Multidisciplinary Approach to Modern Digital Steganography

Author: Pramanik, Sabyasachi

Publisher: IGI Global

ISBN:

Category: Computers

Page: 380

View: 158

Steganography is the art of secret writing. The purpose of steganography is to hide the presence of a message from the intruder by using state-of-the-art methods, algorithms, architectures, models, and methodologies in the domains of cloud, internet of things (IoT), and the Android platform. Though security controls in cloud computing, IoT, and Android platforms are not much different than security controls in an IT environment, they might still present different types of risks to an organization than the classic IT solutions. Therefore, a detailed discussion is needed in case there is a breach in security. It is important to review the security aspects of cloud, IoT, and Android platforms related to steganography to determine how this new technology is being utilized and improved continuously to protect information digitally. The benefits and challenges, along with the current and potential developments for the future, are important keystones in this critical area of security research. Multidisciplinary Approach to Modern Digital Steganography reviews the security aspects of cloud, IoT, and Android platforms related to steganography and addresses emerging security concerns, new algorithms, and case studies in the field. Furthermore, the book presents a new approach to secure data storage on cloud infrastructure and IoT along with including discussions on optimization models and security controls that could be implemented. Other important topics include data transmission, deep learning techniques, machine learning, and both image and text stenography. This book is essential for forensic engineers, forensic analysts, cybersecurity analysts, cyber forensic examiners, security engineers, cybersecurity network analysts, cyber network defense analysts, and digital forensic examiners along with practitioners, researchers, academicians, and students interested in the latest techniques and state-of-the-art methods in digital steganography.

Cyber Security and Network Security

Author: Sabyasachi Pramanik

Publisher: John Wiley & Sons

ISBN:

Category: Computers

Page: 320

View: 670

CYBER SECURITY AND NETWORK SECURITY Written and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other professionals. Digital assaults are quickly becoming one of the most predominant issues on the planet. As digital wrongdoing keeps on expanding, it is increasingly more important to investigate new methodologies and advances that help guarantee the security of online networks. Ongoing advances and innovations have made great advances for taking care of security issues in a methodical manner. In light of this, organized security innovations have been delivered so as to guarantee the security of programming and correspondence functionalities at fundamental, improved, and engineering levels. This outstanding new volume covers all of the latest advances, innovations, and developments in practical applications for cybersecurity and network security. This team of editors represents some of the most well-known and respected experts in the area, creating this comprehensive, up-to-date coverage of the issues of the day and state of the art. Whether for the veteran engineer or scientist or a student, this volume is a must-have for any library.

Handbook of Research on Advancing Cybersecurity for Digital Transformation

Author: Sandhu, Kamaljeet

Publisher: IGI Global

ISBN:

Category: Computers

Page: 460

View: 801

Cybersecurity has been gaining serious attention and recently has become an important topic of concern for organizations, government institutions, and largely for people interacting with digital online systems. As many individual and organizational activities continue to grow and are conducted in the digital environment, new vulnerabilities have arisen which have led to cybersecurity threats. The nature, source, reasons, and sophistication for cyberattacks are not clearly known or understood, and many times invisible cyber attackers are never traced or can never be found. Cyberattacks can only be known once the attack and the destruction have already taken place long after the attackers have left. Cybersecurity for computer systems has increasingly become important because the government, military, corporate, financial, critical infrastructure, and medical organizations rely heavily on digital network systems, which process and store large volumes of data on computer devices that are exchanged on the internet, and they are vulnerable to “continuous” cyberattacks. As cybersecurity has become a global concern, it needs to be clearly understood, and innovative solutions are required. The Handbook of Research on Advancing Cybersecurity for Digital Transformation looks deeper into issues, problems, and innovative solutions and strategies that are linked to cybersecurity. This book will provide important knowledge that can impact the improvement of cybersecurity, which can add value in terms of innovation to solving cybersecurity threats. The chapters cover cybersecurity challenges, technologies, and solutions in the context of different industries and different types of threats. This book is ideal for cybersecurity researchers, professionals, scientists, scholars, and managers, as well as practitioners, stakeholders, researchers, academicians, and students interested in the latest advancements in cybersecurity for digital transformation.

Handbook of Research on Evolving Designs and Innovation in ICT and Intelligent Systems for Real-World Applications

Author: Sarma, Kandarpa Kumar

Publisher: IGI Global

ISBN:

Category: Computers

Page: 333

View: 876

The relentless advances in all areas of information and communication technology, intelligent systems, and related domains have continued to drive innovative research. Most of these works have attempted to contribute in some form towards improving human life in general and have become indispensable elements of our day-to-day lives. The evolution continues at an accelerated pace while the world faces innumerable challenges and rapid advances in artificial intelligence, wireless communication, sensors, cloud and edge computing, and biomedical sciences. These advances must be documented and studied further in order to ensure society’s continual development. The Handbook of Research on Evolving Designs and Innovation in ICT and Intelligent Systems for Real-World Applications disseminates details of works undertaken by various groups of researchers in emerging areas related to information and communication technology, electronics engineering, intelligent systems, and allied disciplines with real-world applications. Covering a wide range of topics such as augmented reality and wireless sensor networks, this major reference work is ideal for industry professionals, researchers, scholars, practitioners, academicians, engineers, instructors, and students.

Modern Day Surveillance Ecosystem and Impacts on Privacy

Author: Mitra, Ananda

Publisher: IGI Global

ISBN:

Category: Computers

Page: 242

View: 354

The notion of surveillance has become increasingly more crucial in public conversation as new tools of observation are obtained by many different players. The traditional notion of “overseeing” is being increasingly replaced by multi-level surveillance where many different actors, at different levels of hierarchy, from the child surveilling the parent to the state surveilling its citizens, are entering the surveillance theater. This creates a unique surveillance ecosystem where the individual is observed not only as an analog flesh-and-blood body moving through real spaces such as a shopping mall, but also tracked as a data point where the volume of data is perpetually and permanently expanding as the digital life story is inscribed in the digital spaces. The combined narrative of the individual is now under surveillance. Modern Day Surveillance Ecosystem and Impacts on Privacy navigates the reader through an understanding of the self as a narrative element that is open for observation and analysis. This book provides a broad-based and theoretically grounded look at the overall processes of surveillance in a global system. Covering topics including commodity, loss of privacy, and big data, this text is essential for researchers, government officials, policymakers, security analysts, lawmakers, teachers, professors, graduate and undergraduate students, practitioners, and academicians interested in communication, technology, surveillance, privacy, and more.

Achieving Full Realization and Mitigating the Challenges of the Internet of Things

Author: Odhiambo, Marcel Ohanga

Publisher: IGI Global

ISBN:

Category: Computers

Page: 263

View: 995

As the internet of things market is booming, several issues are delaying the full realization of the technology. Currently, business competitors are jockeying for a piece of the market, meaning solutions from researchers that address these issues is crucial for internet of things technology developers. Overpromising followed by underdelivering has been the current approach by many innovators, and the mismatch results in losses in production, orphaned technologies, and frequent system failures. Solutions that address internet of things performance issues must be studied in order to take full advantage of this emerging market. Achieving Full Realization and Mitigating the Challenges of the Internet of Things addresses the challenges faced in rolling out internet of things technologies as well as the various performance issues. Covering a range of topics such as cybersecurity and connectivity issues, this reference work is ideal for industry professionals, academicians, researchers, practitioners, technology developers, instructors, and students.

Advances in Malware and Data-Driven Network Security

Author: Gupta, Brij B.

Publisher: IGI Global

ISBN:

Category: Computers

Page: 304

View: 653

Every day approximately three-hundred thousand to four-hundred thousand new malware are registered, many of them being adware and variants of previously known malware. Anti-virus companies and researchers cannot deal with such a deluge of malware – to analyze and build patches. The only way to scale the efforts is to build algorithms to enable machines to analyze malware and classify and cluster them to such a level of granularity that it will enable humans (or machines) to gain critical insights about them and build solutions that are specific enough to detect and thwart existing malware and generic-enough to thwart future variants. Advances in Malware and Data-Driven Network Security comprehensively covers data-driven malware security with an emphasis on using statistical, machine learning, and AI as well as the current trends in ML/statistical approaches to detecting, clustering, and classification of cyber-threats. Providing information on advances in malware and data-driven network security as well as future research directions, it is ideal for graduate students, academicians, faculty members, scientists, software developers, security analysts, computer engineers, programmers, IT specialists, and researchers who are seeking to learn and carry out research in the area of malware and data-driven network security.

NATO and the Future of European and Asian Security

Author: Christensen, Carsten Sander

Publisher: IGI Global

ISBN:

Category: Political Science

Page: 331

View: 832

The key role in the security policy of the North Atlantic Treaty Organization (NATO) is to prevent new types of asymmetric challenges and deal with the new architecture of the Euro-Atlantic security environment, including the control of weapons of mass destruction. In modern international politics, the growing militaristic policies of the states have created many dangers and raised the need for NATO to address new issues that the Alliance did not face during the Cold War. NATO and the Future of European and Asian Security reflects on difficult geopolitical and geostrategic conditions and reviews how new types of warfare have a drastic impact on NATO’s military and defense doctrine. This book provides the newest data and theories and contributes to the understanding of the transformation of the regional security environment in the aegis of the Euro-Atlantic. Covering topics including foreign policy, global security, hybrid warfare, securitization, and smart defense, this book is essential for government officials, policymakers, public relations officers, military and defense agencies, teachers, historians, political scientists, security analysts, national security professionals, administrators, government organizations, researchers, academicians, and students.

Computational Intelligence Techniques for Green Smart Cities

Author: Mohamed Lahby

Publisher: Springer Nature

ISBN:

Category: Science

Page: 419

View: 107

This book contains high-quality and original research on computational intelligence for green smart cities research. In recent years, the use of smart city technology has rapidly increased through the successful development and deployment of Internet of Things (IoT) architectures. The citizens' quality of life has been improved in several sensitive areas of the city, such as transportation, buildings, health care, education, environment, and security, thanks to these technological advances Computational intelligence techniques and algorithms enable a computational analysis of enormous data sets to reveal patterns that recur. This information is used to inform and improve decision-making at the municipal level to build smart computational intelligence techniques and sustainable cities for their citizens. Machine intelligence allows us to identify trends (patterns). The smart city could better integrate its transportation network, for example. By offering a better public transportation network adapted to the demand, we could reduce personal vehicles and energy consumption. A smart city could use models to predict the consequences of a change, such as pedestrianizing a street or adding a bike lane. A city can even create a 3D digital twin to test hypothetical projects. This book comprises many state-of-the-art contributions from scientists and practitioners working in machine intelligence and green smart cities. It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this area or those interested in grasping its diverse facets and exploring the latest advances in machine intelligence for green and sustainable smart city applications.

Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention

Author: Conteh, Nabie Y.

Publisher: IGI Global

ISBN:

Category: Computers

Page: 168

View: 343

As personal data continues to be shared and used in all aspects of society, the protection of this information has become paramount. While cybersecurity should protect individuals from cyber-threats, it also should be eliminating any and all vulnerabilities. The use of hacking to prevent cybercrime and contribute new countermeasures towards protecting computers, servers, networks, web applications, mobile devices, and stored data from black hat attackers who have malicious intent, as well as to stop against unauthorized access instead of using hacking in the traditional sense to launch attacks on these devices, can contribute emerging and advanced solutions against cybercrime. Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention is a comprehensive text that discusses and defines ethical hacking, including the skills and concept of ethical hacking, and studies the countermeasures to prevent and stop cybercrimes, cyberterrorism, cybertheft, identity theft, and computer-related crimes. It broadens the understanding of cybersecurity by providing the necessary tools and skills to combat cybercrime. Some specific topics include top cyber investigation trends, data security of consumer devices, phases of hacking attacks, and stenography for secure image transmission. This book is relevant for ethical hackers, cybersecurity analysts, computer forensic experts, government officials, practitioners, researchers, academicians, and students interested in the latest techniques for preventing and combatting cybercrime.