Cyber-Vigilance and Digital Trust

Book description

Cyber threats are ever increasing. Adversaries are getting more sophisticated and cyber criminals are infiltrating companies in a variety of sectors. In today’s landscape, organizations need to acquire and develop effective security tools and mechanisms – not only to keep up with cyber criminals, but also to stay one step ahead.

Cyber-Vigilance and Digital Trust develops cyber security disciplines that serve this double objective, dealing with cyber security threats in a unique way. Specifically, the book reviews recent advances in cyber threat intelligence, trust management and risk analysis, and gives a formal and technical approach based on a data tainting mechanism to avoid data leakage in Android systems

Table of contents

  1. Cover
  2. Introduction
  3. 1 What is Cyber Threat Intelligence and How is it Evolving?
    1. 1.1. Introduction
    2. 1.2. Background
    3. 1.3. Cyber threat intelligence
    4. 1.4. Related work
    5. 1.5. Technical threat intelligence sharing problems
    6. 1.6. Technical threat intelligence limitations
    7. 1.7. Cyber threat intelligent libraries or platforms
    8. 1.8. Discussion
    9. 1.9. Evaluation of technical threat intelligence tools
    10. 1.10. Conclusion and future work
    11. 1.11. References
  4. 2 Trust Management Systems: a Retrospective Study on Digital Trust
    1. 2.1. Introduction
    2. 2.2. What is trust?
    3. 2.3. Genesis of trust management systems
    4. 2.4. Trust management
    5. 2.5. Classification of trust management systems
    6. 2.6. Trust management in cloud infrastructures
    7. 2.7. Conclusion
    8. 2.8. References
  5. 3 Risk Analysis Linked to Network Attacks
    1. 3.1. Introduction
    2. 3.2. Risk theory
    3. 3.3. Analysis of IS risk in the context of IT networks
    4. 3.4. Conclusion
    5. 3.5. References
  6. 4 Analytical Overview on Secure Information Flow in Android Systems: Protecting Private Data Used by Smartphone Applications
    1. 4.1. Introduction
    2. 4.2. Information flow
    3. 4.3. Data tainting
    4. 4.4. Protecting private data in Android systems
    5. 4.5. Detecting control flow
    6. 4.6. Handling explicit and control flows in Java and native Android appsʼ code
    7. 4.7. Protection against code obfuscation attacks based on control dependencies in Android systems
    8. 4.8. Detection of side channel attacks based on data tainting in Android systems
    9. 4.9. Tracking information flow in Android systems approaches comparison: summary
    10. 4.10. Conclusion and highlights
    11. 4.11. References
  7. List of Authors
  8. Index
  9. End User License Agreement

Product information

  • Title: Cyber-Vigilance and Digital Trust
  • Author(s): Wiem Tounsi
  • Release date: July 2019
  • Publisher(s): Wiley-ISTE
  • ISBN: 9781786304483