Securing the Digital Frontier
Threats and Advanced Techniques in Security and Forensics
2 243 kr
Beställningsvara. Skickas inom 7-10 vardagar. Fri frakt över 249 kr.
Beskrivning
Produktinformation
- Utgivningsdatum:2025-06-01
- Format:Inbunden
- Språk:Engelska
- Antal sidor:416
- Förlag:John Wiley & Sons Inc
- ISBN:9781394268887
Utforska kategorier
Mer om författaren
Kavita Sharma, PhD, is a professor in the Department of Computer Science and Engineering at Galgotias College of Engineering and Technology, Greater Noida, India with over 12 years of research and academic experience. She has also been awarded a research fellowship from the Ministry of Electronics and Information Technology from the Government of India. Additionally, she has four patents (one granted and three published) and one granted design and has published seven books and 45 research articles in international journals and conferences of high repute. Vishnu Sharma, PhD, is the Head of Department and a professor in the Department of Computer Science and Engineering at Galgotias College of Engineering and Technology, Greater Noida, India with over 21 years of teaching experience. He has published over 50 research papers on mobile ad-hoc networks and mobile computing in national and international conferences and journals, as well as two books on mobile computing and advanced mobile computing. Additionally, he has organized several national and international conferences and workshops and serves as the editor of IEEE Conference ICCCA proceedings. Parma Nand, PhD, is the Dean of Academics at Sharda University, Greater Noida, India. He has over 26 years of teaching, industry, and research experience, emphasizing bridging the gap between academics and industry keeping in mind the growing IT industry in terms of futuristic technologies. Through his work, he has provided consultancy on a number of projects for industries and has delivered many invited and keynote talks at national and international conferences, workshops, and seminars in India and abroad. He has published more than 85 papers in peer-reviewed national and international journals and conferences, as well as two filed patents. Anil Kumar Sagar, PhD, is a professor in the Department of Computer Science and Engineering in the School of Engineering and Technology, Sharda University, India with over 20 years of experience in teaching, guiding ten Master’s of Technology and five doctoral candidates in computer science. He also serves as a member of the editorial boards and review committees for many national and international journals and has served as a program and organizing committee member for several conferences. Gulshan Shrivastava, PhD, is an associate professor in the Department of Computer Science and Engineering at Galgotias University, Greater Noida, India. He has five patents (four granted, one published) and 55 articles, books, and editorials in international journals and conferences of high repute. He also serves many reputed journals as a guest editor, editorial board member, international advisory board member, and reviewer board member and has delivered expert talks and guest lectures at numerous international conferences.
Innehållsförteckning
- Preface xix1 Pegasus—A Menace to Privacy and Security 1Raunaq Khurana and Shilpa Mahajan1.1 Introduction 11.2 Working of Pegasus 41.3 Literature Review 101.4 Methodologies 121.5 Pegasus Implantation Techniques 121.6 Mitigation Measures 131.7 Conclusion 142 Data Privacy and Compliance in Information Security 17Rakesh Nayak, Umashankar Ghugar, Praveen Gupta, Satyabrata Dash and Nishu Gupta2.1 Introduction 182.2 Discussion on Risks, Consequences, and Security Measures for Data Privacy 192.3 Data Privacy and Compliance in Information Security: The Changing Nature 282.4 Continuous Learning and Adaptation: Keeping Pace with Emerging Technologies and Regulations 312.5 Conclusion 323 Unveiling Cyber Threats and Digital Forensics 35Nidhi Gupta, Arpita Trivedi, Parveen P. Terang and Hasmat Malik3.1 Information Security 363.2 Cyberattacks 393.3 Protection Techniques 443.4 Internet of Medical Things 533.5 Conclusion 544 A Customised Privacy Preservation Mechanism for Cyber-Physical Systems 59Manas Kumar Yogi and A.S.N. Chakravarthy4.1 Introduction 594.2 Background 644.3 Motivation 734.4 Proposed Mechanism 764.5 Experimental Results 814.6 Future Directions 844.7 Conclusion 885 Securing the Future: Emerging Threats and Countermeasures in Cryptography 91Debosree Ghosh, Kishore Ghosh, Chandrima Chakraborty, Atanu Datta and Somsubhra Gupta5.1 Introduction 925.2 Quantum Computing and Post-Quantum Cryptography 925.3 Cryptanalysis: Cracking the Code 935.4 Side-Channel Attacks: Stealthy and Insidious 955.5 Fault Attacks: Exploiting Implementation Weaknesses 965.6 Hardware Security Modules (HSMS) 975.7 Secure Implementations: From Theory to Reality 995.8 A Holistic Approach to Cryptography 995.9 Quantum Key Distribution (QKD) 1005.10 Internet of Things in Cryptography 1025.11 Artificial Intelligence in Cryptography 1035.12 Cryptarithmetic 1045.13 The Road Ahead: Future Trends and Prospects 1055.14 Conclusion 1066 Cyber Threats and Its Impact on Electronic Transactions 109Ramalingam Dharmalingam and Vaishnavi Dharmalingam6.1 Introduction 1096.2 Digital Transformation and Cybersecurity 1116.3 Evolution of Cyber Threats 1126.4 Emerging Cyber Threats 1156.5 Impacts of Data Breaches in the Financial Sector 1216.6 Cybersecurity Standards, Frameworks, and Benchmarks 1246.7 Innovative Approaches to Cyber-Incident Management 1276.8 Conclusion 1297 A Robust Model for Enabling Insider Threat Detection and Prevention: Techniques, Tools, and Applications 133A. Sheik Abdullah, Shivansh Dhiman and Arif Ansari7.1 Introduction 1347.2 Structure 1357.3 Impact of Insider Threats on Modern Organizations 1377.5 Challenges in Insider Threat Detection 1427.6 Techniques for Insider Threat Detection 1447.7 Robust Model 1467.8 Application and Case Studies 1567.9 Other Important Insider Threat Prevention Strategies 1587.10 Ethical Considerations 1607.11 Future Trends 1637.12 Conclusion 1658 Digital Vulnerabilities Unveiled: A Multidisciplinary Exploration of Emerging Threats to Security and Privacy in the Age of Networked Communication 169Priya Sachdeva and Archan Mitra8.1 Introduction 1708.2 Theoretical Foundation 1728.3 Methodological Framework 1748.4 Emergent Themes 1768.5 Interdisciplinary Insights 1788.6 Pedagogical Implications 1798.7 Findings and Discussion 1818.8 Integration and Synthesis 1858.9 Conclusion 1879 Tools of Emancipation as Global Web and its Digital Ecosystem: Steering IoT Landscape, Cloud Computing Unravel Safe Spaces Lensing New Cyber Risks and Emerging Threats 197Bhupinder Singh and Christian Kaunert9.1 Introduction 1989.2 Tools of Emancipation on the World Wide Web: Conceptual Framework and Definition 2029.3 IoT Landscape and Its Overview: Opportunities and Challenges 2039.4 Cloud Computing: Pillar for Safe Spaces Protection 2049.5 Cyber Risks and Emerging Threats—Current Landscape of Cyber Threats 2069.6 Tools of Emancipation: Digital Tools for Positive Purposes and Potential for Using Technology 2079.7 Assimilating Tools of Emancipation, Cloud Computing, and IoT 2089.8 Embryonic Updated Technologies and Future Tendencies 2099.9 New Cyber Risks and Emerging Threats 2109.10 Conclusion and Future Scope 21210 IoT and Smart Device Security: Emerging Threats and Countermeasures 217Geo Francis E., S. Sheeja, Antony John E.F. and Jismy Joseph10.1 Introduction to IoT and Smart Devices 21710.2 Vulnerabilities in IoT Devices 22310.3 Emerging Threats in IoT Security 22610.4 Attack Vectors in IoT 22810.5 Countermeasures for IoT Security 23010.6 Case Studies in IoT Security 23210.7 Future Trends and Challenges in IoT Security 23610.8 Conclusion 23811 Secured IoT with LWC and Blockchain 243Srishti Priya Chaturvedi, Ajay Yadav, Santosh Kumar and Rahul Mukherjee11.1 Introduction 24411.2 Applications of IoT 25111.3 Different Security Attacks on IoT Layers 25411.4 Solution to IoT Security Attacks 25911.5 Conclusion 26512 Social Engineering Attacks: Detection and Prevention 269Rajat Singh, Priyanka Soni and Animaw Kerie12.1 Introduction 26912.2 Life Cycle of Social Engineering 27212.3 Types of Social Engineering 27412.4 Social Engineering Attacks Using Advanced Techniques 27712.5 Social Engineering Attack Detection Models 27812.6 Detection of Social Engineering Links 28112.7 Preventive Approaches 28212.8 Preventive Measures Against Social Engineering Attacks 28512.9 Conclusion 28613 Multilayer Perceptron of Occlusion and Pose-Sensitive Ear Attributes for Social Engineering Attack Mitigation 291O. Taiwo Olaleye, Oluwasefunmi Arogundade, Adebayo Abayomi-Alli, Wilson Ahiara, Temitope Ogunbiyi, Segun Akintunde, Segun Dada and Olalekan Okewale13.1 Introduction 29213.2 Literature Review 29513.3 Materials and Methods 29913.4 Result and Discussion 30513.5 Conclusion 31114 Study and Analysis of Cyberbullying Message Detection and Prevention Using Machine Learning Techniques 315S. Shanmugam, S. Gunasekaran and N. Anusha14.1 Introduction 31614.2 Literature Survey 31814.3 Implementation of Cyberbullying Model 32014.4 Evaluation and Comparison of Machine Learning Techniques for Cyber Bullying 32514.5 Conclusion 32915 Future Directions in Digital Forensics and Cybersecurity 333Elipe Arjun and Priyanka Singh15.1 Overview of Digital Forensics and Cyber Forensics 33315.2 Introduction 33515.3 Technologies and Their Impact 33715.4 Impact of Emerging Technologies on Digital Forensics and Cybersecurity 33815.5 Cybersecurity and Digital Forensics: Threats and Opportunities 34215.6 Future of Digital Forensics 34615.7 The Future of Cybersecurity 35015.8 Collaboration and Interdisciplinary Approaches 35315.9 Ethics and Human Factors in Future Digital Forensics and Cybersecurity 35615.10 Challenges and Opportunities of Digital and Cyber-Forensics 35915.11 Conclusion 36016 Tomorrow's Shields: Exploring Future Trends in Cyber Security and Forensics 367Mridu Sharma, Ravshish Kaur Kohli and Kunal Sharma16.1 Introduction 36816.2 Recent Digital Forensic Trends 36916.3 Threats Faced by Digital Forensics 37416.4 Opportunities 37816.5 Conclusion 382References 382Index 387
Du kanske också är intresserad av
Artificial Intelligence in Cyber-Physical Systems
Anil Kumar Sagar, Parma Nand, Neetesh Kumar, Sanjoy Das, Subrata Sahana
671 kr
New Age Analytics
Gulshan Shrivastava, Sheng-Lung Peng, Himani Bansal, Kavita Sharma, Meenakshi Sharma
1 818 kr
Forensic Investigations and Risk Management in Mobile and Wireless Communications
Kavita Sharma, Mitsunori Makino, Gulshan Shrivastava, Basant Agarwal
2 679 kr
Intelligent Networks
Vivek Kumar Singh, Anil Kumar Sagar, Parma Nand, Rani Astya, Omprakash Kaiwartya
2 155 kr
Emerging Threats and Countermeasures in Cybersecurity
Gulshan Shrivastava, Rudra Pratap Ojha, Shashank Awasthi, Himani Bansal, Kavita Sharma
2 481 kr
Internet of Healthcare Things
Kavita Sharma, Yogita Gigras, Vishnu Sharma, D. Jude Hemanth, Ramesh Chandra Poonia
944 kr
New Age Analytics
Gulshan Shrivastava, Sheng-Lung Peng, Himani Bansal, Kavita Sharma, Meenakshi Sharma
1 166 kr
Cryptocurrencies and Blockchain Technology Applications
Gulshan Shrivastava, Dac-Nhuong Le, Kavita Sharma
1 984 kr
Artificial Intelligence in Cyber-Physical Systems
Anil Kumar Sagar, Parma Nand, Neetesh Kumar, Sanjoy Das, Subrata Sahana
1 886 kr