Skip to Main Content
Cyber Security in Parallel and Distributed Computing
book

Cyber Security in Parallel and Distributed Computing

by Dac-Nhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Jyotir Moy Chatterjee, Manju Khari
April 2019
Intermediate to advanced content levelIntermediate to advanced
294 pages
9h 31m
English
Wiley-Scrivener
Content preview from Cyber Security in Parallel and Distributed Computing

Preface

The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field. Also included are various real-time/offline applications and case studies in the fields of engineering and computer science and the modern tools and technologies used. Information concerning various topics relating to cybersecurity technologies is organized within the sixteen chapters of this book.

Chapter 1 discusses the difference between traditional and contemporary computer crimes observed over the last few years. The general evolution of cybercrimes has led to internet-based risks affecting businesses, organizations, etc., exposing them to potential liability. The recent concept of cyber insurance, which promises coverage when organizations suffer as a result of internet-based risk, is discussed in this chapter. Later on in the chapter, readers will become familiarized with security policies and various security models, such as the Bell-LaPadula and Biba models, that enforce them. Furthermore, readers will also become acquainted with the concepts of network neutrality and human rights, as they go hand in hand. With the risks and aftereffects of cybercrimes in mind, we also explore the legal aspect of cybercrimes by analyzing the concept of computer forensics. Some best practices pertaining to countermeasures to information warfare are also discussed.

Chapter 2 presents an overview of the research and ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Peter Thermos, Ari Takanen

Publisher Resources

ISBN: 9781119488057Purchase book