Securing the Digital Frontier
eBook - ePub

Securing the Digital Frontier

Advanced frameworks for social media and IoT threats (English Edition)

  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

Securing the Digital Frontier

Advanced frameworks for social media and IoT threats (English Edition)

About this book

Description
The explosive growth of interconnected devices and digital platforms has led to cybersecurity becoming a cornerstone of modern technological infrastructure. In an era of AI-driven misinformation and smart IoT vulnerabilities, innovative defense mechanisms are more critical than ever.

This book offers a structured and insightful journey through the evolving landscape of cybersecurity, focusing on the pressing challenges posed by social media and IoT ecosystems. Readers explore ML frameworks designed to detect fake news and distorted social media campaigns, followed by methods to identify fake Instagram profiles and prevent impersonation. The discussion advances into technical territory with a threat surface analysis of smart IoT cameras, offering metrics to address their unique vulnerabilities. The book concludes by introducing a novel cryptographic hash function and a comparative analysis of IoT communication protocols.

By the end of this book, readers will be well-equipped with the knowledge and practical skills needed to identify, analyze, and mitigate cybersecurity threats across social media and IoT ecosystems. They will gain hands-on expertise in machine learning-based threat detection, firmware analysis, protocol evaluation, and advanced cryptographic techniques, empowering them to build and maintain more secure digital environments.

What you will learn
? Understand the core principles of digital security and vulnerabilities in IoT infrastructures.
? Learn to detect fake news, manipulative campaigns, and social media misinformation tactics.
? Perform threat surface analysis of IoT camera systems.
? Learn behavior-based detection of advanced persistent threats.
? Implement an intrusion detection and prevention system.
? Apply taint analysis to detect firmware-level vulnerabilities.
? Introduce unique frameworks to enhance data integrity and resistance to hash-based attacks.
? Evaluate protocols like MQTT and CoAP using anomaly detection.

Who this book is for
This book is designed for advanced cybersecurity professionals, IoT developers, academic researchers, graduate students, and policymakers. It is ideal for those looking to deepen their understanding of emerging cyber threats and learn practical, research-backed methods to secure digital and IoT ecosystems.

Table of Contents
1. Foundations of Securing Digital Ecosystems
2. Fake Social Media News Detection Framework
3. Machine Learning-based Framework Detecting Fake Instagram Profiles
4. Unmasking Smart Device Vulnerabilities
5. Proactive Threat Hunts to Detect Persistence
6. Fortifying Smart Home Internet of Things Security
7. Framework for IoT Security in Smart Cities
8. Security Assessment of IoT Firmware
9. Polynomial-based Secure Hash Design
10. Comparing Internet of Things Communication Protocols

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Securing the Digital Frontier by Akashdeep Bhardwaj in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Science General. We have over one million books available in our catalogue for you to explore.

Table of contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Dedication Page
  5. About the Author
  6. About the Reviewers
  7. Acknowledgement
  8. Preface
  9. Table of Contents
  10. 1. Foundations of Securing Digital Ecosystems
  11. 2. Fake Social Media News Detection Framework
  12. 3. Machine Learning-based Framework Detecting Fake Instagram Profiles
  13. 4. Unmasking Smart Device Vulnerabilities
  14. 5. Proactive Threat Hunts to Detect Persistence
  15. 6. Fortifying Smart Home Internet of Things Security
  16. 7. Framework for IoT Security in Smart Cities
  17. 8. Security Assessment of IoT Firmware
  18. 9. Polynomial-based Secure Hash Design
  19. 10. Comparing Internet of Things Communication Protocols
  20. Index