Cyber Security and Digital Forensics: Challenges and Future Trends
- Length: 432 pages
- Edition: 1
- Language: English
- Publisher: Wiley-Scrivener
- Publication Date: 2022-03-02
- ISBN-10: 111979563X
- ISBN-13: 9781119795636
- Sales Rank: #0 (See Top 100 Books)
CYBER SECURITY AND DIGITAL FORENSICS
Cyber security is an incredibly important issue that is constantly changing, with new methods, processes, and technologies coming online all the time. Books like this are invaluable to professionals working in this area, to stay abreast of all of these changes.
Current cyber threats are getting more complicated and advanced with the rapid evolution of adversarial techniques. Networked computing and portable electronic devices have broadened the role of digital forensics beyond traditional investigations into computer crime. The overall increase in the use of computers as a way of storing and retrieving high-security information requires appropriate security measures to protect the entire computing and communication scenario worldwide. Further, with the introduction of the internet and its underlying technology, facets of information security are becoming a primary concern to protect networks and cyber infrastructures from various threats.
This groundbreaking new volume, written and edited by a wide range of professionals in this area, covers broad technical and socio-economic perspectives for the utilization of information and communication technologies and the development of practical solutions in cyber security and digital forensics. Not just for the professional working in the field, but also for the student or academic on the university level, this is a must-have for any library.
Audience: Practitioners, consultants, engineers, academics, and other professionals working in the areas of cyber analysis, cyber security, homeland security, national defense, the protection of national critical infrastructures, cyber-crime, cyber vulnerabilities, cyber-attacks related to network systems, cyber threat reduction planning, and those who provide leadership in cyber security management both in public and private sectors
Cover Table of Contents Title Page Copyright Preface Acknowledgment 1 A Comprehensive Study of Security Issues and Research Challenges in Different Layers of Service-Oriented IoT Architecture 1.1 Introduction and Related Work 1.2 IoT: Evolution, Applications and Security Requirements 1.3 Service-Oriented IoT Architecture and IoT Protocol Stack 1.4 Anatomy of Attacks on Service-Oriented IoT Architecture 1.5 Major Security Issues in Service-Oriented IoT Architecture 1.6 Conclusion References 2 Quantum and Post-Quantum Cryptography 2.1 Introduction 2.2 Security of Modern Cryptographic Systems 2.3 Quantum Key Distribution 2.4 Post-Quantum Digital Signature 2.5 Conclusion and Future Directions References 3 Artificial Neural Network Applications in Analysis of Forensic Science 3.1 Introduction 3.2 Digital Forensic Analysis Knowledge 3.3 Answer Set Programming in Digital Investigations 3.4 Data Science Processing with Artificial Intelligence Models 3.5 Pattern Recognition Techniques 3.6 ANN Applications 3.7 Knowledge on Stages of Digital Forensic Analysis 3.8 Deep Learning and Modelling 3.9 Conclusion References 4 A Comprehensive Survey of Fully Homomorphic Encryption from Its Theory to Applications 4.1 Introduction 4.2 Homomorphic Encryption Techniques 4.3 Homomorphic Encryption Libraries 4.4 Computations on Encrypted Data 4.5 Applications of Homomorphic Encryption 4.6 Conclusion References 5 Understanding Robotics through Synthetic Psychology 5.1 Introduction 5.2 Physical Capabilities of Robots 5.3 Traditional Psychology, Neuroscience and Future Robotics 5.4 Synthetic Psychology and Robotics: A Vision of the Future 5.5 Synthetic Psychology: The Foresight 5.6 Synthetic Psychology and Mathematical Optimization 5.7 Synthetic Psychology and Medical Diagnosis 5.8 Conclusion References 6 An Insight into Digital Forensics: History, Frameworks, Types and Tools 6.1 Overview 6.2 Digital Forensics 6.3 Digital Forensics History 6.4 Evolutionary Cycle of Digital Forensics 6.5 Stages of Digital Forensics Process 6.6 Types of Digital Forensics 6.7 Evidence Collection and Analysis 6.8 Digital Forensics Tools 6.9 Summary References 7 Digital Forensics as a Service: Analysis for Forensic Knowledge 7.1 Introduction 7.2 Objective 7.3 Types of Digital Forensics 7.4 Conclusion References 8 4S Framework: A Practical CPS Design Security Assessment & Benchmarking Framework 8.1 Introduction 8.2 Literature Review 8.3 Medical Cyber Physical System (MCPS) 8.4 CPSSEC vs. Cyber Security 8.5 Proposed Framework 8.6 Assessment of Hypothetical MCPS Using 4S Framework 8.7 Conclusion 8.8 Future Scope References 9 Ensuring Secure Data Sharing in IoT Domains Using Blockchain 9.1 IoT and Blockchain 9.2 IoT Application Domains and Challenges in Data Sharing 9.3 Why Blockchain? 9.4 IoT Data Sharing Security Mechanism On Blockchain 9.5 Conclusion References 10 A Review of Face Analysis Techniques for Conventional and Forensic Applications 10.1 Introduction 10.2 Face Recognition 10.3 Forensic Face Recognition 10.4 Conclusion References 11 Roadmap of Digital Forensics Investigation Process with Discovery of Tools 11.1 Introduction 11.2 Phases of Digital Forensics Process 11.3 Analysis of Challenges and Need of Digital Forensics 11.4 Appropriateness of Forensics Tool 11.5 Phase-Wise Digital Forensics Techniques 11.6 Pros and Cons of Digital Forensics Investigation Process 11.7 Conclusion References 12 Utilizing Machine Learning and Deep Learning in Cybesecurity: An Innovative Approach 12.1 Introduction 12.2 Proposed Method 12.3 Experimental Studies and Outcomes Analysis 12.4 Conclusions and Future Scope References 13 Applications of Machine Learning Techniques in the Realm of Cybersecurity 13.1 Introduction 13.2 A Brief Literature Review 13.3 Machine Learning and Cybersecurity: Various Issues 13.4 ML Datasets and Algorithms Used in Cybersecurity 13.5 Applications of Machine Learning in the Realm of Cybersecurity 13.6 Conclusions References 14 Security Improvement Technique for Distributed Control System (DCS) and Supervisory Control-Data Acquisition (SCADA) Using Blockchain at Dark Web Platform 14.1 Introduction 14.2 Significance of Security Improvement in DCS and SCADA 14.3 Related Work 14.4 Proposed Methodology 14.5 Result Analysis 14.6 Conclusion References 15 Recent Techniques for Exploitation and Protection of Common Malicious Inputs to Online Applications 15.1 Introduction 15.2 SQL Injection 15.3 Cross Site Scripting 15.4 Cross Site Request Forgery 15.5 Command Injection 15.6 File Inclusion 15.7 Conclusion References 16 Ransomware: Threats, Identification and Prevention 16.1 Introduction 16.2 Types of Ransomwares 16.3 Ransomware Life Cycle 16.4 Detection Strategies 16.5 Analysis of Ransomware 16.6 Prevention Strategies 16.7 Ransomware Traits Analysis 16.8 Research Directions 16.9 Conclusion References Index End User License Agreement
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.