Cybersecurity and Privacy - Bridging the Gap ( River Publishers Series in Communications )

Publication series :River Publishers Series in Communications

Author: Khajuria Samant; Sørensen Lene ; Skouby Knud Erik  

Publisher: River Publishers‎

Publication year: 2017

E-ISBN: 9788793519657

P-ISBN(Paperback): 9788793519664

Subject: TP309.2 Data Security

Keyword: 计算机网络

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

The huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is increasingly on the agenda both at company and at individual level. Cybersecurity and Privacy - bridging the gap addresses two very complex fields of the digital world, i.e., Cybersecurity and Privacy. These multifaceted, multidisciplinary and complex issues are usually understood and valued differently by different individuals, data holders and legal bodies. But a change in one field immediately affects the others. Policies, frameworks, strategies, laws, tools, techniques, and technologies - all of these are tightly interwoven when it comes to security and privacy. This book is another attempt to bridge the gap between the industry and academia. The book addresses the views from academia and industry on the subject. Technical topics discussed in the book include: Cybersecurity Encryption Privacy policy Trust Security and Internet of Things Botnets Data risks Cloudbased Services Visualization

Chapter

1.6.3 Cipher Use and Initialisation

1.6.4 Indistinguishability and Resistance to Malleability

1.6.5 Authentication of Ciphertexts

1.6.6 Padding Attacks

1.7 Discussion

1.8 Conclusions

References

Chapter 2 - “Take It or Leave It”: Effective Visualization of Privacy Policies

2.1 Introduction

2.2 Related Work

2.2.1 Survey and Machine Learning-based Methodologies

2.2.2 Privacy Enhancing Tools

2.3 Privacy Policy Elucidator Tool (PPET)

2.3.1 Privacy Categories Definition (Core Contents of a Privacy Policy)

2.3.2 General Description of the Tool

2.3.3 Corpus Design

2.3.4 Preprocessing

2.3.5 Privacy Policy Detector

2.3.6 Database Description

2.4 PPET Architecture and Modelling

2.4.1 Classification

2.4.2 Summarization and Ranking

2.5 Results

2.6 Recommendations

2.7 Conclusion and FutureWork

References

Chapter 3 - A Secure Channel Using Social Messaging for Distributed Low-Entropy Steganography

3.1 Introduction

3.1.1 Outline of Proposed Method

3.1.2 Research Contributions

3.1.3 Chapter Organisation

3.2 Previous Work

3.2.1 UP Anonymity

3.2.2 UGC Confidentiality

3.2.3 Distributed High-Entropy Steganography Approach

3.3 Proposed Architecture

3.4 Implementation

3.5 Conclusion

References

Chapter 4 - Computational Trust

4.1 Introduction

4.2 Trust

4.3 Security and Trust

4.4 Trust Models

4.4.1 Fuzzy Trust Model Description

4.4.2 Reputation Evaluation

4.4.3 Eigen Trust Algorithm

4.4.4 Notion of Trust

4.5 Example: PGP Web of Trust

4.6 Example: X.509 Certificates

4.7 Summary

References

Chapter 5 - Security in Internet of Things

5.1 Introduction

5.2 Examples of Problematic IoT Devices

5.2.1 IP Camera

5.2.2 Internet Gateways

5.2.3 Smart Energy Meters

5.2.4 Automotive IoT

5.2.5 IoT and Health

5.2.6 The Smart Home and Appliances

5.3 Security Challenges in IoT

5.4 Security Recommendations

5.5 Conclusion

References

Chapter 6 - Security in the Industrial Internet of Things

6.1 Introduction

6.2 Background

6.3 Introducing Penetration Testing

6.4 Methods

6.5 Tools

6.6 Findings

6.7 Results

6.8 Recommendations

6.9 Conclusion

References

Chapter 7 - Modern & Resilient Cybersecurity The Need for Principles, Collaboration, Innovation, Education & the Occasional Application of Power

7.1 Introduction

7.2 Trends

7.2.1 Trends in Summary

7.3 Protect, Detect & Respond

7.3.1 Protect

7.3.2 Detect

7.3.3 Respond

7.4 Beyond Protect, Detect and Respond

7.4.1 Cyber-Offense

7.4.2 Deterrence & Disruption

7.4.2.1 Resilience

7.4.3 Importance of Culture to a Resilient Cybersecurity Strategy

7.5 Global Security Intelligence Graph

7.5.1 The Use of Big Data

7.6 Emerging Innovative Technologies

7.6.1 Cloud Computing

7.6.2 Internet of Things

7.6.3 Artificial Intelligence

7.7 Partnerships

7.8 Conclusion

Chapter 8 - Building Secure Data Centers for Cloud Based Services – A Case Study

8.1 The Emergence of a New Industrial Era

8.2 Cloud Based Services and Data Centers

8.3 Types of Data Centers

8.4 Security Considerations

8.5 Case:Teracom A/S

8.6 Future Perspectives

References

Chapter 9 -Pervasive Governance – Understand and SecureYour Transaction Data & Content

9.1 Introduction

9.2 The Challenges and Risks of Unmanaged Data & Content

9.2.1 The Fragmented Approach

9.2.2 The Classic Records Management Approach

9.2.3 Keeping Legacy Systems Alive – Just In Case

9.2.4 The Ideal Scenario

9.2.4.1 Enterprise content management

9.2.4.2 Core retention capability

9.2.4.3 Formal records management capability

9.2.4.4 Archiving & decommissioning – privacy by design

9.3 The Need for a Pervasive Governance Strategy

9.4 UnderstandingYour Unstructured Content

9.4.1 Automated Intelligence

9.4.2 Content Classification

9.4.3 Actionable Intelligence through Reporting

9.4.4 Automating Policy

9.5 An Application Decommissioning Program

9.5.1 The Decommissioning Factory

9.5.2 Developing a Roadmap

9.5.3 Phase 1: Program Governance

9.5.4 Phase 2: Application Decommissioning Factory Bootstrap

9.5.4.1 Train IT staff

9.5.4.2 Coordinate with other business services

9.5.4.3 Automate technology selection

9.5.4.4 Use proof of concept to reduce risk

9.5.5 Phase 3: Application Decommissioning Projects

9.5.5.1 Business and data analysis

9.5.5.2 Design and build

9.6 Conclusion – Solving the Challenges of Unmanaged Data & Content

References

Chapter 10 - Challenges of Cyber Security and a Fundamental Way to Address Cyber Security

10.1 Introduction

10.2 Security by Design

10.2.1 Functional Design over Security Design

10.2.2 Proliferation of Internet

10.2.3 Being a Big Target

10.2.4 Quick to Market

10.2.5 Design Aspect

10.3 Cyber Security Paradigm Shift

10.3.1 Security Assurance

10.3.2 Security Assurance Challenges

10.3.3 Market Place Challenges

10.3.4 Regulatory Challenges

10.3.5 Requirements of Security Assurance

10.4 Security Assurance Process

10.4.1 Goals of Security Assurance

10.4.2 Challenges of Security Assurance

10.4.3 3GPP Security Assurance

10.4.4 3GPP Security Assurance Approach

10.4.5 Security Assurance around the Globe

10.5 Conclusion

References

Index

About the Editors

Back Cover

The users who browse this book also browse


No browse record.