Book description
This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, Blockchain, Machine Learning, Data Science, and AI. This book brings together in one resource Information security across multiple domains.
Table of contents
- Cover
- Half Title
- Series Page
- Title Page
- Copyright Page
- Contents
- Preface
- Editor Biographies
- Contributors
- 1 SC-MCHMP: Score-Based Cluster Level Hybrid Multi-Channel MAC Protocol for Wireless Sensor Network
- 2 Software-Defined Networking (SDN) Security Concerns
- 3 Clustering in Wireless Sensor Networks Using Adaptive Neuro-Fuzzy Inference Logic
-
4 Security in Big Data
-
4.1 Big Data
- 4.1.1 Volume – The Size of Data
- 4.1.2 Variety – Different Forms of Data
- 4.1.3 Velocity – Speed of Data Generation
- 4.1.4 Value – Data's Worth
- 4.1.5 Veracity – Data Uncertainty
- 4.1.6 Variability – Data Inconsistency
- 4.1.7 Visualization – Data Representation
- 4.1.8 Volatility – How Long to Store Data
- 4.1.9 Validity – Data Use
- 4.2 Data Sources of Big Data
- 4.3 Architecture
- 4.4 Big Data Challenges
- 4.5 Big Data Analytics Challenges in Big Data
- 4.6 Technical Challenges in Big Data
- 4.7 Characteristics-Oriented Challenges of Big Data
- 4.8 Privacy Challenges
- 4.9 Security Challenges
- 4.10 Current Security Challenges in Big Data
- 4.11 Major Security Issues of Big Data
- 4.12 Solutions to Security Challenges
- 4.13 Conclusion
- References
-
4.1 Big Data
-
5 Prevention of DOS/DDOS Attacks Through Expert Honey-Mesh Security Infrastructure
- 5.1 Introduction
-
5.2 Working of DDOS Attacks
- 5.2.1 Using a Botnet “Botnet” to Launch a DDOS Attack
- 5.2.2 Prevention Measures of DDOS Attacks
- 5.2.3 Never Overestimate the Defenses of the Network
- 5.2.4 Create a Reference Model to Better Identify Active Attacks
- 5.2.5 Apply the Latest Patches of Suppliers
- 5.2.6 Secure the IoT Devices
- 5.2.7 Deploy a Solution for the Mitigation of DDOS Attacks Dedicated
- 5.2.8 Reduce the Attack Surface
- 5.2.9 Plan the Scaling
- 5.2.10 Implement Firewalls for Sophisticated Application Attacks
- 5.3 Methodology
- 5.4 Proposed System
- 5.5 Experimental Result
- 5.6 Conclusion
- References
- 6 Efficient Feature Grouping for IDS Using Clustering Algorithms in Detecting Known/Unknown Attacks
-
7 PDF Malware Classifiers – A Survey, Future Directions, and Recommended Methodology
- 7.1 Introduction
- 7.2 X-Ray of PDF File
- 7.3 Reading of PDF Files
- 7.4 Steps Involved in Classifying PDF Files
- 7.5 Modes of Classification
- 7.6 Static Classification of PDF Files
- 7.7 Static Classification Systems
- 7.8 Comparison Between the Different Static Classifiers
- 7.9 Dynamic Classification of PDF Files
- 7.10 Dynamic Classification Systems
- 7.11 Comparison Between Different Dynamic Classifiers
- 7.12 Novel Methodologies
- 7.13 Conclusions and Future Directions
- References
-
8 Key Authentication Schemes for Medical Cyber Physical System
- 8.1 Introduction
- 8.2 Security Objectives for Medical CPS
-
8.3 Security Challenges for Medical CPS
- 8.3.1 Resource Constraint (Gupta et al., 2019)
- 8.3.2 Denial of Service Attack (Alguliyev et al., 2018)
- 8.3.3 Impersonation Attack (Xu et al., 2019a,b)
- 8.3.4 Replay Attack (Kompara et al., 2019)
- 8.3.5 Eavesdropping Attack (Shen et al., 2018)
- 8.3.6 Compromised Nodes and Clone Attack (Xu et al., 2019a,b)
- 8.3.7 Anonymous and Unlinkable Sessions (Kompara et al., 2019)
- 8.3.8 Desynchronization/Jamming Attack (Liu & Chung, 2017)
- 8.4 Types of Key Authentication Schemes for Medical CPS
- 8.5 Conclusion and Future Research Direction
- References
- 9 Ransomware Attack: Threats & Different Detection Technique
-
10 Security Management System (SMS)
- 10.1 Introduction
- 10.2 Application of Information Security in Corporations
- 10.3 Information Security Incidents [11]
- 10.4 Common Attacks on CIA Triad [12]
- 10.5 Information Security Management
- 10.6 Security Management System
- 10.7 Basis of Security Management System
- 10.8 Some Other Essentials for SMS
- 10.9 Steps Involved in the Infrastructures of the SMS
- 10.10 System Development and Maintenance
- 10.11 Business Continuity Management
- 10.12 Security Management System Components
- 10.13 Security Management System Domains
- 10.14 Security Controls [35]
- 10.15 Certification
- 10.16 SMS (ISO/IEC 27001) Audits [23]
- 10.17 Security Management System Challenges
- 10.18 Conclusion
- References
- 11 Automatic Street Light Control Based on Pedestrian and Automobile Detection
- 12 Cost-Oriented Electronic Voting System Using Hashing Function with Digital Persona
- 13 Blockchain-Based Supply Chain System Using Intelligent Chatbot with IoT-RFID
- Index
Product information
- Title: Information Security Handbook
- Author(s):
- Release date: February 2022
- Publisher(s): CRC Press
- ISBN: 9781000540567
You might also like
book
Information Security Handbook
Implement information security effectively as per your organization's needs. About This Book Learn to build your …
book
Information Security Handbook - Second Edition
A practical guide to establishing a risk-based, business-focused information security program to ensure organizational success Key …
book
Defensive Security Handbook
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have …
book
Computer and Information Security Handbook, 3rd Edition
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer …