Cyber Security in Parallel and Distributed Computing
eBook - ePub

Cyber Security in Parallel and Distributed Computing

Concepts, Techniques, Applications and Case Studies

Dac-Nhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Jyotir Moy Chatterjee, Manju Khari, Dac-Nhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Jyotir Moy Chatterjee, Manju Khari

Condividi libro
  1. English
  2. ePUB (disponibile sull'app)
  3. Disponibile su iOS e Android
eBook - ePub

Cyber Security in Parallel and Distributed Computing

Concepts, Techniques, Applications and Case Studies

Dac-Nhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Jyotir Moy Chatterjee, Manju Khari, Dac-Nhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Jyotir Moy Chatterjee, Manju Khari

Dettagli del libro
Anteprima del libro
Indice dei contenuti
Citazioni

Informazioni sul libro

The book contains several new concepts, techniques, applications and case studies for cyber securities in parallel and distributed computing

The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field. Also included are various real-time/offline applications and case studies in the fields of engineering and computer science and the modern tools and technologies used. Information concerning various topics relating to cybersecurity technologies is organized within the sixteen chapters of this book.

Some of the important topics covered include:

  • Research and solutions for the problem of hidden image detection
  • Security aspects of data mining and possible solution techniques
  • A comparative analysis of various methods used in e-commerce security and how to perform secure payment transactions in an efficient manner
  • Blockchain technology and how it is crucial to the security industry
  • Security for the Internet of Things
  • Security issues and challenges in distributed computing security such as heterogeneous computing, cloud computing, fog computing, etc.
  • Demonstrates the administration task issue in unified cloud situations as a multi-target enhancement issue in light of security
  • Explores the concepts of cybercrime and cybersecurity and presents the statistical impact it is having on organizations
  • Security policies and mechanisms, various categories of attacks (e.g., denial-of-service), global security architecture, along with distribution of security mechanisms
  • Security issues in the healthcare sector with existing solutions and emerging threats.

Domande frequenti

Come faccio ad annullare l'abbonamento?
È semplicissimo: basta accedere alla sezione Account nelle Impostazioni e cliccare su "Annulla abbonamento". Dopo la cancellazione, l'abbonamento rimarrà attivo per il periodo rimanente già pagato. Per maggiori informazioni, clicca qui
È possibile scaricare libri? Se sì, come?
Al momento è possibile scaricare tramite l'app tutti i nostri libri ePub mobile-friendly. Anche la maggior parte dei nostri PDF è scaricabile e stiamo lavorando per rendere disponibile quanto prima il download di tutti gli altri file. Per maggiori informazioni, clicca qui
Che differenza c'è tra i piani?
Entrambi i piani ti danno accesso illimitato alla libreria e a tutte le funzionalità di Perlego. Le uniche differenze sono il prezzo e il periodo di abbonamento: con il piano annuale risparmierai circa il 30% rispetto a 12 rate con quello mensile.
Cos'è Perlego?
Perlego è un servizio di abbonamento a testi accademici, che ti permette di accedere a un'intera libreria online a un prezzo inferiore rispetto a quello che pagheresti per acquistare un singolo libro al mese. Con oltre 1 milione di testi suddivisi in più di 1.000 categorie, troverai sicuramente ciò che fa per te! Per maggiori informazioni, clicca qui.
Perlego supporta la sintesi vocale?
Cerca l'icona Sintesi vocale nel prossimo libro che leggerai per verificare se è possibile riprodurre l'audio. Questo strumento permette di leggere il testo a voce alta, evidenziandolo man mano che la lettura procede. Puoi aumentare o diminuire la velocità della sintesi vocale, oppure sospendere la riproduzione. Per maggiori informazioni, clicca qui.
Cyber Security in Parallel and Distributed Computing è disponibile online in formato PDF/ePub?
Sì, puoi accedere a Cyber Security in Parallel and Distributed Computing di Dac-Nhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Jyotir Moy Chatterjee, Manju Khari, Dac-Nhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Jyotir Moy Chatterjee, Manju Khari in formato PDF e/o ePub, così come ad altri libri molto apprezzati nelle sezioni relative a Informatica e Elaborazione di dati sui server dei clienti. Scopri oltre 1 milione di libri disponibili nel nostro catalogo.

Informazioni

Anno
2019
ISBN
9781119488316

PART I
Cybersecurity Concept

Chapter 1
Introduction on Cybersecurity

Ishaani Priyadarshini
University of Delaware, Newark, Delaware, USA

Abstract

In a world ruled by speed and perfection, technology relies primarily on computer science. Be it a simple act of sending an email or a critical act of conveying billions of dollars, almost everything is merely a click away. The world of computer science keeps people engaged in activities like gaming, website surfing, social media, banking, digital citizenship, etc., with a grip spanning many domains such as hardware, software, network, data, etc. Because so many activities rely on computers, they attract criminals, which ultimately leads to cybercrime, which could be as elementary as basic hacking or as elaborate as ransomware attacks or financial cybercrimes. The consequences may vary from loss of personal or sensitive information to loss of massive amounts of money. Thus, the need to ensure cybersecurity is paramount. In this chapter, we will take a look at the concept of cybersecurity, its causes, consequences and principles. The idea of cybersecurity is not only limited to small firms and educational institutions, but also spreads across various industries and governments, making it one of the most significant areas of study. In the past, certain objectives have been proposed to safeguard such critical cyber infrastructures. Certain standards, guidelines and practices have found their place in cybersecurity frameworks to ensure that the cyber infrastructure and architecture is secure. Since the operations are multiple as well as insightful, they must be carried out by accountable personnel, such as the security administrator or incident response team, who are usually given roles in the cyber infrastructure depending on the nature of their work. Some of the anticipated roles of accountable personnel are defined in this chapter. The nature of cybercrimes over the last few years has changed drastically owing to the change in motives behind the crimes, tools and techniques involved and the overall consequences. We have observed the contrast between traditional and contemporary computer crimes over the last few years. The general evolution of cybercrimes has led to internet-based risks affecting businesses, organizations, etc,. which are potential liabilities that are harmful to property. The concept of cyber insurance is recent and promises coverage when organizations suffer internet based risks, which we have essayed in this chapter. In the later part of the chapter we will familiarize ourselves with the concept of security policies and various security models that enforce them. Few security models like the Bell La Padula and the Biba model will be discussed in this section. Further, we will acquaint ourselves with the concept of network neutrality and human rights as they go hand in hand. Keeping in mind the risks and after effects of cybercrimes, we will also explore the the legal aspect of cybercrimes by analyzing the concept of computer forensics. Some best practices pertaining to countermeasures for information warfare have also been discussed.
In a world ruled by speed and perfection, technology relies primarily on computer science. Be it a simple act of sending an email or a critical act of conveying billions of dollars, almost everything is merely a click away. The world of computer science keeps people engaged in activities like gaming, website surfing, social media, banking, digital citizenship, etc., with a grip spanning many domains such as hardware, software, network, data, etc. Because so many activities rely on computers, they attract criminals, which ultimately leads to cybercrime, which could be as elementary as basic hacking or as elaborate as ransomware attacks or financial cybercrimes. The consequences may vary from loss of personal or sensitive information to loss of massive amounts of money. Thus, the need to ensure cybersecurity is paramount. In this chapter, we will take a look at the concept of cybersecurity, its causes, consequences and principles. The idea of cybersecurity is not only limited to small firms and educational institutions, but also spreads across various industries and governments, making it one of the most significant areas of study. In the past, certain objectives have been proposed to safeguard such critical cyber infrastructures. Certain standards, guidelines and practices have found their place in cybersecurity frameworks to ensure that the cyber infrastructure and architecture is secure. Since the operations are multiple as well as insightful, they must be carried out by accountable personnel who are usually given roles in the cyber infrastructure depending on their nature of their work such as the security administrator or the incident response team. We will look forward to some of the roles in this chapter. The nature of cybercrimes over the last few years has changed drastically owing to the change in motive behind the crimes, tools and techniques involved and the overall consequences. We observe the contrast between traditional computer crimes and contemporary computer crimes over the last few years. General evolution of cybercrimes has led to internet based risks affecting businesses, organizations etc. which have the potential to harm liability and properties. Therefore, cyber insurance is discussed in this chapter, which is a recent concept that promises coverage when organizations suffer internet-based risks. Later on in the chapter, security policies and various security models that enforce them are explained. A few security models, such as the Bell-LaPadula and Biba models, will be discussed in this section. Furthermore, the reader will become acquainted with the concepts of network neutrality and human rights, as they go hand in hand. Keeping in mind the risks and aftereffects of cybercrimes, we also explore the legal aspects of cybercrimes by analyzing the concept of computer forensics. Some best practices pertaining to countermeasures for information warfare are also discussed.
Keywords: Cyber infrastructure, cybercrimes, cyber insurance, computer forensics, security models

1.1 Introduction to Cybersecurity

Cybersecurity may be defined as the ability to defend against and recover from cyberattacks. According to the National Institute of Standards and Technology (NIST), cybersecurity is the ability to protect or defend the use of cyberspace from cyberattacks [1]. The entire cyberspace consists of several interdependent networks of the information systems infrastructure which could be the internet, telecommunications network, computer systems, embedded systems or controllers. Thus, cybersecurity is concerned with critical infrastructure, network security, cloud security, application security, the internet of things and several other domains where the need to ensure security is paramount.
  1. Critical infrastructure: Security in critical infrastructure deals with cyber physical systems and real-world deployments. Industries like automation, aviation, healthcare, traffic lights, electricity grids etc are prone to cyberattacks like eavesdropping, compromised key attacks, man-in-the-middle attacks and denial-of-service attacks [2].
  2. Network security: Network security deals with measures and concerns to protect information systems. It guards against unauthorized intrusions and protects the usability and integrity of network and data. cyberattacks on networks could be passi...

Indice dei contenuti