Description
Cyber Security Threats and Challenges Facing Human Life provides a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain. This book offers detailed analysis of effective countermeasures and mitigations. The financial sector, healthcare, digital manufacturing, and social media are some of the important areas in which cyber-attacks are frequent and cause great harm. Hence, special emphasis is given to the study and analysis of cyber security challenges and countermeasures in those four important areas.
KEY FEATURES
• Discusses the prominence of cyber security in human life
• Discusses the significance of cyber security in the post-COVID-19 world
• Emphasizes the issues, challenges, and applications of cyber security mitigation methods in business and different sectors
• Provides comphrension of the impact of cyber security threats and challenges in digital manufacturing and the internet of things environment
• Offers understanding of the impact of big data breaches and future trends in data security
This book is primarily aimed at undergraduate students, graduate students, researchers, academicians, and professionals who are interested in exploring their research and knowledge in cyber security domain.
Table of Contents
Section 1: Cyber Security Concepts and Application
1. Cyber security challenges in digital manufacturing and possible ways of mitigation
Dr. Hari Vasudevan, Dr. Narendra M. Shekokar, Dr. Ramesh Rajguru, Dr. Rajendra Khavekar
2. An Efficient Proxy Signature based Authority Delegation Scheme for Medical Cyber Physical System
Dr. Aparna Bannore, Dr. Rachana Y. Patil, Dr. Satish R. Devane
3. The impact of COVID-19 Pandemic on cybersecurity issues of Healthcare domain: A scoping review
Minal Kalamkar, Rajesh Prasad
4. Cyber Threats: A Fear over Industries
Sagar Rane, Garima Devi, Sanjeev Wagh
Section 2: Cyber Security and IoT
5. A comprehensive survey of existing security techniques in IoT protocol stack
Smita Sanjay Ambarkar, Dr. Narendra Shekokar
6. Impact of cyber security threats on IoT applications
Aruna Gawade and Narendra M. Shekokar
7. Need of Internet of Things (IoT) Forensics : Case Studies and Analysis
Jazib Dawre, Ishita Kheria, Ramchandra Mangrulkar, Mangesh Ghonge
Section 3: Detection Techniques
8. A comparative analysis of tree based algorithms and application of XGBoost Classifier in Malware Detection
Govind Thakur, Shreya Nayak and Dr. Ramchandra Mangrulkar
9. An assessment on Game-based Cyber Defense strategy for SDN
Vaishali A. Shirsath, Dr. M.M. Chandane
10. Smart Computing – Cyber Threats and Mitigation TechniquesNilambari G. Narkar, Dr. Narendra M. Shekokar
Section 4: Cyber Security and Languages
11. SQL Injection Attacks on Indian Websites - A case study
Nilesh Yadav, Dr. Narendra M. Shekokar
Section 5: Cyber Security and its Future
12. Information Security Systems and its future
Sridhar Chandramohan Iyer and Dr. Narendra M. Shekokar
13. Different Similarity Measures for Secure Name Matching in Record Linkage
Vijay Maruti Shelake and Dr. Narendra M. Shekokar



