Desktop version

Home arrow Computer Science

  • Increase font
  • Decrease font


>>

Cyber Defense Mechanisms: Security, Privacy, and Challenges


Security Threat Analysis and Prevention towards Attack StrategiesIntroductionHistory of Security BreachesCommon Security ThreatsMalwarePhishingSpear Phishing“Man in the Middle” (MitM) AttackTrojansRansomwareDenial-of-Service Attack or Distributed Denial-of-Service Attack (DDoS)Attacks on IoT DevicesData BreachesMalware on Mobile AppsSecurity Challenges in Modern DayCloud ComputingSocial MediaSmart PhonesGeneral Data Protection Regulations (GDPR)Attacks Based on Machine Learning and AIAttacks against Cryptocurrencies and Blockchain SystemsSwitching to DevOpsBiometric AuthenticationFileless MalwareAttack Strategies and Brief Study on Advanced Persistent Threat (APT)How an APT Attack WorksSome Instances of APTsCharacteristics of APTsPrevention MeasuresIdentify the ThreatsBeware of CybercrimesObserve All StakeholdersUsage of Two-Factor AuthenticationConduct Regular AuditsDraft a Credit Sign-Off PolicyProtect Vital DataPerform Risk AssessmentsInsure against CybercrimeGather In-Depth Knowledge about Risk FactorsThreat ModelingRole of a Threat AnalystSummaryReferencesDefense against the Survivability to Network StrategiesIntroductionSurvivability Network Architecture—SONET and Self-Healing Ring TransportationSingle-Access Optical Network Ring ArchitectureMultiaccess Optical Network Ring ArchitectureChannel Demand Routing Ring ArchitectureResultConclusionReferencesDefense Mechanism to Self-Adaptive Cyber-Physical Security SystemsIntroductionBackground Knowledge of CPSApplication Areas of Cyber-Physical System (CPS)Philosophical Issues of CPSPrinciple of CPS OperationArchitecture of CPSPhysical LayerData Link LayerNetwork LayerTransport LayerSession LayerPresentation LayerApplication LayerSelf-Adaptive PatternsSynthesis Utilized PatternSynthesis Command PatternsCollect Organized PatternsSecurity Threats of CPSAttacks on CPSAttacks and Its ConsequencesAdversaries’ CharacteristicsConclusionReferencesSecure Channel Allocation in Cognitive Radio–Wireless Sensor NetworksIntroductionRelated WorksSystem ModelCommon Attacks in CR-WSNReplay AttackNode-Targeted AttackPower Consumption AttackLocation PrivacyPerformance EvaluationCountermeasures in CR-WSNConclusion and Future WorkReferencesSecurity Issues in IoT NetworksIntroductionChallenges for IoT NetworkThe Most Important Challenges in IoT NetworkSchema ProcessingSpeedThe ValueThe SecurityElements for the Internet of Things (IoT)Cases and Scenarios for IoT NetworkClusteringTrackingTactical Networks and High Dynamic NetworkThe Vision of Internet of Things (IoT)Software-Defined IoTIoT ArchitectureAlgorithm for Internet of Things (IoT)Business Context of the IoTIoT Device Information Collection ProcessIntroduction to IoT SecurityD evelopment of IoT Security MechanismsSecurity Attacks in IoTIoT Security ChallengesIoT Security Risks and ChallengesIoT Security RequirementsConclusionReferencesIoT Ecosystem Implications to Real-World Security ScenarioIoT Ecosystem HistoryIoT EcosystemBuilding an IoT EcosystemChallenges in Building an EcosystemIoT Ecosystem ImplicationsIoT Security ImplicationsCurrent IoT Security Scenario and TrendsWhy These Are Not EnoughThe Ideal Security SystemA Solution—Blockchain TechnologyImplementing Blockchain in an IoT EcosystemConclusionReferencesDesign Principles and Privacy in Cloud ComputingIntroductionEvolution of Cloud ComputingApplications of Cloud Computing in Various DomainsGeneralized Architecture for Cloud ComputingDesign Principles in Cloud ComputingPrivacy Issues in Cloud ComputingOutlineSecurity Requirements and Attacks in Cloud ComputingThreat ModelSecurity Requirements in Cloud ComputingSecurity Attacks in Cloud ComputingTaxonomy of Security and Privacy Preservation Protocols in Cloud ComputingKey ManagementUser Authentication/Device AuthenticationAccess Control/User Access ControlIntrusion DetectionPrivacy PreservationChallenges and Future Research DirectionsDesign of Lightweight Security ProtocolsSecuring Data Mining MethodsGranular AuditingBlockchain-Based Decentralized MechanismsConclusionBibliographyBig Data Analysis on Smart Tools and TechniquesIntroductionBig Data ChallengesBig Data Analysis Techniques and ToolsWeb MiningVisualization MethodsMachine LearningMultilayer Perceptron (MLP)Kohonen Self-Organizing Feature Maps (SOFMs)Support Vector Machine (SVM)Optimization MethodsStochastic OptimizationDeterministic OptimizationRelated WorkDiscussion and ConclusionConclusionReferencesLightweight Security Protocols for Blockchain TechnologyIntroductionBlockchain Technology Design SpaceConsensusDistinct Features of Blockchain Distributed ArchitecturePractical Applications of BlockchainAdvantages and Disadvantages of BlockchainAdvantagesDisadvantagesLimitations and Drawbacks of BlockchainComparative Study on Authentication Protocols for Blockchain TechnologyComparison of Security and Functionality FeaturesComparison of Communication CostsComparison of Computation CostsDeployment and Implementation of Testbeds for BlockchainConclusionAcknowledgmentsBibliographyPrivacy and Challenges to Data-Intensive TechniquesIntroductionAdvantages of CybersecurityApproach and WorkflowCommon Steps in CybersecuritySet Up Your Risk Management RegimeCybersecurity Principles and GoalsSTRATEGIES AND METHODOLOGIES USED TOACHIEVE CYBERSECURITY SOLUTIONConfidentialityTools for ConfidentialityIntegrityTools for IntegrityAvailabilityTools of AvailabilityChallenges of CybersecurityData Security ConsiderationPrivacy PreservationPrivacy in CybersecurityData-Intensive TechnologyChallenges in Data-Intensive TechniquesCybersecurity to Data-Intensive TechniquesChallenges to Cybersecurity to Data-Intensive TechniquesConclusionReferencesDynamic Modeling on Malware and Its Defense in Wireless Computer Network Using Pre-QuarantineIntroductionRelated WorksNomenclatureFormulation of Mathematical Model and AssumptionsMathematical Model (S, Q, I, Q[sub(1)], R)Basic Reproduction Number and EquilibriumExistence and Stability AnalysisConclusionReferencesPrivacy Preservation Algorithms on Cryptography for AI as Human-like Robotic Player for Fighting Game Using Rule-Based MethodIntroductionPurpose and Goal of the ResearchRelationship between the AI/Human Players and the SystemGame-Related InformationCharacter InformationApproachRule-Based Method StructureRule Analysis of the Fighting Game PlayerMethodologyExperimentEnvironment and SettingsResults and DiscussionsComparison of Experiments between Removing Some Rules and Removing All Rules of My Computer PlayerC onclusionReferencesWeb-Based Smart Agriculture SystemIntroductionMajor Factors of Smart AgricultureIncrease in Agriculture ProductivityMinimizing Agriculture Greenhouse GasesAncient Farming Technology and MachineryOld TechniquesOld MachineryDrawbacks of Old TechniquesTools Used For Smart AgricultureGPS LocatorSensorsRemote SensingAutomatic Irrigation and WateringDronesDriverless TractorNew Methods Used For Smart AgricultureLand Use System: AgroforestrySmart Technology Used For FarmingCloud ComputingRobotsGenetic Algorithm in Smart FarmingSecurity ChallengesConclusionReferences
 
>>

Related topics