Cyber Security in Parallel and Distributed Computing
Concepts, Techniques, Applications and Case Studies
Inbunden, Engelska, 2019
Av Dac-Nhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Jyotir Moy Chatterjee, Manju Khari
3 099 kr
Produktinformation
- Utgivningsdatum2019-03-15
- Mått10 x 10 x 10 mm
- Vikt454 g
- SpråkEngelska
- Antal sidor294
- FörlagJohn Wiley & Sons Inc
- EAN9781119488057
Du kanske också är intresserad av
Handbook of e-Business Security
João Manuel R.S. Tavares, Brojo Kishore Mishra, Raghvendra Kumar, Noor Zaman, Manju Khari, Portugal) Tavares, Joao Manuel R.S. (University of Porto, India) Khari, Manju (Ambedkar Institute of Advanced Communication Technologies and Research, João Manuel R. S. Tavares
849 kr
Smart Sensors for Industry 4.0
Brojo Kishore Mishra, Sandipan Mallik, Dac-Nhuong Le, India) Mishra, Brojo Kishore (NIST Institute of Science and Technology (Autonomous), India) Mallik, Sandipan (NIST Institute of Science and Technology (Autonomous), Vietnam) Le, Dac-Nhuong (Technology Haiphong University
2 779 kr
Handbook of e-Business Security
João Manuel R.S. Tavares, Brojo Kishore Mishra, Raghvendra Kumar, Noor Zaman, Manju Khari, Portugal) Tavares, Joao Manuel R.S. (University of Porto, India) Khari, Manju (Ambedkar Institute of Advanced Communication Technologies and Research, João Manuel R. S. Tavares
2 049 kr
Internet of Things in Biomedical Engineering
Valentina Emilia Balas, Le Hoang Son, Sudan Jha, Manju Khari, Raghvendra Kumar, Romania) Emilia Balas, Valentina, PhD (Full Professor, Department of Automatics and Applied Software, Faculty of Engineering, "Aurel Vlaicu" University of Arad, Arad, Vietnam National University) Son, Le Hoang (Vice Director of the Centre for Hgh Performance Computing, VNU University of Science, India) Jha, Sudan, PhD (Professor of Computer Engineering, KIIT University, Bhubaneswar, India) Khari, Manju (Assistant Professor<br>Department of Computer Science and Engineering<br>Ambedkar Institute of Advance Communication Technologies & Research, Govt. of NCT Delhi, India) Kumar, Raghvendra (Associate Professor, Department of Computer Science and Engineering, GIET University, Valentina E. Balas
2 209 kr
Handbook of Data Science Approaches for Biomedical Engineering
Valentina Emilia Balas, Vijender Kumar Solanki, Manju Khari, Raghvendra Kumar, Romania) Emilia Balas, Valentina, PhD (Full Professor, Department of Automatics and Applied Software, Faculty of Engineering, "Aurel Vlaicu" University of Arad, Arad, India) Solanki, Vijender Kumar (Associate Professor, Department of Computer Science and Engineering, CMR Institute of Technology, Hyderabad, TS, India) Khari, Manju (Assistant Professor<br>Department of Computer Science and Engineering<br>Ambedkar Institute of Advance Communication Technologies & Research, Govt. of NCT Delhi, India) Kumar, Raghvendra (Associate Professor, Department of Computer Science and Engineering, GIET University, Valentina Emilia Balas
1 959 kr
Handbook of Deep Learning in Biomedical Engineering
Valentina Emilia Balas, Brojo Kishore Mishra, Raghvendra Kumar, Romania) Emilia Balas, Valentina, PhD (Full Professor, Department of Automatics and Applied Software, Faculty of Engineering, "Aurel Vlaicu" University of Arad, Arad, India) Mishra, Brojo Kishore (Professor, Department of CSE, School of Engineering and Technology, GIET University, India) Kumar, Raghvendra (Associate Professor, Department of Computer Science and Engineering, GIET University, Valentina Emilia Balas
2 209 kr
Tillhör följande kategorier
Dac-Nhuong Le obtained his PhD in computer science from Vietnam National University, Vietnam in 2015. He is Deputy-Head of Faculty of Information Technology, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedicine. He has authored 4 computer science books and has multiple research articles in international journals.Raghvendra Kumar completed his PhD in the Faculty of Engineering and Technology, Jodhpur National University, India. He has authored several research papers in Scopus indexed and impact factor research journals\international conferences as well as 6 authored and 9 edited books on computer science. His areas of interest include wireless sensor network (WSN), Internet of Things, mobile application programming, ad hoc networks, cloud computing, big data, mobile computing, data mining and software engineering.Brojo Kishore Mishra is an Associate Professor at the C. V. Raman College of Engineering (Autonomous), Bhubaneswar, India. He received his PhD degree in Computer Science from the Berhampur University in 2012. He has published more than 40 research papers in peer-reviewed journals. His research interests include data mining and big data analysis, machine learning, soft computing, and evolutionary computation.Jyotir Moy Chatterjee is working as an Assistant Professor in the Department of Computer Science and Engineering at GD-RCET, Bhilai, C.G, India. He received his M.Tech from KIIT University, Bhubaneswar, Odisha and B.Tech in Computer Science & Engineering from Dr. MGR Educational & Research Institute University, Chennai, (Tamil Nadu). His research interests include cloud computing, big data, privacy preservation and data mining.Manju Khari is an Assistant Professor at the Ambedkar Institute of Advanced Communication Technology and Research, Delhi, India. She holds a PhD in Computer Science & Engineering from the National Institute of Technology Patna. She has published 60 papers in refereed national and international journals and conferences. Her research interests are in software testing, software quality, software metrics, information security and nature-inspired algorithms.
- List of Figures xvList of Tables xviiForeword xixPreface xxiAcknowledgments xxvAcronyms xxviiPart 1 Cybersecurity Concept 1 Introduction on Cybersecurity 3Ishaani Priyadarshini1.1 Introduction to Cybersecurity 51.2 Cybersecurity Objectives 61.3 Cybersecurity Infrastructure and Internet Architecture (NIST) 81.4 Cybersecurity Roles 101.5 Cybercrimes 171.5.1 Overview 171.5.2 Traditional Computer Crime and Contemporary Computer Crime 181.5.3 Combating Crimes 211.6 Security Models 231.7 Computer Forensics 251.8 Cyber Insurance 271.8.1 Digital Citizenship 291.8.2 Information Warfare and its Countermeasures 311.8.3 Network Neutrality 331.8.4 Good Practices and Policies 341.8.5 Cybersecurity and Human Rights 351.9 Future of Cybersecurity 361.10 Conclusion 36References 372 Steganography and Steganalysis 39Ho Thi Huong Thom, Nguyen Kim Anh2.1 Introduction 402.2 Steganography 412.2.1 Method for Evaluating Hidden Information Schema Security 412.2.2 Peak Signal-to-Noise Ratio 422.3 Steganalysis 422.3.1 Blind Detection Based on LSB 432.3.2 Constraint Steganalysis 452.4 Conclusion 46References 463 Security Threats and Vulnerabilities in E-business 51Satya Narayan Tripathy, Sisira Kumar Kapat, Susanta Kumar Das3.1 Introduction to e-Business 523.1.1 Benefits of e-Business 523.1.2 Business Revolution 533.2 Security Issues in e-Business 543.2.1 Vulnerabilities 543.2.2 Security Attacks 553.2.3 Malware as a Threat 553.3 Common Vulnerabilities in e-Business 553.3.1 Phishing 553.3.2 Cross-Site Scripting (XSS) 563.4 Threats in e-Business 563.4.1 Ransomware 563.4.2 Spyware 563.4.3 Worms 573.4.4 Trojan Horse 573.5 Prevention Mechanism 573.6 Conclusion 58References 584 e-Commerce Security: Threats, Issues, and Methods 61Prerna Sharma, Deepak Gupta, Ashish Khanna4.1 Introduction 624.2 Literature Review 634.3 e-Commerce 634.3.1 Characteristics of e-Commerce Technology 634.3.2 Architectural Framework of e-Commerce 644.3.3 Advantages and Disadvantages of e-Commerce 664.4 Security Overview in e-Commerce 674.4.1 Purpose of Security in e-Commerce 674.4.2 Security Element at Different Levels of e-Commerce System 674.5 Security Issues in e-Commerce 684.5.1 Client Level 684.5.2 Front-End Servers and Software Application Level 684.5.3 Network and Server Level 684.6 Security Threats in e-Commerce 694.7 Security Approaches in e-Commerce 724.8 Comparative Analysis of Various Security Threats in e-Commerce 734.9 e-Commerce Security Life-Cycle Model 734.10 Conclusion 75References 765 Cyberwar is Coming 79T. Manikandan, B. Balamurugan, C. Senthilkumar, R. Rajesh Alias Harinarayan, R. Raja Subramanian5.1 Introduction 805.2 Ransomware Attacks 825.2.1 Petya 835.2.2 WannaCry 835.2.3 Locky 845.3 Are Nations Ready? 855.4 Conclusion 88References 88Part 2 Cybersecurity in Parallel and Distributed Computing Techniques6 Introduction to Blockchain Technology 93Ishaani Priyadarshini6.1 Introduction 946.2 Need for Blockchain Security 956.3 Characteristics of Blockchain Technology 966.4 Types of Blockchains 976.5 The Architecture of Blockchain Technology 976.6 How Blockchain Technology Works 1006.7 Some Other Case Studies for Blockchain Technology 1026.8 Challenges Faced by Blockchain Technology 1036.9 The Future of Blockchain Technology 1056.10 Conclusion 106References 1067 Cyber-Security Techniques in Distributed Systems, SLAs and other Cyber Regulations 109Soumitra Ghosh, Anjana Mishra, Brojo Kishore Mishra7.1 Introduction 1107.1.1 Primary Characteristics of a Distributed System 1107.1.2 Major Challenges for Distributed Systems 1117.2 Identifying Cyber Requirements 1127.3 Popular security mechanisms in Distributed Systems 1137.3.1 Secure Communication 1137.3.2 Message Integrity and Confidentiality 1157.3.3 Access Controls 1167.4 Service Level Agreements 1187.4.1 Types of SLAs 1187.4.2 Critical Areas for SLAs 1197.5 The Cuckoo’s Egg in the Context of IT Security 1227.6 Searching and Seizing ComputerRelated Evidence 1247.6.1 Computerized Search Warrants 1247.6.2 Searching and Seizing 1257.7 Conclusion 126References 1268 Distributed Computing Security: Issues and Challenges 129Munmun Saha, Sanjaya Kumar Panda and Suvasini Panigrahi8.1 Introduction 1308.2 Security Issues and Challenges 1318.2.1 Confidentiality, Integrity and Availability 1318.2.2 Authentication and Access Control Issue 1328.2.3 Broken Authentication, Session and Access 1328.3 Security Issues and Challenges in Advanced Areas 1338.4 Conclusion 136References 1369 Organization Assignment in Federated Cloud Environments based on Multi-Target Optimization of Security 139Abhishek Kumar, Palvadi Srinivas Kumar, T.V.M. Sairam9.1 Introduction 1409.2 Background Work Related to Domain 1419.2.1 Basics on Cloud computing 1419.2.2 Clouds Which are Federated 1419.2.3 Cloud Resource Management 1419.3 Architectural-Based Cloud Security Implementation 1429.4 Expected Results of the Process 1449.5 Conclusion 146References 14610 An On-Demand and User-friendly Framework for Cloud Data Centre Networks with Performance Guarantee 149P. Srinivas Kumar, Abhishek Kumar, Pramod Singh Rathore, Jyotir Moy Chatterjee10.1 Introduction 15010.1.1 Key Research Problems in This Area 15010.1.2 Problems with Interoperability 15110.2 Difficulties from a Cloud Adoption Perspective 15110.3 Security and Privacy 15110.3.1 Resource Provisioning 15210.3.2 How Do We Define Cloud? 15310.3.3 Public vs Private Cloud-Based Services 15310.3.4 Traffic-Aware VM Migration to Load Balance Cloud Servers 15410.4 Conclusion and Future Work 157References 157Part 3 Cybersecurity Applications and Case Studies11 Cybersecurity at Organizations: A Delphi Pilot Study of Expert Opinions About Policy and Protection 163Holly Reitmeier, Jolanda Tromp, John Bottoms11.1 Introduction 16411.1.1 What is Cybercrime? 16411.1.2 What is Cybersecurity? 16511.1.3 Purpose of This Cybersecurity Pilot Study 16511.1.4 Methods of Cybersecurity Professionals 16511.2 Shocking Statistics of Cybercrime 16611.2.1 Role of the Internet Crime Complaint Center 16611.2.2 2016 Global Economic Crime Survey Report 16811.2.3 Inadequate Preparation at Organizations 16811.2.4 Organizations: Be Aware, Be Secure 16811.3 Cybersecurity Policies for Organizations 16911.3.1 Classification of Cybersecurity at an Organization 17111.3.2 Pyramid of Cybersecurity 17111.4 Blockchain Technology 17211.5 Research Methodology 17311.5.1 Quantitative and Qualitative Data Collection 17311.5.2 Design of the Study 17411.5.3 Selection of the Delphi Method 17411.5.4 Procedure of Utilization of the Delphi Method 17511.5.5 Delphi Activities (Iteration Rounds) of This Pilot Study 17511.6 Results of the Cybersecurity Delphi Study 17611.6.1 Results from Round One 17611.6.2 Results of Round Two 17811.6.3 Discussion and Limitations Based on the Results 18111.7 Conclusion 18311.7.1 The Literature in the Field 18311.7.2 Next Steps for Future Research 184References 18412 Smartphone Triggered Security Challenges - Issues, Case Studies and Prevention 187Saurabh Ranjan Srivastava, Sachin Dube, Gulshan Shrivastava, Kavita Sharma12.1 Introduction 18812.2 Classification of Mobile Security Threats 18812.2.1 Physical Threats 18912.2.2 Web-Based Threats 18912.2.3 Application-Based Threats 18912.2.4 Network-Based Threats 19012.2.5 Data Transfer-Based Threats 19112.2.6 Improper Session Management-Based Threats 19112.2.7 Bluetooth-Based Threats 19112.2.8 Application Platform-Based Threats 19212.3 Smartphones as a Tool of Crime 19212.4 Types of Mobile Phone-Related Crimes 19312.5 Types of Mobile Fraud 19612.6 Case Studies 19812.6.1 Mobile Identity Theft 19812.6.2 Data Theft by Applications 20012.6.3 SIM Card Fraud 20012.7 Preventive Measures and Precautions 20112.7.1 Against Physical Loss and Theft of the Mobile Device 20112.7.2 Against SMiShing Attacks 20212.7.3 Against App-Based Attacks 20312.7.4 Against Identity Theft and SIM Card Fraud 20312.8 Conclusion 204References 20513 Cybersecurity: A Practical Strategy Against Cyber Threats, Risks with Real World Usages 207Anjana Mishra, Soumitra Ghosh, Brojo Kishore Mishra13.1 Introduction 20813.2 Cyberwar 20913.3 Arms Control in Cyberwar 21013.4 Internet Security Alliance 21113.5 Cybersecurity Information Sharing Act 21213.6 Market for Malware 21413.7 Mobile Cybersecurity 21513.8 Healthcare 21613.9 Human Rights 21713.10 Cybersecurity Application in Our Life 21813.11 Conclusion 219References 21914 Security in Distributed Operating System: A Comprehensive Study 221Sushree Bibhuprada B. Priyadarshini, Amiya Bhusan Bagjadab, Brojo Kishore Mishra14.1 Introduction to Security and Distributed Systems 22214.2 Relevant Terminology 22514.3 Types of External Attacks 22514.4 Globus Security Architecture 22814.5 Distribution of Security Mechanism 22914.6 Conclusions 230References 23015 Security in Healthcare Applications based on Fog and Cloud Computing 231Rojalina Priyadarshini, Mohit Ranjan Panda, Brojo Kishore Mishra15.1 Introduction 23215.2 Security Needs of Healthcare Sector 23315.2.1 Data Integrity 23315.2.2 Data Confidentiality 23315.2.3 Authentication and Authorization 23315.2.4 Availability 23415.2.5 Access Control 23415.2.6 Dependability 23415.2.7 Flexibility 23415.3 Solutions to Probable Attacks in e-Healthcare 23415.3.1 Jamming Attack 23515.3.2 Data Collision Attack 23515.3.3 Desynchronization Attack 23515.3.4 Spoofing Attack 23615.3.5 Man-in-the-Middle Attack 23615.3.6 Denial-of-Service (DoS) Attack 23715.3.7 Insider Attack 23815.3.8 Masquerade Attack 23815.3.9 Attacks on Virtual Machine and Hypervisor 23915.4 Emerging Threats in Cloud- and Fog-Based Healthcare System 24015.4.1 Software Supply Chain Attacks 24015.4.2 Ransomware Attacks 24015.4.3 Crypto-Mining and Crypto-Jacking Malware 24015.5 Conclusion 241References 24116 Mapping of e-Wallets with Features 245Alisha Sikri, Surjeet Dalal, N.P Singh, Dac-Nhuong Le16.1 Introduction 24616.1.1 e-Wallet 24616.1.2 Objectives 24716.2 Review of Literature 25016.3 Market Share of e-Wallet 25116.3.1 Technical Features 25216.3.2 Legal Features 25216.3.3 Operational Features 25316.3.4 Security Features 25316.4 Research Methodology 25316.5 Result Analysis 25516.6 Conclusions and future work 256References 256