Skip to Content
Emerging Threats and Countermeasures in Cybersecurity
book

Emerging Threats and Countermeasures in Cybersecurity

by Gulshan Shrivastava, Rudra Pratap Ojha, Shashank Awasthi, Kavita Sharma, Himani Bansal
December 2024
Beginner to intermediate content levelBeginner to intermediate
544 pages
18h 5m
English
Wiley-Scrivener
Content preview from Emerging Threats and Countermeasures in Cybersecurity

Index

  • Access controls, 148, 246
  • Accountability, 246, 441–443
  • Adaptive exams, 332
  • Adaptive synthetic sampling (ADASYN), 64
  • AHP algorithm, 231
  • AI and data privacy, 449–453
  • Alerts, 250
  • Algorithmic biases, 433–434
  • Amplification attack, 182
  • AMRQP, 224
  • Analysis techniques, 94–99
  • Anisotropic growth, 209
  • Anomaly detection, 247
  • Antivirus software, 244
  • Applications of cyber-physical system, 140
  • APT (advanced persistent threat), 39
  • Articular cartilage, 201–202
  • Artificial intelligence, 247, 343, 433–434, 485
  • Attacker, 354–355
  • Audio cloning, 473
  • Audit trails, 254
  • Augmented reality, 343
  • Authenticating learners, 331
  • Authentication, 221, 223, 224, 226
  • Authentication mechanisms, 148
  • Automation, 270, 271, 274, 292
  • Autonomous vehicles, 154
  • Bagging, 64, 75
  • Behavior analysis, 250
  • Behavioral patterns, 255
  • Behavior-based access control (BBAC), 258
  • Best practices for cloud security, 427–428
    • adaptation to threats, 429–430
    • data security, 428–429
    • human element in security, 430
    • identity and access management (IAM), 429
    • network security, 429
    • vendor lock-in mitigation, 430
    • Biometrics, 449–450
    • Blacklisting, 250
    • Blockchain, 156
    • Blockchain technology, 294, 325
    • Bluetooth, 221
    • Boosting, 64, 75
    • Boruta, 64
  • Carbon black (VMware Carbon Black), 252
  • Cardiac grafts, 208–209
  • Cardiomyocytes, 208–210, 218
  • Challenges of digital forensics, 489
  • Characteristics, 130
  • Chondrocytes, 201–203
  • CIC-DDoS2019, 73
  • Class imbalance problems, 62
  • Classification, 251
  • Classifier training, 258
  • Cloud apps, 251
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cybersecurity – Attack and Defense Strategies - Second Edition

Cybersecurity – Attack and Defense Strategies - Second Edition

Yuri Diogenes, Dr. Erdal Ozkaya

Publisher Resources

ISBN: 9781394230570Purchase Link