Home Page Icon
Home Page
Table of Contents for
Dedication
Close
Dedication
by Manju Khari, Jyotir Moy Chatterjee, Brojo Kishore Mishra, Raghvendra Kumar, Dac-
Cyber Security in Parallel and Distributed Computing
Cover
Title page
Copyright page
Dedication
List of Figures
List of Tables
Foreword
Preface
Acknowledgement
Acronyms
Part I: Cybersecurity Concept
Chapter 1: Introduction on Cybersecurity
1.1 Introduction to Cybersecurity
1.2 Cybersecurity Objectives
1.3 Cybersecurity Infrastructure and Internet Architecture (NIST)
1.4 Cybersecurity Roles
1.5 Cybercrimes
1.6 Security Models
1.7 Computer Forensics
1.8 Cyber Insurance
1.9 Future of Cybersecurity
1.10 Conclusion
References
Chapter 2: Steganography and Steganalysis
2.1 Introduction
2.2 Steganography
2.3 Steganalysis
2.4 Conclusion
References
Chapter 3: Security Threats and Vulnerabilities in E-business
3.1 Introduction to e-Business
3.2 Security Issues in e-Business
3.3 Common Vulnerabilities in e-Business
3.4 Threats in e-Business
3.5 Prevention Mechanism
3.6 Conclusion
References
Chapter 4: e-Commerce Security: Threats, Issues, and Methods
4.1 Introduction
4.2 Literature Review
4.3 e-Commerce
4.4 Security Overview in e-Commerce
4.5 Security Issues in e-Commerce
4.6 Security Threats in e-Commerce
4.7 Security Approaches in e-Commerce
4.8 Comparative Analysis of Various Security Threats in e-Commerce
4.9 e-Commerce Security Life-Cycle Model
4.10 Conclusion
References
Chapter 5: Cyberwar is Coming
5.1 Introduction
5.2 Ransomware Attacks
5.3 Are Nations Ready?
5.4 Conclusion
References
Part II: Cybersecurity in Parallel and Distributed Computing Techniques
Chapter 6: Introduction to Blockchain Technology
6.1 Introduction
6.2 Need for Blockchain Security
6.3 Characteristics of Blockchain Technology
6.4 Types of Blockchains
6.5 The Architecture of Blockchain Technology
6.6 How Blockchain Technology Works
6.7 Some Other Case Studies for Blockchain Technology
6.8 Challenges Faced by Blockchain Technology
6.9 The Future of Blockchain Technology
6.10 Conclusion
References
Chapter 7: Cyber-Security Techniques in Distributed Systems, SLAs and other Cyber Regulations
7.1 Introduction
7.2 Identifying Cyber Requirements
7.3 Popular security mechanisms in Distributed Systems
7.4 Service Level Agreements
7.5 The Cuckoo’s Egg in the Context of IT Security
7.6 Searching and Seizing Computer-Related Evidence
7.7 Conclusion
References
Chapter 8: Distributed Computing Security: Issues and Challenges
8.1 Introduction
8.2 Security Issues and Challenges
8.3 Security Issues and Challenges in Advanced Areas
8.4 Conclusion
References
Chapter 9: Organization Assignment in Federated Cloud Environments based on Multi-Target Optimization of Security
9.1 Introduction
9.2 Background Work Related to Domain
9.3 Architectural-Based Cloud Security Implementation
9.4 Expected Results of the Process
9.5 Conclusion
References
Chapter 10: An On-Demand and User-Friendly Framework for Cloud Data Centre Networks with Performance Guarantee
10.1 Introduction
10.2 Difficulties from a Cloud Adoption Perspective
10.3 Security and Privacy
10.4 Conclusion and Future Work
References
Part III: Cybersecurity Applications and Case Studies
Chapter 11: Cybersecurity at Organizations: A Delphi Pilot Study of Expert Opinions About Policy and Protection
11.1 Introduction
11.2 Shocking Statistics of Cybercrime
11.3 Cybersecurity Policies for Organizations
11.4 Blockchain Technology
11.5 Research Methodology
11.6 Results of the Cybersecurity Delphi Study
11.7 Conclusion
References
Chapter 12: Smartphone Triggered Security Challenges - Issues, Case Studies and Prevention
12.1 Introduction
12.2 Classification of Mobile Security Threats
12.3 Smartphones as a Tool of Crime
12.4 Types of Mobile Phone-Related Crimes
12.5 Types of Mobile Fraud
12.6 Case Studies
12.7 Preventive Measures and Precautions
12.8 Conclusion
References
Chapter 13: Cybersecurity: A Practical Strategy Against Cyber Threats, Risks with Real World Usages
13.1 Introduction
13.2 Cyberwar
13.3 Arms Control in Cyberwar
13.4 Internet Security Alliance
13.5 Cybersecurity Information Sharing Act
13.6 Market for Malware
13.7 Mobile Cybersecurity
13.8 Healthcare
13.9 Human Rights
13.10 Cybersecurity Application in Our Life
13.11 Conclusion
References
Chapter 14: Security in Distributed Operating System: A Comprehensive Study
14.1 Introduction to Security and Distributed Systems
14.2 Relevant Terminology
14.3 Types of External Attacks
14.4 Globus Security Architecture
14.5 Distribution of Security Mechanism
14.6 Conclusions
References
Chapter 15: Security in Healthcare Applications Based on Fog and Cloud Computing
15.1 Introduction
15.2 Security Needs of Healthcare Sector
15.3 Solutions to Probable Attacks in e-Healthcare
15.4 Emerging Threats in Cloud- and Fog-Based Healthcare System
15.5 Conclusion
References
Chapter 16: Mapping of e-Wallets with Features
16.1 Introduction
16.2 Review of Literature
16.3 Market Share of e-Wallet
16.4 Research Methodology
16.5 Result Analysis
16.6 Conclusions and future work
References
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Copyright page
Next
Next Chapter
List of Figures
To our parents
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset