Desktop version

Home arrow Mathematics

  • Increase font
  • Decrease font


>>

Information Security and Optimization


Information Security Policy and StandardsBrief IntroductionDefinitionsStructure of Policy DocumentsGovernance (Understanding the Ownership, Responsibilities, and Accountabilities)Writing Effective Policies (Characteristics and Attributes of an Effective Policy Document)Policy Life Cycle (Policy from Cradle to Grave)DevelopmentImplementationEnforcementAssess, Review, and UpdateEnd of LifeReferencesVulnerability ManagementIntroductionBackgroundAreas of RiskWhy Is Software Vulnerable?Vulnerability ManagementDiscovering VulnerabilitiesAssessing VulnerabilitiesReportingRemediating and VerifyingParticipants in Vulnerability ManagementVulnerability Analysis ToolsBest Practices for Vulnerability ManagementA Case Study in Vulnerability Management: EquifaxReferencesIdentity Theft and PreventionIntroductionLiterature ReviewResearch Model and HypothesisMethodResultDiscussionConclusionReferencesOrganization Security Policies and Their After EffectsIntroductionWhat Does Security Policy Mean?Why Do You Need a Security Policy?How to Develop PolicyHow Can Policy Operation Be Made Truthful?Personnel IssuesSecurity Policy of OutsidersBackgroundTypes of Information Security PoliciesDevelopment of Information Security PolicyApproaches to the Implementation of Information Security PolicyPolicies, Standards and PracticesGovernance of Information SecuritySuccess Factors of Security Policies in OrganizationsCase Studies of Security Policies in OrganizationsOrganizational Objectives and Goals as Derived from the Case StudiesConclusionReferencesCyber-Attacks and Their Impact on Real Life: What Are Real-Life Cyber-Attacks, How Do They Affect Real Life and What Should We Do AboutThem?IntroductionBackgroundUse of CyberspaceThe Cyber-BattlefieldEffective Limitations of Cyber-WarfareDevelopment of Cyber-Warfare and Cyber-ConflictEmerging Cyber-AttacksCybersecurity AttacksCyber Defense Best Practices and ProtectionImpact of the AttacksConclusionReferencesCryptography and Steganography TechniquesIntroductionHistoryThe Oldest Cryptographic Technique—HieroglyphsSteganographyCryptography ConceptsTypes of CryptographyBenefits of a Hybrid Approach: Steganography and CryptographyRecent TrendsConclusionReferencesAn FPGA-Based Advanced Lightweight Cryptography Architecture for IoT Security and Its CryptanalysisIntroduction: Background and Driving ForcesLiterature ReviewThe Lightweight Security ArchitectureExternal Signals and BusesInternal BusInternal Memory RegistersInternal Encryption and Decryption ModuleInternal Mux-DeMux ModuleInternal Control UnitKey GenerationCryptanalysisSimulation-Based ResultsApplicationsConclusionReferencesAn Overview of Digital Image Forensics: Image Morphing and Forgery Detection AlgorithmsIntroductionA Sequential Processing Cycle of a Digital ImageImage MorphingProcesses in Image MorphingImage Morphing AlgorithmsMultilevel Free Form Deformation (MFFD)Traces in Image ForensicsClassification of Forgery Detection (Authentication) TechniquesCopy-Move Forgery Detection TechniquesAntiforensicsConclusionReferencesAnalysis of Classification-Based Intrusion-Detection TechniquesIntroductionIntrusion Detection Systems (IDSs)Requirements of IDSsCategorization of the IDSDecision-Making Inside the IDSIntrusion ResponseFurther Literature About WSNApplication of IDS in MANET and WSNPrimarily Agent Based Dispensed and Collaborative IDSsClustering (Hierarchical) Based IDSsStatistical Detection Based IDSsMisuse Detection-Based IDSReputation (Trust)-Based IDSsWatchdog MechanismPrimarily Sector Based IDSGame Idea Based IDSsGenetic Algorithm Based IDSOther WorksIntrusion Detection System in WSN 212Restrictions and Research Challenges in WSNDifferences Between MANETs and WSNsProposed SchemesFuture Directions in the Selection of IDS for WSNConclusionReferencesCrypto currency and BlockchainIntroduction—Definition of Blockchain: A Multiple Faced TechnologyThe Basic Working of BlockchainThe Blockchain Agreement MechanismsWhat Are Cryptocurrencies?Advanced Types of Money—Tokens—CryptosecuritiesComputerized Kinds of Cash—BlockchainOrchestrating CRYPTOCURRENCIES—Checking the Crypto-MarketBitcoin and Beyond: Virtual Styles of Money with the Highest Market CapitalizationStellar (XLM)CardanoNEOMoneroDashConclusion: A Taxonomy and Time Frame of CryptocurrenciesReferencesCyber Security in Cloud PlatformsIntroduction to Cloud InfrastructureCloud Deployment and Services ModelsBenefits of Cloud ComputingLiterature ReviewIssues and ChallengesCyber Security MechanismSolution: Proposed Framework for Security in Cloud PlatformConclusionReferencesBiometrics-Unique Identity Verification SystemIntroduction to BiometricsAuthentication vs VerificationTypes of Biometrics: Physical and Behavioral BiometricsTypes of Biometric SystemsBiometrics System Performance: False Acceptance and False RejectionIssues and ConcernsPerformance Enhancement of Biometrics SystemsApplications of BiometricsConclusionReferencesSecurity ToolsIntroduction: Background and Driving ForcesCybersecurity Tools and MethodsWireshark—A Packet Sniffing and Packet Capturing ToolAutopsy—A Packet Sniffing and Packet Capturing ToolDownload and InstallationFeatures and WorkingAdvantages of Using AutopsyConclusionReferencesIntroductionEvolutionary Algorithms (EA)EA in PracticeGenetic AlgorithmGenetic ProgrammingParticle Swarm Optimization (PSO)Comparison: Genetic Algorithm, Genetic Programming and Particle Swarm OptimizationConclusionReferencesAppendix: Policy Template
 
>>

Related topics