Applied Approach to Privacy and Security for the Internet of Things

Author: Chatterjee, Parag

Publisher: IGI Global

ISBN:

Category: Computers

Page: 295

View: 455

From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized units. This clearly portrays the importance of security and privacy in IoT, which should be strong enough to keep the entire platform and stakeholders secure and smooth enough to not disrupt the lucid flow of communication among IoT entities. Applied Approach to Privacy and Security for the Internet of Things is a collection of innovative research on the methods and applied aspects of security in IoT-based systems by discussing core concepts and studying real-life scenarios. While highlighting topics including malware propagation, smart home vulnerabilities, and bio-sensor safety, this book is ideally designed for security analysts, software security engineers, researchers, computer engineers, data scientists, security professionals, practitioners, academicians, and students seeking current research on the various aspects of privacy and security within IoT.

Blockchain Applications in IoT Security

Author: Patel, Harshita

Publisher: IGI Global

ISBN:

Category: Computers

Page: 275

View: 610

Like many other scientific innovations, scientists are looking to protect the internet of things (IoT) from unfortunate losses, theft, or misuse. As one of the current hot trends in the digital world, blockchain technology could be the solution for securing the IoT. Blockchain Applications in IoT Security presents research for understanding IoT-generated data security issues, existing security facilities and their limitations and future possibilities, and the role of blockchain technology. Featuring coverage on a broad range of topics such as cryptocurrency, remote monitoring, and smart computing, this book is ideally designed for security analysts, IT specialists, entrepreneurs, business professionals, academicians, researchers, students, and industry professionals seeking current studies on the limitations and possibilities behind competitive blockchain technologies.

Cyber Security of Industrial Control Systems in the Future Internet Environment

Author: Stojanovi?, Mirjana D.

Publisher: IGI Global

ISBN:

Category: Computers

Page: 374

View: 655

In today’s modernized market, many fields are utilizing internet technologies in their everyday methods of operation. The industrial sector is no different as these technological solutions have provided several benefits including reduction of costs, scalability, and efficiency improvements. Despite this, cyber security remains a crucial risk factor in industrial control systems. The same public and corporate solutions do not apply to this specific district because these security issues are more complex and intensive. Research is needed that explores new risk assessment methods and security mechanisms that professionals can apply to their modern technological procedures. Cyber Security of Industrial Control Systems in the Future Internet Environment is a pivotal reference source that provides vital research on current security risks in critical infrastructure schemes with the implementation of information and communication technologies. While highlighting topics such as intrusion detection systems, forensic challenges, and smart grids, this publication explores specific security solutions within industrial sectors that have begun applying internet technologies to their current methods of operation. This book is ideally designed for researchers, system engineers, managers, networkers, IT professionals, analysts, academicians, and students seeking a better understanding of the key issues within securing industrial control systems that utilize internet technologies.

Real-Time and Retrospective Analyses of Cyber Security

Author: Bird, David Anthony

Publisher: IGI Global

ISBN:

Category: Computers

Page: 267

View: 456

Society is continually transforming into a digitally powered reality due to the increased dependence of computing technologies. The landscape of cyber threats is constantly evolving because of this, as hackers are finding improved methods of accessing essential data. Analyzing the historical evolution of cyberattacks can assist practitioners in predicting what future threats could be on the horizon. Real-Time and Retrospective Analyses of Cyber Security is a pivotal reference source that provides vital research on studying the development of cybersecurity practices through historical and sociological analyses. While highlighting topics such as zero trust networks, geopolitical analysis, and cyber warfare, this publication explores the evolution of cyber threats, as well as improving security methods and their socio-technological impact. This book is ideally designed for researchers, policymakers, strategists, officials, developers, educators, sociologists, and students seeking current research on the evolution of cybersecurity methods through historical analysis and future trends.

Large-Scale Data Streaming, Processing, and Blockchain Security

Author: Saini, Hemraj

Publisher: IGI Global

ISBN:

Category: Computers

Page: 285

View: 590

Data has cemented itself as a building block of daily life. However, surrounding oneself with great quantities of information heightens risks to one’s personal privacy. Additionally, the presence of massive amounts of information prompts researchers into how best to handle and disseminate it. Research is necessary to understand how to cope with the current technological requirements. Large-Scale Data Streaming, Processing, and Blockchain Security is a collection of innovative research that explores the latest methodologies, modeling, and simulations for coping with the generation and management of large-scale data in both scientific and individual applications. Featuring coverage on a wide range of topics including security models, internet of things, and collaborative filtering, this book is ideally designed for entrepreneurs, security analysts, IT consultants, security professionals, programmers, computer technicians, data scientists, technology developers, engineers, researchers, academicians, and students.

Modern Theories and Practices for Cyber Ethics and Security Compliance

Author: Yaokumah, Winfred

Publisher: IGI Global

ISBN:

Category: Computers

Page: 302

View: 660

In today’s globalized world, businesses and governments rely heavily on technology for storing and protecting essential information and data. Despite the benefits that computing systems offer, there remains an assortment of issues and challenges in maintaining the integrity and confidentiality of these databases. As professionals become more dependent cyberspace, there is a need for research on modern strategies and concepts for improving the security and safety of these technologies. Modern Theories and Practices for Cyber Ethics and Security Compliance is a collection of innovative research on the concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber protection. While highlighting topics including database governance, cryptography, and intrusion detection, this book provides guidelines for the protection, safety, and security of business data and national infrastructure from cyber-attacks. It is ideally designed for security analysts, law enforcement, researchers, legal practitioners, policymakers, business professionals, governments, strategists, educators, and students seeking current research on combative solutions for cyber threats and attacks.

Impact of Digital Transformation on Security Policies and Standards

Author: Goundar, Sam

Publisher: IGI Global

ISBN:

Category: Computers

Page: 215

View: 627

Digital transformation is a revolutionary technology that will play a vital role in major industries, including global governments. These administrations are taking the initiative to incorporate digital programs with their objective being to provide digital infrastructure as a basic utility for every citizen, provide on demand services with superior governance, and empower their citizens digitally. However, security and privacy are major barriers in adopting these mechanisms, as organizations and individuals are concerned about their private and financial data. Impact of Digital Transformation on Security Policies and Standards is an essential research book that examines the policies, standards, and mechanisms for security in all types of digital applications and focuses on blockchain and its imminent impact on financial services in supporting smart government, along with bitcoin and the future of digital payments. Highlighting topics such as cryptography, privacy management, and e-government, this book is ideal for security analysts, data scientists, academicians, policymakers, security professionals, IT professionals, government officials, finance professionals, researchers, and students.

Handbook of Research on Multimedia Cyber Security

Author: Gupta, Brij B.

Publisher: IGI Global

ISBN:

Category: Computers

Page: 372

View: 392

Because it makes the distribution and transmission of digital information much easier and more cost effective, multimedia has emerged as a top resource in the modern era. In spite of the opportunities that multimedia creates for businesses and companies, information sharing remains vulnerable to cyber attacks and hacking due to the open channels in which this data is being transmitted. Protecting the authenticity and confidentiality of information is a top priority for all professional fields that currently use multimedia practices for distributing digital data. The Handbook of Research on Multimedia Cyber Security provides emerging research exploring the theoretical and practical aspects of current security practices and techniques within multimedia information and assessing modern challenges. Featuring coverage on a broad range of topics such as cryptographic protocols, feature extraction, and chaotic systems, this book is ideally designed for scientists, researchers, developers, security analysts, network administrators, scholars, IT professionals, educators, and students seeking current research on developing strategies in multimedia security.

Safety and Security Issues in Technical Infrastructures

Author: Rehak, David

Publisher: IGI Global

ISBN:

Category: Computers

Page: 499

View: 926

In the modern age of urbanization, the mass population is becoming progressively reliant on technical infrastructures. These industrial buildings provide integral services to the general public including the delivery of energy, information and communication technologies, and maintenance of transport networks. The safety and security of these structures is crucial as new threats are continually emerging. Safety and Security Issues in Technical Infrastructures is a pivotal reference source that provides vital research on the modernization of occupational security and safety practices within information technology-driven buildings. While highlighting topics such as explosion process safety, nanotechnology, and infrastructural risk analysis, this publication explores current risks and uncertainties and the raising of comprehensive awareness for experts in this field. This book is ideally designed for security managers, safety personnel, civil engineers, architects, researchers, construction professionals, strategists, educators, material scientists, property owners, and students.

Handbook of Research on Intrusion Detection Systems

Author: Gupta, Brij B.

Publisher: IGI Global

ISBN:

Category: Computers

Page: 407

View: 590

Businesses in today’s world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects of prominent and effective techniques used to detect and contain breaches within the fields of data science and cybersecurity. Featuring coverage on a broad range of topics such as botnet detection, cryptography, and access control models, this book is ideally designed for security analysts, scientists, researchers, programmers, developers, IT professionals, scholars, students, administrators, and faculty members seeking research on current advancements in network security technology.