Book description
Cyber threats are ever increasing. Adversaries are getting more sophisticated and cyber criminals are infiltrating companies in a variety of sectors. In today’s landscape, organizations need to acquire and develop effective security tools and mechanisms – not only to keep up with cyber criminals, but also to stay one step ahead.Cyber-Vigilance and Digital Trust develops cyber security disciplines that serve this double objective, dealing with cyber security threats in a unique way. Specifically, the book reviews recent advances in cyber threat intelligence, trust management and risk analysis, and gives a formal and technical approach based on a data tainting mechanism to avoid data leakage in Android systems
Table of contents
- Cover
- Introduction
-
1 What is Cyber Threat Intelligence and How is it Evolving?
- 1.1. Introduction
- 1.2. Background
- 1.3. Cyber threat intelligence
- 1.4. Related work
- 1.5. Technical threat intelligence sharing problems
- 1.6. Technical threat intelligence limitations
- 1.7. Cyber threat intelligent libraries or platforms
- 1.8. Discussion
- 1.9. Evaluation of technical threat intelligence tools
- 1.10. Conclusion and future work
- 1.11. References
- 2 Trust Management Systems: a Retrospective Study on Digital Trust
- 3 Risk Analysis Linked to Network Attacks
-
4 Analytical Overview on Secure Information Flow in Android Systems: Protecting Private Data Used by Smartphone Applications
- 4.1. Introduction
- 4.2. Information flow
- 4.3. Data tainting
- 4.4. Protecting private data in Android systems
- 4.5. Detecting control flow
- 4.6. Handling explicit and control flows in Java and native Android appsʼ code
- 4.7. Protection against code obfuscation attacks based on control dependencies in Android systems
- 4.8. Detection of side channel attacks based on data tainting in Android systems
- 4.9. Tracking information flow in Android systems approaches comparison: summary
- 4.10. Conclusion and highlights
- 4.11. References
- List of Authors
- Index
- End User License Agreement
Product information
- Title: Cyber-Vigilance and Digital Trust
- Author(s):
- Release date: July 2019
- Publisher(s): Wiley-ISTE
- ISBN: 9781786304483
You might also like
book
ISO27001 in a Windows® Environment: The best practice handbook for a Microsoft® Windows® environment, Second Edition
Covering best practice implementation over a wide range of Windows® environments, this second edition is completely …
book
Do More Faster India, 2nd Edition
Do you dream of taking your Indian startup to new heights? Turn that dream into a …
book
Case Studies in Not-for-Profit Accounting and Auditing
Gain hands-on experience with case studies designed to simulate real-world scenarios and common problems in today's …
book
People-Centric Security: Transforming Your Enterprise Security Culture
A culture hacking how to complete with strategies, techniques, and resources for securing the most volatile …