List of Figures

2.1 Classification of Steganography

3.1 Product flow structure in traditional business

3.2 Communication cycle in e-business, from manufacturer to customer

4.1 Two-tier e-commerce architecture

4.2 Three-tier e-commerce architecture

4.3 DDOS attack

4.4 SQL injection attack

4.5 Price manipulation

4.6 Session hijacking attack

4.7 Cross-site scripting attack

4.8 Security engineering life cycle

5.1 Virus alert!

5.2 Petya ransomware

5.3 WannaCry ransomware

5.4 Motives of the attackers over the years

6.1 Blockchain architecture diagram

6.2 Network architecture of blockchain

6.3 How transactions get converted to blocks

6.4 Cryptocurrency transaction using blockchain technology

6.5 How double spending may occur

6.6 Blockchain generation from unordered transactions

7.1 Challenges of a distributed system

7.2 Shared secret key-based authentication

7.3 Role of KDC in authentication

7.4 Public key encryption based on mutual authentication

7.5 Digital signature

7.6 Schematic of a sandbox and a playground

9.1 Overview of MQMCE

9.2 MQMCE scheduler process

9.3 Obtained non-dominated solutions for the parallel workflow

9.4 Obtained non-dominated solutions for the hybrid workflow

9.5 Obtained non-dominated solutions for the synthetic workflow

11.1 Internet Crime Complaint Center(IC3) public value of overall statistics 2016

11.2 Pyramid of cybersecurity 2017

11.3 Expert-level-awareness of cybersecurity

11.4 Effective incident response plans

11.5 Federal government cybersecurity initiatives

11.6 Blockchain secure Internet transactions

12.1 Classification of mobile security threats

12.2 Various mobile phone-related crimes

12.3 The schematic sequence of a SMiShing attack

12.4 Types of mobile frauds

13.1 Issues of cybersecurity [4]

13.2 Cybersecurity attacks occurring in different years [8]

13.3 Malware attacks on smartphone OSes

14.1 Logical organization of distributed systems into various layers

14.2 Basic elements of information system security

14.3 Schematic showing the exchange of information in distributed systems

14.4 Types of external attacks

14.5 Types of DoS attacks

14.6 Globus security policy architecture

15.1 General architecture of healthcare monitoring systems

15.2 Categorization of attacks in healthcare system

15.3 Schematic diagram of a captured communication by an eavesdropper in fog environment

15.4 Schematic diagram of a distributed denial of service attack

15.5 Masquerade attack

16.1 Ecosystem for setting up of an Open, closed and semi-closed e-wallet respectively [2]

16.2 Research Model for the mapping of features of E-wallets with the types of e-wallets

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.220.16.184