Desktop version
Home
Mathematics
>>
Information Security and Optimization
Information Security Policy and Standards
Brief Introduction
Definitions
Structure of Policy Documents
Governance (Understanding the Ownership, Responsibilities, and Accountabilities)
Writing Effective Policies (Characteristics and Attributes of an Effective Policy Document)
Policy Life Cycle (Policy from Cradle to Grave)
Development
Implementation
Enforcement
Assess, Review, and Update
End of Life
References
Vulnerability Management
Introduction
Background
Areas of Risk
Why Is Software Vulnerable?
Vulnerability Management
Discovering Vulnerabilities
Assessing Vulnerabilities
Reporting
Remediating and Verifying
Participants in Vulnerability Management
Vulnerability Analysis Tools
Best Practices for Vulnerability Management
A Case Study in Vulnerability Management: Equifax
References
Identity Theft and Prevention
Introduction
Literature Review
Research Model and Hypothesis
Method
Result
Discussion
Conclusion
References
Organization Security Policies and Their After Effects
Introduction
What Does Security Policy Mean?
Why Do You Need a Security Policy?
How to Develop Policy
How Can Policy Operation Be Made Truthful?
Personnel Issues
Security Policy of Outsiders
Background
Types of Information Security Policies
Development of Information Security Policy
Approaches to the Implementation of Information Security Policy
Policies, Standards and Practices
Governance of Information Security
Success Factors of Security Policies in Organizations
Case Studies of Security Policies in Organizations
Organizational Objectives and Goals as Derived from the Case Studies
Conclusion
References
Cyber-Attacks and Their Impact on Real Life: What Are Real-Life Cyber-Attacks, How Do They Affect Real Life and What Should We Do AboutThem?
Introduction
Background
Use of Cyberspace
The Cyber-Battlefield
Effective Limitations of Cyber-Warfare
Development of Cyber-Warfare and Cyber-Conflict
Emerging Cyber-Attacks
Cybersecurity Attacks
Cyber Defense Best Practices and Protection
Impact of the Attacks
Conclusion
References
Cryptography and Steganography Techniques
Introduction
History
The Oldest Cryptographic Technique—Hieroglyphs
Steganography
Cryptography Concepts
Types of Cryptography
Benefits of a Hybrid Approach: Steganography and Cryptography
Recent Trends
Conclusion
References
An FPGA-Based Advanced Lightweight Cryptography Architecture for IoT Security and Its Cryptanalysis
Introduction: Background and Driving Forces
Literature Review
The Lightweight Security Architecture
External Signals and Buses
Internal Bus
Internal Memory Registers
Internal Encryption and Decryption Module
Internal Mux-DeMux Module
Internal Control Unit
Key Generation
Cryptanalysis
Simulation-Based Results
Applications
Conclusion
References
An Overview of Digital Image Forensics: Image Morphing and Forgery Detection Algorithms
Introduction
A Sequential Processing Cycle of a Digital Image
Image Morphing
Processes in Image Morphing
Image Morphing Algorithms
Multilevel Free Form Deformation (MFFD)
Traces in Image Forensics
Classification of Forgery Detection (Authentication) Techniques
Copy-Move Forgery Detection Techniques
Antiforensics
Conclusion
References
Analysis of Classification-Based Intrusion-Detection Techniques
Introduction
Intrusion Detection Systems (IDSs)
Requirements of IDSs
Categorization of the IDS
Decision-Making Inside the IDS
Intrusion Response
Further Literature About WSN
Application of IDS in MANET and WSN
Primarily Agent Based Dispensed and Collaborative IDSs
Clustering (Hierarchical) Based IDSs
Statistical Detection Based IDSs
Misuse Detection-Based IDS
Reputation (Trust)-Based IDSs
Watchdog Mechanism
Primarily Sector Based IDS
Game Idea Based IDSs
Genetic Algorithm Based IDS
Other Works
Intrusion Detection System in WSN 212
Restrictions and Research Challenges in WSN
Differences Between MANETs and WSNs
Proposed Schemes
Future Directions in the Selection of IDS for WSN
Conclusion
References
Crypto currency and Blockchain
Introduction—Definition of Blockchain: A Multiple Faced Technology
The Basic Working of Blockchain
The Blockchain Agreement Mechanisms
What Are Cryptocurrencies?
Advanced Types of Money—Tokens—Cryptosecurities
Computerized Kinds of Cash—Blockchain
Orchestrating CRYPTOCURRENCIES—Checking the Crypto-Market
Bitcoin and Beyond: Virtual Styles of Money with the Highest Market Capitalization
Stellar (XLM)
Cardano
NEO
Monero
Dash
Conclusion: A Taxonomy and Time Frame of Cryptocurrencies
References
Cyber Security in Cloud Platforms
Introduction to Cloud Infrastructure
Cloud Deployment and Services Models
Benefits of Cloud Computing
Literature Review
Issues and Challenges
Cyber Security Mechanism
Solution: Proposed Framework for Security in Cloud Platform
Conclusion
References
Biometrics-Unique Identity Verification System
Introduction to Biometrics
Authentication vs Verification
Types of Biometrics: Physical and Behavioral Biometrics
Types of Biometric Systems
Biometrics System Performance: False Acceptance and False Rejection
Issues and Concerns
Performance Enhancement of Biometrics Systems
Applications of Biometrics
Conclusion
References
Security Tools
Introduction: Background and Driving Forces
Cybersecurity Tools and Methods
Wireshark—A Packet Sniffing and Packet Capturing Tool
Autopsy—A Packet Sniffing and Packet Capturing Tool
Download and Installation
Features and Working
Advantages of Using Autopsy
Conclusion
References
Introduction
Evolutionary Algorithms (EA)
EA in Practice
Genetic Algorithm
Genetic Programming
Particle Swarm Optimization (PSO)
Comparison: Genetic Algorithm, Genetic Programming and Particle Swarm Optimization
Conclusion
References
Appendix: Policy Template
>>
Related topics
Academic library - free online college e textbooks - info{at}ebrary.net - © 2014 - 2023