Skip to main content

Emerging Trends In Ict Security

Download Emerging Trends In Ict Security Full eBooks in PDF, EPUB, and kindle. Emerging Trends In Ict Security is one my favorite book and give us some inspiration, very enjoy to read. you could read this book anywhere anytime directly from your device.

Emerging Trends in ICT Security

Emerging Trends in ICT Security Book
Author : Leonidas Deligiannidis,Charlie Wiseman,Mira Yun,Hamid R. Arabnia
Publisher : Elsevier Inc. Chapters
Release : 2013-11-06
ISBN : 0128070641
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Every day, people interact with numerous computer systems, networks, and services that require the exchange of sensitive data. However, the Internet is a highly distributed system operated by many different entities and as such should not be trusted by end users. Users, whether consumers or businesses, retain no control over how their information is routed among the many networks that comprise the Internet. Therefore, there is a strong need for cryptographic protocols to authenticate, verify trust, and establish a secure channel for exchanging data. This chapter presents a series of projects and demonstrations for systems and networking professionals who want to increase their comprehension of security concepts and protocols. The material presented here is derived from existing courses taught by the authors in the areas of cryptography, network security, and wireless security.

Emerging Trends in ICT Security

Emerging Trends in ICT Security Book
Author : Babak Akhgar,Hamid R Arabnia
Publisher : Newnes
Release : 2013-11-06
ISBN : 0124104878
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider’s look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. Provides a multidisciplinary approach to security with coverage of communication systems, information mining, policy making, and management infrastructures Discusses deployment of numerous security solutions, including, cyber defense techniques and defense against malicious code and mobile attacks Addresses application of security solutions in real-life scenarios in several environments, such as social media, big data and crowd sourcing

Emerging Trends in ICT Security

Emerging Trends in ICT Security Book
Author : Mohammad Reza Movahedisefat,Seyyed Mohammad Reza Farshchi,Davud Mohammadpur
Publisher : Elsevier Inc. Chapters
Release : 2013-11-06
ISBN : 0128070803
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

In this chapter, we discuss the threats, challenges, and guidance associated with securing an organization’s core IT infrastructure at the network, host, and application levels in the cloud. According to the best knowledge of the authors, up to now, there are no research with this perspective on cloud security in the literature. This chapter represents our first discussion of this infrastructure security in the context of SPI service delivery models (SaaS, PaaS, and IaaS). Non-information security professionals are cautioned not to simply equate infrastructure security to infrastructure-as-a-service (IaaS) security. Although infrastructure security is more highly relevant to customers of IaaS, similar consideration should be given to providers’ platform-as-a-service (PaaS) and software-as-a-service (SaaS) environments, since they have ramifications to customer threat, risk, and compliance management. Another dimension is the cloud business model (public, private, and hybrid clouds), which is orthogonal to the SPI service delivery model; what we highlight is the relevance of discussion points as they apply to public and private clouds. When discussing public clouds, the scope of infrastructure security is limited to the layers of infrastructure that move beyond the organization’s control and into the hands of service providers (i.e., when responsibility to a secure infrastructure is transferred to the cloud service provider [CSP], based on the SPI delivery model). Information in this chapter is critical for customers in gaining an understanding of what security a CSP provides and what security the customer is responsible for providing. This chapter discusses conceptual issues, basic requirements, and practical suggestions for designing dynamically configured security infrastructure provisioned on demand as part of the cloud-based infrastructure. We end this chapter by describing general-use cases for provisioning cloud infrastructure that provide bases for defining security infrastructure requirements.

Emerging Trends in ICT Security

Emerging Trends in ICT Security Book
Author : Luis Olsina,Alexander Dieser,Guillermo Covella
Publisher : Elsevier Inc. Chapters
Release : 2013-11-06
ISBN : 0128070595
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

In this chapter we state that metrics and indicators are key, reusable organizational assets for providing suitable data and information for analyzing, recommending, and ultimately making decisions. In a nutshell, the metric represents the specification of a measurement process that transforms an entity attribute (i.e., the input; such as a security property) into a measure (i.e., the output, which is data), and the (elementary) indicator is the specification of an evaluation process, which has as input a metric’s measure and produces an indicator value (i.e., information). There is abundant literature on ICT security and risk assessment, but very often basic issues such as why, what, how, when, who, and where to measure and evaluate are weakly intertwined and specified. One hypothesis in our research is that, without appropriate recorded metadata of information needs, attributes, metrics, and indicators, it is difficult to ensure that measure and indicator values are repeatable and consistently comparable among an organization’s measurement and evaluation (M&E) projects. We show the added value of metrics and indicators as informational resources for M&E processes, illustrating a couple of them from a system security practical case.

Emerging Trends in ICT Security

Emerging Trends in ICT Security Book
Author : Evan Damon,Jens Mache,Richard Weiss,Kaleb Ganz,Claire Humbeutel,Miles Crabill
Publisher : Elsevier Inc. Chapters
Release : 2013-11-06
ISBN : 0128070889
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Educational tools related to firewalls and firewall configurations are central to the development of cybersecurity education, due to the integral role firewalls play in this field. To assess the current state of firewall education, we developed a set of criteria that educational exercises should meet. They should be competitive, interactive, extensible, and approachable. These criteria were then applied to three existing firewall exercises in order to gauge their strengths and weaknesses. With that information in mind, we then looked to emerging trends in firewalls and firewall education. We found that many of the emerging trends align with our criteria, but diverge from them in other important ways.

Emerging Trends in ICT Security

Emerging Trends in ICT Security Book
Author : Guillermo Francia,David Thornton,Monica Trifas,Timothy Bowden
Publisher : Elsevier Inc. Chapters
Release : 2013-11-06
ISBN : 0128070625
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

The need for well-trained Information Security and Assurance (ISA) professionals, as well as general information security awareness, has increased considerably in the last decade and shows no sign of slowing. To address this need, both industry and academia have been driven to innovative approaches. The use of digital games and game mechanics to further education has received growing attention and respect in the last several years. There is strong evidence that thoughtful employment of gaming elements can improve motivation and understanding. This paper provides a broad background on the topics of game-based learning, gamification, and serious games. Further, it describes our ongoing approach to developing and promoting digital games for information security awareness, including two game designs and a gamification system architecture.

Emerging Trends in ICT Security

Emerging Trends in ICT Security Book
Author : Peng He
Publisher : Elsevier Inc. Chapters
Release : 2013-11-06
ISBN : 0128070846
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

In order to increase the accuracy of intrusion detection rate and reduce the false alarm rate for cyber-security analysis, attack correlation has become an indispensable component in most intrusion detection systems. However, traditional intrusion detection techniques often fail to handle the complex and uncertain network attack correlation tasks. We propose the creation of semantic networks that build relationships among network attacks and assist in automatically identifying and predicting related attacks. Also, our method can increase the precision in detecting probable attacks. Experimental results show that our semantic network, using the Anderberg similarity measure, performs better in terms of precision and recall compared to existing correlation approaches in the cyber-security domain.

Emerging Trends in ICT Security

Emerging Trends in ICT Security Book
Author : Diogo A.B. Fernandes,Liliana F.B. Soares,João V. Gomes,Mário M. Freire,Pedro R.M. Inácio
Publisher : Elsevier Inc. Chapters
Release : 2013-11-06
ISBN : 012807082X
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Nowadays, cybersecurity makes headlines across the media and in companies, blogs, social networks, among other places. The Internet is a wild cyberspace, an arena for commercialization, consumerism, business, and leisure, to name a few activities. Networks, populations, and nations around the world, now interconnected through the Internet, rely on it for their daily lives. But some Internet users have learned to take advantage of vulnerable systems and of Internet technologies for their own good, sending out spam, phishing, data breaches, botnets, and other threats. An underground criminal network has emerged, creating complex malware kits for several purposes. “Hacktivism” has become a popular term with many supporters worldwide, but cyberwarfare is now on the rise, gaining more and more attention from nation-states. This chapter provides a quick overview of these topics, discussing them in a timely manner, referencing key events from the past while focusing on the present day.

Emerging Trends in ICT Security

Emerging Trends in ICT Security Book
Author : Nicolás Macia,Fernando G. Tinetti
Publisher : Elsevier Inc. Chapters
Release : 2013-11-06
ISBN : 0128070862
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

The current mechanism implemented for Web session management implies exchanging session cookies between a Web application client (usually a browser) and a Web application server. Besides having privacy issues, the security of Web sessions can be affected by various reasons related to cookies. There are several vulnerabilities that threaten a Web application specifically related to cookies: theft, tampering, and/or forgery. Any of these vulnerabilities may favor session theft and/or unauthorized access using the identity of another user in the system. In this chapter, we present an alternative technique for management of Web sessions, where no session cookies are sent to clients while maintaining backward compatibility. As a result, the proposed technique is shown to avoid several specific vulnerabilities that affect the security of Web application sessions and users. The proposed mechanism works transparently for Web applications, and a proof of concept was successfully tested with Web applications based on different languages such as Php, Perl, Ruby, and Python.

Emerging Trends in ICT Security

Emerging Trends in ICT Security Book
Author : Logan O. Mailloux,Michael R. Grimaila,John M. Colombi,Douglas D. Hodson,Gerald Baumgartner
Publisher : Elsevier Inc. Chapters
Release : 2013-11-06
ISBN : 0128070587
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

This chapter discusses the problematic intersection of risk management, mission assurance, security, and information systems through the illustrative example of the United States (US) Department of Defense (DoD). A concise history of systems security engineering (SSE) is provided with emphasis on recent revitalization efforts. Next, a review of established and emerging SSE methods, processes, and tools (MPT) frequently used to assess and manage critical shortfalls in the development and fielding of complex information-centric systems is provided. From this review, a common theme emerges—the need for a holistic multidisciplinary approach that addresses people, processes, and technologies to manage system complexity, while providing cost-effective security solutions through the use of established systems engineering techniques. Multiple cases and scenarios that promote the discovery and shared understanding of security solutions for complex systems by those trained in the art and science of systems engineering, information security, and risk management are demonstrated.

Emerging Trends in ICT Security

Emerging Trends in ICT Security Book
Author : Jeffrey D. Morris,Michael R. Grimaila,Douglas D. Hodson,David Jacques,Gerald Baumgartner
Publisher : Elsevier Inc. Chapters
Release : 2013-11-06
ISBN : 0128070668
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Quantum Key Distribution (QKD) is a revolutionary security technology that exploits the laws of quantum mechanics to achieve information-theoretic secure key exchange. QKD enables two parties to “grow” a shared secret key without placing any limits on an adversary’s computational power. QKD is unique because it exploits the fundamental laws of quantum mechanics to detect the presence of any third-party eavesdropping on the key exchange. In this chapter, we present a historical survey of the development of QKD systems and their system architectures, identify commercially available QKD system solutions, discuss emerging trends in the research of future QKD technologies, and present a use case that demonstrates the utility of QKD technology in a real-world military scenario.

Emerging Trends in ICT Security

Emerging Trends in ICT Security Book
Author : Eugenia I. Papagiannakopoulou,Maria N. Koukovini,Georgios V. Lioudakis,Nikolaos L. Dellas,Dimitra I. Kaklamani,Lakovos S. Venieris
Publisher : Elsevier Inc. Chapters
Release : 2013-11-06
ISBN : 0128070870
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Access control comprises a central concept in ICT security, leveraged for the protection of various resources, including systems, networks, applications, services, corporate assets, and information. It has also emerged as an important mechanism for the protection of personal data, resulting in a family of models referred to as privacy-aware access control. Due to the increasing complexity of the ICT ecosystem, various approaches have been proposed with the aim to provide expressive access control models and, in this context, Semantic Web technologies have also been leveraged. This chapter investigates the application of Semantic Web technologies in access control, highlighting the main trends in the area and outlining the most characteristic approaches.

Emerging Trends in ICT Security

Emerging Trends in ICT Security Book
Author : Sampsa Rauti,Ville Leppänen
Publisher : Elsevier Inc. Chapters
Release : 2013-11-06
ISBN : 0128070854
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Man-in-the-browser is a Trojan that infects a Web browser. A Trojan has the ability to modify Web pages and online transaction content, or insert itself in a covert manner, without the user noticing anything suspicious. This chapter presents a study of several man-in-the-browser attacks that tamper with the user’s transactions and examines different attack vectors on several software layers. We conclude that there are many possible points of attack on different software layers and components of a Web browser, as the user’s transaction data flows through these layers. We also propose some countermeasures to mitigate these attacks. Our conceptual solution is based on cryptographic identification and integrity monitoring of software components.

Emerging Trends in ICT Security

Emerging Trends in ICT Security Book
Author : Ben Wu,Bhavin J. Shastri,Paul R. Prucnal
Publisher : Elsevier Inc. Chapters
Release : 2013-11-06
ISBN : 0128070684
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Providing data security in the optical layer enables low latency data encryption and enlarges the capacity for secure data transmission. As the demand for both secure and high speed transmission grows dramatically, secure data transmission is pushing the requirements for processing speed and network capacity. As fiber-optic systems form the backbone of communication networks, optical approaches for protecting the network security increases the available capacity of the network. Moreover, compared to electric circuits, fiber-optic systems are immune to electromagnetic interference and have high processing speeds. In this chapter, we discuss using fiber-optic-based techniques to defend against threats in the network, including optical encryption, optical code-division multiple access (CDMA), optical key distribution, optical steganography, anti-jamming, and optical chaos-based communication. These approaches are categorized by their different applications for protecting the properties of network security, including confidentiality, privacy, and availability.

Emerging Trends in ICT Security

Emerging Trends in ICT Security Book
Author : Jianbing Ma
Publisher : Elsevier Inc. Chapters
Release : 2013-11-06
ISBN : 0128070730
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

CCTV systems are broadly deployed in the present world. Despite this, the impact on anti-social and criminal behavior has been minimal. To ensure in-time reaction for intelligent surveillance, it is a fundamental task for real-world applications to determine the trajectory of any interested subject. However, precise video information for subjects (e.g., face information) is not always available, especially in zones without cameras. In these cases, we have to use event reasoning techniques to combine all kinds of dynamic information (e.g., video analytics, card reading results, etc.) as well as background information (e.g., topological information). This chapter hence proposes an event reasoning based framework for trajectory tracking. The main idea is to use inference rules to infer the passage of a subject when there is not enough dynamic information. We demonstrate the significance and usefulness of our framework with a simulation experiment, which shows better performance than using dynamic information only.

Emerging Trends in ICT Security

Emerging Trends in ICT Security Book
Author : Sébastien Salva,Stassia R. Zafimiharisoa
Publisher : Elsevier Inc. Chapters
Release : 2013-11-06
ISBN : 0128070811
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

The intent mechanism of the Android platform is a powerful message-passing system that allows for sharing data among components and applications. Nevertheless, it might also be used as an entry point for security attacks if incautiously employed. Attacks can be easily sent through intents to components, which can indirectly forward them to other components, and so on. In this context, this chapter proposes a model-based security testing approach to attempt to detect data vulnerabilities in Android applications. In other words, this approach generates test cases to check whether components are vulnerable to attacks, sent through intents that expose personal data. Our method takes Android applications and intent-based vulnerabilities formally expressed with models called vulnerability patterns. Then, and this is the originality of our approach, partial specifications are automatically generated from Android applications with algorithms reflecting the Android documentation. These specifications avoid false positives and refine test verdicts. A tool called APSET is presented and evaluated with tests on some Android applications.

Emerging Trends in ICT Security

Emerging Trends in ICT Security Book
Author : Sanjai Veetil,Qigang Gao
Publisher : Elsevier Inc. Chapters
Release : 2013-11-06
ISBN : 0128070757
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Over the years, many networks hosted by large companies or organizations have been crippled by intrusions launched with minimal effort. Such attacks have caused the loss of millions of dollars for the company and created serious security threats. As a result, network administrators and security experts across the globe have barricaded their networks with expensive Intrusion Detection Systems (IDS) to detect and take action in dealing with various network attacks. There is still a very challenging task to develop a cost-effective approach that can deal with network intrusions. Furthermore, large networks generate huge traffic data that serve as inputs for IDSes. In this chapter, we present a Network Intrusion Detection System (NIDS) built using Apache Hadoop and HStreaming, which can detect and alert administrators in real time. The system makes use of a simple yet versatile Naive Bayes classifier for predicting an attack. The experimental results show some promising outcomes.

Emerging Trends in ICT Security

Emerging Trends in ICT Security Book
Author : Falkner Moraes,Zair Abdelouahab,Denivaldo Lopes,Emerson Oliveira,Cenidalva Teixeira,Sofiane Labidi,Ariel Teles
Publisher : Elsevier Inc. Chapters
Release : 2013-11-06
ISBN : 0128070676
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Lack of security is a constant concern in open distributed systems. Because of this problem, many tools for evaluating vulnerabilities of networks, as well as for their protection, are being developed and largely deployed; for example, techniques for encryption, antivirus, firewall, and IDSs (Intrusion Detection Systems). Among these, there are IDSs that are increasingly conceived, designed, and implemented. Currently, IDSs are created using software agents. Although IDSs can provide intrusion detection and countermeasures against threats, they are subjected to attacks. Thus, it is necessary to ensure security for IDSs. This chapter proposes a framework for providing self-security, self-reliability of message exchange, self-reliability of components, and self-integrity for IDSs based on agents. The proposed solution is implemented as an extension of the IDS-NIDIA (Network Intrusion Detection System Based on Intelligent Agents), whose architecture has an intelligent agent society that communicates in a cooperative way in a distributed environment. Some tests show the applicability of the proposed solution.

Emerging Trends in ICT Security

Emerging Trends in ICT Security Book
Author : Héctor Marco,Ismael Ripoll,David de Andrés,Juan Carlos Ruiz
Publisher : Elsevier Inc. Chapters
Release : 2013-11-06
ISBN : 0128070781
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Memory errors, such as stack and integer vulnerabilities, still rank among the top most dangerous software security issues. Existing protection techniques, like Address Space Layout Randomization and Stack-Smashing Protection, prevent potential intrusions by crashing applications when anomalous behaviors are detected. Unfortunately, typical networking server architectures, such those used on Web servers ones, limit the effectiveness of such countermeasures. Since memory error exploits usually rely on highly specific processor characteristics, the same exploit rarely works on different hardware architectures. This paper proposes a novel strategy to thwart memory error exploitation by dynamically changing, upon crash detection, the variant executing the networking server. Required software diversification among variants is obtained using off-the-shelf cross-compilation suites, whereas hardware diversification relies on processor emulation. The proposed case study shows the feasibility and effectiveness of the approach to reduce the likelihood, and in some cases even prevent the possibility, of exploiting memory errors.

Emerging Trends in ICT Security

Emerging Trends in ICT Security Book
Author : Girish Keshav Palshikar,Manoj Apte
Publisher : Elsevier Inc. Chapters
Release : 2013-11-06
ISBN : 0128070935
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Money laundering (ML) is a serious problem for the economies and financial institutions around the world. Financial institutions get used by organized criminals and terrorists as vehicles of large-scale money laundering, which presents the institutions with challenges of regulatory compliance, maintaining financial security, preserving goodwill and reputation, and avoiding operational risks like liquidity crunch and lawsuits. Hence prevention, detection, and control of ML is crucial for the financial security and risk management of financial institutions. Realizing the gravity of ML, various nations have started anti-ML (AML) activities, along with cooperative international efforts, including Financial Action Task Force, Egmont Group and Wolfsberg Group. This chapter begins with an overview of ML, discusses commonly used methods of ML, and the anti-ML efforts worldwide. After surveying some analytics techniques used to estimate the extent of ML, some data-mining techniques reported in the literature for detection of ML episodes (instances) are surveyed.