Issues in e-Business
      3. 3.3 Common Vulnerabilities in e-Business
      4. 3.4 Threats in e-Business
      5. 3.5 Prevention Mechanism
      6. 3.6 Conclusion
      7. References
    4. Chapter 4: e-Commerce Security: Threats, Issues, and Methods
      1. 4.1 Introduction
      2. 4.2 Literature Review
      3. 4.3 e-Commerce
      4. 4.4 Security Overview in e-Commerce
      5. 4.5 Security Issues in e-Commerce
      6. 4.6 Security Threats in e-Commerce
      7. 4.7 Security Approaches in e-Commerce
      8. 4.8 Comparative Analysis of Various Security Threats in e-Commerce
      9. 4.9 e-Commerce Security Life-Cycle Model
      10. 4.10 Conclusion
      11. References
    5. Chapter 5: Cyberwar is Coming
      1. 5.1 Introduction
      2. 5.2 Ransomware Attacks
      3. 5.3 Are Nations Ready?
      4. 5.4 Conclusion
      5. References
  12. Part II: Cybersecurity in Parallel and Distributed Computing Techniques
    1. Chapter 6: Introduction to Blockchain Technology
      1. 6.1 Introduction
      2. 6.2 Need for Blockchain Security
      3. 6.3 Characteristics of Blockchain Technology
      4. 6.4 Types of Blockchains
      5. 6.5 The Architecture of Blockchain Technology
      6. 6.6 How Blockchain Technology Works
      7. 6.7 Some Other Case Studies for Blockchain Technology
      8. 6.8 Challenges Faced by Blockchain Technology
      9. 6.9 The Future of Blockchain Technology
      10. 6.10 Conclusion
      11. References
    2. Chapter 7: Cyber-Security Techniques in Distributed Systems, SLAs and other Cyber Regulations
      1. 7.1 Introduction
      2. 7.2 Identifying Cyber Requirements
      3. 7.3 Popular security mechanisms in Distributed Systems
      4. 7.4 Service Level Agreements
      5. 7.5 The Cuckoo’s Egg in the Context of IT Security
      6. 7.6 Searching and Seizing Computer-Related Evidence
      7. 7.7 Conclusion
      8. References
    3. Chapter 8: Distributed Computing Security: Issues and Challenges
      1. 8.1 Introduction
      2. 8.2 Security Issues and Challenges
      3. 8.3 Security Issues and Challenges in Advanced Areas
      4. 8.4 Conclusion
      5. References
    4. Chapter 9: Organization Assignment in Federated Cloud Environments based on Multi-Target Optimization of Security
      1. 9.1 Introduction
      2. 9.2 Background Work Related to Domain
      3. 9.3 Architectural-Based Cloud Security Implementation
      4. 9.4 Expected Results of the Process
      5. 9.5 Conclusion
      6. References
    5. Chapter 10: An On-Demand and User-Friendly Framework for Cloud Data Centre Networks with Performance Guarantee
      1. 10.1 Introduction
      2. 10.2 Difficulties from a Cloud Adoption Perspective
      3. 10.3 Security and Privacy
      4. 10.4 Conclusion and Future Work
      5. References
  13. Part III: Cybersecurity Applications and Case Studies
    1. Chapter 11: Cybersecurity at Organizations: A Delphi Pilot Study of Expert Opinions About Policy and Protection
      1. 11.1 Introduction
      2. 11.2 Shocking Statistics of Cybercrime
      3. 11.3 Cybersecurity Policies for Organizations
      4. 11.4 Blockchain Technology
      5. 11.5 Research Methodology
      6. 11.6 Results of the Cybersecurity Delphi Study
      7. 11.7 Conclusion
      8. References
    2. Chapter 12: Smartphone Triggered Security Challenges - Issues, Case Studies and Prevention
      1. 12.1 Introduction
      2. 12.2 Classification of Mobile Security Threats
      3. 12.3 Smartphones as a Tool of Crime
      4. 12.4 Types of Mobile Phone-Related Crimes
      5. 12.5 Types of Mobile Fraud
      6. 12.6 Case Studies
      7. 12.7 Preventive Measures and Precautions
      8. 12.8 Conclusion
      9. References
    3. Chapter 13: Cybersecurity: A Practical Strategy Against Cyber Threats, Risks with Real World Usages
      1. 13.1 Introduction
      2. 13.2 Cyberwar
      3. 13.3 Arms Control in Cyberwar
      4. 13.4 Internet Security Alliance
      5. 13.5 Cybersecurity Information Sharing Act
      6. 13.6 Market for Malware
      7. 13.7 Mobile Cybersecurity
      8. 13.8 Healthcare
      9. 13.9 Human Rights
      10. 13.10 Cybersecurity Application in Our Life
      11. 13.11 Conclusion
      12. References
    4. Chapter 14: Security in Distributed Operating System: A Comprehensive Study
      1. 14.1 Introduction to Security and Distributed Systems
      2. 14.2 Relevant Terminology
      3. 14.3 Types of External Attacks
      4. 14.4 Globus Security Architecture
      5. 14.5 Distribution of Security Mechanism
      6. 14.6 Conclusions
      7. References
    5. Chapter 15: Security in Healthcare Applications Based on Fog and Cloud Computing
      1. 15.1 Introduction
      2. 15.2 Security Needs of Healthcare Sector
      3. 15.3 Solutions to Probable Attacks in e-Healthcare
      4. 15.4 Emerging Threats in Cloud- and Fog-Based Healthcare System
      5. 15.5 Conclusion
      6. References
    6. Chapter 16: Mapping of e-Wallets with Features
      1. 16.1 Introduction
      2. 16.2 Review of Literature
      3. 16.3 Market Share of e-Wallet
      4. 16.4 Research Methodology
      5. 16.5 Result Analysis
      6. 16.6 Conclusions and future work
      7. References
  14. End User License Agreement
3.146.105.194