Название: Cyber Security for Next-Generation Computing Technologies Автор: Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda Издательство: CRC Press Год: 2024 Страниц: 328 Язык: английский Формат: pdf (true) Размер: 11.5 MB
This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations. With everything becoming increasingly interconnected via the Internet, data security becomes paramount. As technology advances, people need to secure their data communication processes. Personal data security, including data integrity and confidentiality, is particularly vulnerable. Therefore, the concept of cyber security forensics emerges to ensure data security for everyone, addressing issues such as data control, hijacking, and threats to personal devices such as mobile phones, laptops, and other smart technologies. This book covers key topics related to cyber security in next-generation computing technologies, ultimately enhancing the quality of life for citizens, facilitating interaction with smart governments, and promoting secure communication processes.
The feld of cyber security has recently gained signifcant importance as the challenge of securing information transmission becomes crucial. The advent of smart IT infrastructure has revolutionized the global landscape, but it has also brought forth security concerns. Consequently, cyber crimes have witnessed a steady rise over time, involving activities such as identity theft, bullying, terrorism, and network disruptions. In this smart world, privacy and security have become indispensable for individuals. Fortunately, the next generation of computing technologies, including IoT/IoE, Artifcial Intelligence, Machine Learning, Deep Learning, smart grid, ad hoc networks, SDN, network security, big data, image processing, and green communication, offers potential solutions.
Chapter 1 provides an overview of cyber security, exploring its impact on businesses and analyzing recent trends and future solutions. Chapter 2 focuses on security and intelligent management to ensure system safety. Chapter 3 presents a comprehensive study of machine learning (ML) and deep learning (DL) techniques for detecting potential cyber attacks, while Chapter 4 surveys AI-based applications, intrusion detection systems (IDS), cyber attacks on IoT networks, and AI tools.
Chapter 5 aims to investigate the tactics and motivations of cyber threat actors in the current cyber security landscape, while Chapter 6 conducts a detailed review of security threats and attacks across different layers of IoT systems. Chapter 7 demonstrates how an intrusion detection system using AI and ML can function effectively out of the box, and Chapter 8 provides a detailed survey on signature-based IDS for IoT environments. In Chapter 9, a hybrid model is proposed for identifying attacks on IoT-enabled smart cities.
Chapter 10 offers an overview of cyber security in edge/fog computing applications, highlighting potential risks, common attack vectors, and best practices for security. Chapter 11 explores various cyber security attacks targeting intelligent transportation systems (ITS), including phishing attacks, malware, remote access, denial of service (DoS) attacks, physical attacks, insider threats, and social engineering. Chapter 12 presents a comprehensive survey of security attacks in UAV networks and other intelligent transportation systems, while Chapter 13 conducts a comparative study of machine learning techniques to investigate trust in IoT-based aerial ad hoc networks.
Chapter 14 delves into the applications of blockchain technology in cyber security and the security solutions it offers, while Chapter 15 expands on blockchain concepts, components, architecture, features, types, and limitations. Lastly, Chapter 16 focuses on human activity recognition problems from a cyber security perspective, proposing a novel method for accurate human activity recognition through different algorithms.
Key features:
• Highlights innovative principles and practices using next generation computing technologies based cybersecurity. • Presents an introduction to recent trends regarding the convergence of AI/ML in cybersecurity • Offers an overview of theoretical, practical, simulation concepts of cybersecurity
Скачать Cyber Security for Next-Generation Computing Technologies
Security of Cloud-based Systems Название: Security of Cloud-based Systems Автор: Jovan Pehcevski Издательство: Arcler Press Год: 2021 Страниц: 434 Язык: английский Формат: pdf...
The Pocket Guide to Cyber Security Название: The Pocket Guide to Cyber Security Автор: Usha D., James H. Издательство: Amazon.com Services LLC Год: 2020 Язык: английский Формат:...