Share
Fr. 296.00
Mangesh M. Ghonge, Mangesh M. (Sandip Institute of Technology Ghonge, Mangesh M. Pramanik Ghonge, MM Ghonge, Dac-Nhuong Le, Ramchandra Mangrulkar...
Cyber Security and Digital Forensics - Challenges and Future Trends
English · Hardback
Shipping usually within 1 to 3 weeks (not available at short notice)
Description
CYBER SECURITY AND DIGITAL FORENSICS
Cyber security is an incredibly important issue that is constantly changing, with new methods, processes, and technologies coming online all the time. Books like this are invaluable to professionals working in this area, to stay abreast of all of these changes.
Current cyber threats are getting more complicated and advanced with the rapid evolution of adversarial techniques. Networked computing and portable electronic devices have broadened the role of digital forensics beyond traditional investigations into computer crime. The overall increase in the use of computers as a way of storing and retrieving high-security information requires appropriate security measures to protect the entire computing and communication scenario worldwide. Further, with the introduction of the internet and its underlying technology, facets of information security are becoming a primary concern to protect networks and cyber infrastructures from various threats.
This groundbreaking new volume, written and edited by a wide range of professionals in this area, covers broad technical and socio-economic perspectives for the utilization of information and communication technologies and the development of practical solutions in cyber security and digital forensics. Not just for the professional working in the field, but also for the student or academic on the university level, this is a must-have for any library.
Audience: Practitioners, consultants, engineers, academics, and other professionals working in the areas of cyber analysis, cyber security, homeland security, national defense, the protection of national critical infrastructures, cyber-crime, cyber vulnerabilities, cyber-attacks related to network systems, cyber threat reduction planning, and those who provide leadership in cyber security management both in public and private sectors
List of contents
Preface xvii
Acknowledgment xxvii
1 A Comprehensive Study of Security Issues and Research Challenges in Different Layers of Service-Oriented IoT Architecture 1
Ankur O. Bang, Udai Pratap Rao and Amit A. Bhusari
1.1 Introduction and Related Work 2
1.2 IoT: Evolution, Applications and Security Requirements 4
1.2.1 IoT and Its Evolution 5
1.2.2 Different Applications of IoT 5
1.2.3 Different Things in IoT 7
1.2.4 Security Requirements in IoT 8
1.3 Service-Oriented IoT Architecture and IoT Protocol Stack 10
1.3.1 Service-Oriented IoT Architecture 10
1.3.2 IoT Protocol Stack 11
1.3.2.1 Application Layer Protocols 12
1.3.2.2 Transport Layer Protocols 13
1.3.2.3 Network Layer Protocols 15
1.3.2.4 Link Layer and Physical Layer Protocols 16
1.4 Anatomy of Attacks on Service-Oriented IoT Architecture 24
1.4.1 Attacks on Software Service 24
1.4.1.1 Operating System-Level Attacks 24
1.4.1.2 Application-Level Attacks 25
1.4.1.3 Firmware-Level Attacks 25
1.4.2 Attacks on Devices 26
1.4.3 Attacks on Communication Protocols 26
1.4.3.1 Attacks on Application Layer Protocols 26
1.4.3.2 Attacks on Transport Layer Protocols 28
1.4.3.3 Attacks on Network Layer Protocols 28
1.4.3.4 Attacks on Link and Physical Layer Protocols 30
1.5 Major Security Issues in Service-Oriented IoT Architecture 31
1.5.1 Application - Interface Layer 32
1.5.2 Service Layer 33
1.5.3 Network Layer 33
1.5.4 Sensing Layer 34
1.6 Conclusion 35
References 36
2 Quantum and Post-Quantum Cryptography 45
Om Pal, Manoj Jain, B.K. Murthy and Vinay Thakur
2.1 Introduction 46
2.2 Security of Modern Cryptographic Systems 46
2.2.1 Classical and Quantum Factoring of A Large Number 47
2.2.2 Classical and Quantum Search of An Item 49
2.3 Quantum Key Distribution 49
2.3.1 BB84 Protocol 50
2.3.1.1 Proposed Key Verification Phase for BB84 51
2.3.2 E91 Protocol 51
2.3.3 Practical Challenges of Quantum Key Distribution 52
2.3.4 Multi-Party Quantum Key Agreement Protocol 53
2.4 Post-Quantum Digital Signature 53
2.4.1 Signatures Based on Lattice Techniques 54
2.4.2 Signatures Based on Multivariate Quadratic Techniques 55
2.4.3 Hash-Based Signature Techniques 55
2.5 Conclusion and Future Directions 55
References 56
3 Artificial Neural Network Applications in Analysis of Forensic Science 59
K.R. Padma and K.R. Don
3.1 Introduction 60
3.2 Digital Forensic Analysis Knowledge 61
3.3 Answer Set Programming in Digital Investigations 61
3.4 Data Science Processing with Artificial Intelligence Models 63
3.5 Pattern Recognition Techniques 63
3.6 ANN Applications 65
3.7 Knowledge on Stages of Digital Forensic Analysis 65
3.8 Deep Learning and Modelling 67
3.9 Conclusion 68
References 69
4 A Comprehensive Survey of Fully Homomorphic Encryption from Its Theory to Applications 73
Rashmi Salavi, Dr. M. M. Math and Dr. U. P. Kulkarni
4.1 Introduction 73
4.2 Homomorphic Encryption Techniques 76
4.2.1 Partial Homomorphic Encryption Schemes 77
4.2.2 Fully Homomorphic Encryption Schemes 78
4.3 Homomorphic Encryption Libraries 79
4.4 Computations on Encrypted Data 83
4.5 Applications of Homomorphic Encryption 85
About the author
Mangesh M. Ghonge, PhD, is currently working at Sandip Institute of Technology and Research Center, Nashik, Maharashtra, India. He authored or co-authored more than 60 published articles in prestigious journals, book chapters, and conference papers. He is also the author or editor of ten books and has organized and chaired many national and international conferences.
Sabyasachi Pramanik, PhD, is an assistant professor in the Department of Computer Science and Engineering, Haldia Institute of Technology, India. He earned his doctorate in computer science and engineering from the Sri Satya Sai University of Technology and Medical Sciences, Bhopal, India. He has many publications in various reputed international conferences, journals, and online book chapter contributions and is also serving as the editorial board member of many international journals. He is a reviewer of journal articles in numerous technical journals and has been a keynote speaker, session chair and technical program committee member in many international conferences. He has authored a book on wireless sensor networks and is currently editing six books for multiple publishers, including Scrivener Publishing.
Ramchandra Mangrulkar, PhD, is an associate professor in the Department of Computer Engineering at SVKM's Dwarkadas J. Sanghvi College of Engineering, Mumbai, Maharashtra, India. He has published 48 papers and 12 book chapters and presented significant papers at technical conferences. He has also chaired many conferences as a session chair and conducted various workshops and is also a ICSI-CNSS Certified Network Security Specialist. He is an active member on boards of studies in various universities and institutes in India.
Dac-Nhuong Le, PhD, is an associate professor and associate dean at Haiphong University, Vietnam. He earned his MSc and PhD in computer science from Vietnam National University, and he has over 20 years of teaching experience. He has over 50 publications in reputed international conferences, journals and online book chapter contributions and has chaired numerous international conferences. He has served on numerous editorial boards for scientific and technical journals and has authored or edited over 15 books by various publishers, including Scrivener Publishing.
Product details
Authors | Mangesh M. Ghonge, Mangesh M. (Sandip Institute of Technology Ghonge, Mangesh M. Pramanik Ghonge, MM Ghonge, Dac-Nhuong Le, Ramchandra Mangrulkar, Sabyasachi Pramanik, Sabyasachi (Haldia Institute of Technolo Pramanik |
Assisted by | Mangesh M. Ghonge (Editor), Dac-Nhuong Le (Editor), Ramchandra Mangrulkar (Editor), Ramchandra Mangrulkar et al (Editor), Sabyasachi Pramanik (Editor) |
Publisher | Wiley, John and Sons Ltd |
Languages | English |
Product format | Hardback |
Released | 31.12.2021 |
EAN | 9781119795636 |
ISBN | 978-1-119-79563-6 |
No. of pages | 432 |
Series |
Advances in Cyber Security |
Subjects |
Natural sciences, medicine, IT, technology
> IT, data processing
> IT
Chemie, Computersicherheit, Informatik, computer science, Cybersecurity, Computerforensik, chemistry, Computer Security & Cryptography, Computersicherheit u. Kryptographie, Analytische Chemie / Forensik, Forensics |
Customer reviews
No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.
Write a review
Thumbs up or thumbs down? Write your own review.