- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
Cyber Security Threats and Challenges Facing Human Life provides a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain. This book offers detailed analysis of effective countermeasures and mitigations. The financial sector, healthcare, digital manufacturing, and social media are some of the important areas in which cyber-attacks are frequent and cause great harm. Hence, special emphasis is given to the study and analysis of cyber security challenges and countermeasures in those four important areas.
KEY FEATURES
• Discusses the prominence of cyber security in human life
• Discusses the significance of cyber security in the post-COVID-19 world
• Emphasizes the issues, challenges, and applications of cyber security mitigation methods in business and different sectors
• Provides comphrension of the impact of cyber security threats and challenges in digital manufacturing and the internet of things environment
• Offers understanding of the impact of big data breaches and future trends in data security
This book is primarily aimed at undergraduate students, graduate students, researchers, academicians, and professionals who are interested in exploring their research and knowledge in cyber security domain.
Contents
Section 1: Cyber Security Concepts and Application
1. Cyber security challenges in digital manufacturing and possible ways of mitigation. 2. An Efficient Proxy Signature based Authority Delegation Scheme for Medical Cyber Physical System. 3. The impact of COVID-19 Pandemic on cybersecurity issues of Healthcare domain: A scoping review. 4. Cyber Threats: A Fear over Industries
Section 2: Cyber Security and IoT
5. A comprehensive survey of existing security techniques in IoT protocol stack. 6. Impact of cyber security threats on IoT applications. 7. Need of Internet of Things (IoT) Forensics : Case Studies and Analysis
Section 3: Detection Techniques
8. A comparative analysis of tree based algorithms and application of XGBoost Classifier in Malware Detection. 9. An assessment on Game-based Cyber Defense strategy for SDN. 10. Smart Computing - Cyber Threats and Mitigation Techniques
Section 4: Cyber Security and Languages
11. SQL Injection Attacks on Indian Websites - A case study
Section 5: Cyber Security and its Future
12. Information Security Systems and its future. 13.Different Similarity Measures for Secure Name Matching in Record Linkage