Emerging Trends in ICT Security
1st Edition
Secure Checkout
Personal information is secured with SSL technology.Free Shipping
Free global shippingNo minimum order.
Table of Contents
Acknowledgments
Review Board
About the Editors
List of Contributors
Preface
Part 1: Information and Systems Security
Theory/Reviews of the Field
Chapter 1. System Security Engineering for Information Systems
Information in this chapter
Introduction
System security engineering history
Established system security engineering methods, processes, and tools
Modern and emerging system security engineering methods, processes, and tools
Conclusion
Recommendations
Disclaimer
Acknowledgments
References
Further reading
Chapter 2. Metrics and Indicators as Key Organizational Assets for ICT Security Assessment
Information in this chapter
Introduction
GOCAME strategy overview
Security evaluation for a web system: A proof of concept
Related work
Conclusion and future work
References
Chapter 3. A Fresh Look at Semantic Natural Language Information Assurance and Security: NL IAS from Watermarking and Downgrading to Discovering Unintended Inferences and Situational Conceptual Defaults
Information in this chapter
Introduction
Early breakthrough in NL IAS
A sketch of ontological semantic technology
Mature semantic NL IAS
Summary
Acknowledgments
References
Methods
Chapter 4. An Approach to Facilitate Security Assurance for Information Sharing and Exchange in Big-Data Applications
Information in this chapter
Introduction
UML extensions for XML security
Extensions for policy modeling and integration
Integrating local security policies into a global security policy
Related work
Conclusion
References
Chapter 5. Gamification of Information Security Awareness Training
Information in this chapter
Introduction
Literature review
Gamification system
Conclusion and future plans
Acknowledgments
References
Chapter 6. A Conceptual Framework for Information Security Awareness, Assessment, and Training
Information in this chapter
Introduction
Background and literature
Human factors and information security
Information security learning continuum
Dimensions of information security awareness
A field study
Concluding remarks
References
Further Reading
Chapter 7. Security Projects for Systems and Networking Professionals
Information in this chapter
Introduction
Background
Cryptography
Wireless network security
Conclusion
References
Further Reading
Case Study
Chapter 8. Assessing the Role of Governments in Securing E-Business: The Case of Jordan
Information in this chapter
Introduction
Literature review
Security in Jordan’s E-business initiatives: An analysis
Conclusion and recommendations
References
Part 2: Network and Infrastructure Security
Theory Reviews of the Field
Chapter 9. A Survey of Quantum Key Distribution (QKD) Technologies
Information in this chapter
Cryptography
Quantum key distribution
Quantum key distribution systems
The future of QKD
A military QKD usage scenario
Conclusion
Disclaimer
Acknowledgments
References
Chapter 10. Advances in Self-Security of Agent-Based Intrusion Detection Systems
Information in this chapter
Introduction
Overview
Framework for self-security, self-reliability and self-integrity of agent-based IDSs
Prototyping and extending IDS-NIDIA
Tests
Related works
Conclusion
Acknowledgments
References
Further reading
Chapter 11. Secure Communication in Fiber-Optic Networks
Information in this chapter
Introduction
Confidentiality
Privacy and optical steganography
Availability
Summary
References
Methods
Chapter 12. Advanced Security Network Metrics
Information in this chapter
Introduction
Related work
Method description
Metrics definition
Description of experiments
Results of experiments
Conclusion
References
Chapter 13. Designing Trustworthy Software Systems Using the NFR Approach
Information in this chapter
Introduction
The NFR approach
The Phoenix system and trustworthiness deficit
Application of the NFR approach for designing a trustworthy Phoenix system
Validation and lessons learned
Summary
Acknowledgments
References
Chapter 14. Analyzing the Ergodic Secrecy Rates of Cooperative Amplify-and-Forward Relay Networks over Generalized Fading Channels
Information in this chapter
Introduction
Secure cooperative wireless communications
Computational results
Conclusion
Appendix
References
Chapter 15. Algebraic Approaches to a Network-Type Private Information Retrieval
Information in this chapter
Introduction
The data processing scheme and statement of the problem
Algorithmic description of the solution
Algebraic description of the solution
Conclusion
Summary
References
Chapter 16. Using Event Reasoning for Trajectory Tracking
Information in this chapter
Introduction
Example
Event model
Scenario adapts
Event functions and inference rules
Experiments
Summary
Acknowledgments
References
Chapter 17. Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain
Information in this chapter
Introduction
Related works
Methodology
Conclusion
Acknowledgments
References
Chapter 18. Real-time Network Intrusion Detection Using Hadoop-Based Bayesian Classifier
Information in this chapter
Introduction
Overview on Hadoop based technologies
Survey of Intrusion Detection Systems
Hadoop-based real-time Intrusion Detection: System architecture
Practical application scenario and system evaluation
Summary
References
Chapter 19. Optimum Countermeasure Portfolio Selection: A Knapsack Approach
Information in this chapter
Introduction
The Knapsack problem and a dynamic programming solution
Problem description
The proposed binary knapsack-based approach and its dynamic programming algorithm
Computational example and comparison
Conclusion
References
Chapter 20. CSRF and Big Data: Rethinking Cross-Site Request Forgery in Light of Big Data
Information in this chapter
Introduction
SOP and CSRF
Motivation and related work
Defenses against CSRF: Server and browser Sides
Experiment results: CSRF in social media and networking sites
Analysis of test framework with popular Web/URL scanning tools
Conclusions and future work
References
Chapter 21. Security through Emulation-Based Processor Diversification
Information in this chapter
Introduction
Background and challenges
Proposed security approach
A case study: Web server
Experimentation and results
Discussion
Conclusions and future work
Acknowledgments
References
Chapter 22. On the Use of Unsupervised Techniques for Fraud Detection in VoIP Networks
Information in this chapter
Introduction
Background
Signature-based fraud detection
Experiments
Conclusion
References
Part 3: Mobile and Cloud Computing
Reviews of the Field
Chapter 23. Emerging Security Challenges in Cloud Computing, from Infrastructure-Based Security to Proposed Provisioned Cloud Infrastructure
Information in this chapter
Introduction
Background
Infrastructure security
Cloud service models
Provisioned access control infrastructure (DACI)
Conclusion
References
Methods
Chapter 24. Detection of Intent-Based Vulnerabilities in Android Applications
Information in this chapter
Introduction
Comparison to related work
Model definition and notations
Vulnerability modeling
Security testing methodology
Implementation and experimentation
Conclusion
Acknowledgments
References
Part 4: Cyber Crime and Cyber Terrorism
Theory
Chapter 25. A Quick Perspective on the Current State in Cybersecurity
Information in this chapter
Introduction
The scope of cybersecurity
Contributions
Understanding the scope of cybersecurity
Malware, the infectious disease, and phishing, the fraud
Vulnerabilities: The long exploitable holes
Data breach: A faulty containment
Cyber-war, the latest war front
Lessons learned
References
Chapter 26. A Paradigm Shift in Cyberspace Security
Information in this chapter
Introduction
Cyber-terrorism
A security paradigm shift in cyberspace
Intelligent agents in security auditing
Summary
References
Methods
Chapter 27. Counter Cyber Attacks By Semantic Networks
Information in this chapter
Introduction
Related work
Methodology
Experiments
Conclusion and future work
Acknowledgments
References
Chapter 28. Man-in-the-Browser Attacks in Modern Web Browsers
Information in this chapter
Introduction
Browser architecture
Man-in-the-browser attacks on different layers
Countermeasures
Conclusion
References
Chapter 29. Improving Security in Web Sessions: Special Management of Cookies
Information in this chapter
Introduction
Related work
Proposed mechanism for web session management
Implementation and experiments
Conclusion and further work
References
Chapter 30. Leveraging Semantic Web Technologies for Access Control
Information in this chapter
Introduction
Implementing RBAC with ontologies
Semantically extending the XACML attribute model
Ontology-based context awareness
Ontological specification of user preferences
Semantic access control in online social networks
DEMONS ontological access control model
Discussion
Acknowledgments
References
Chapter 31. Cyber Security Education: The Merits of Firewall Exercises
Information in this chapter
Introduction
Criteria for firewall education
Evaluation of firewall exercises
Satisfying the criteria
Emerging trends in firewall education
Conclusion
Acknowledgments
References
Case Study
Chapter 32. Surveillance without Borders: The Case of Karen Refugees in Sheffield
Information in this chapter
Introduction
Background
Methodological issues
Analyzing discourse
The hacking incident
“We are Watching You”: Analysis of discourse messages posted
Conclusion
Appendix
References
Further Reading
Part 5: Focus Topics: From Online Radicalisation to Online Financial Crime
Theory
Chapter 33. A Framework for the Investigation and Modeling of Online Radicalization and the Identification of Radicalized Individuals
Information in this chapter
Introduction
Systematic consideration of influencing factors: The radicalization-factor model
Identification of radicalized individuals: Behavioral indicators
Application of the framework
References
Chapter 34. Preventing Terrorism Together: A Framework to Provide Social Media Anti-Radicalization Training for Credible Community Voices
Information in this chapter
Introduction
Online radicalization
Collaboration in counter-terrorism
Credible voices
Conclusion
References
Methods
Chapter 35. Investigating Radicalized Individual Profiles through Fuzzy Cognitive Maps
Information in this chapter
Introduction
The radicalization process: How can it happen?
Investigating radical online profiles: A short overview of existing methods
Fuzzy cognitive mapping of factors for self-radicalization as an alternative approach
Conclusion
References
Chapter 36. Financial Security against Money Laundering: A Survey
Information in this chapter
Money laundering
Anti-money laundering efforts
Estimating the extent of ML
Data mining techniques for ML detection
Conclusion
References
Chapter 37. Intelligent Banking XML Encryption Using Effective Fuzzy Logic
Information in this chapter
Introduction
Literature review
System model and design
Experiments and results
Summary
References
Further Reading
Index
Description
Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider’s look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing.
Key Features
- Provides a multidisciplinary approach to security with coverage of communication systems, information mining, policy making, and management infrastructures
- Discusses deployment of numerous security solutions, including, cyber defense techniques and defense against malicious code and mobile attacks
- Addresses application of security solutions in real-life scenarios in several environments, such as social media, big data and crowd sourcing
Readership
Computing and software Engineering professionals, Network and Networking management professionals and those working in the area of Cyber Security and Cyber defence including ICT Practitioners and decision makers
Details
- No. of pages:
- 650
- Language:
- English
- Copyright:
- © Morgan Kaufmann 2014
- Published:
- 25th November 2013
- Imprint:
- Morgan Kaufmann
- Hardcover ISBN:
- 9780124114746
- eBook ISBN:
- 9780124104877
Reviews
"Contemporary threats to national security and neighborhood safety are increasingly non-physical. Those who seek to destroy citizen freedoms and liberties are harnessing the power of Information Communications Technologies which now require innovative solutions. This insightful volume fills an operational gap in understanding Information Communications Technologies and is a welcome introduction to tackling the security challenges which lie ahead."
- John D Parkinson OBE, Chair of Steering Group, Centre of Excellence in Terrorism, Resilience, Intelligence & Organised Crime Research (CENTRIC)
Ratings and Reviews
About the Editors
Babak Akhgar Editor
Babak Akhgar is Professor of Informatics and Director of CENTRIC (Center of Excellence in Terrorism, Resilience, Intelligence and Organized Crime Research) at Sheffield Hallam University (UK) and Fellow of the British Computer Society. He has more than 100 refereed publications in international journals and conferences on information systems with specific focus on knowledge management (KM). He is member of editorial boards of several international journals and has acted as Chair and Program Committee Member for numerous international conferences. He has extensive and hands-on experience in the development, management and execution of KM projects and large international security initiatives (e.g., the application of social media in crisis management, intelligence-based combating of terrorism and organized crime, gun crime, cyber-crime and cyber terrorism and cross cultural ideology polarization). In addition to this he is the technical lead of two EU Security projects: “Courage” on Cyber-Crime and Cyber-Terrorism and “Athena” onthe Application of Social Media and Mobile Devices in Crisis Management. He has co-edited several books on Intelligence Management.. His recent books are titled “Strategic Intelligence Management (National Security Imperatives and Information and Communications Technologies)”, “Knowledge Driven Frameworks for Combating Terrorism and Organised Crime” and “Emerging Trends in ICT Security”. Prof Akhgar is member of the academic advisory board of SAS UK.
Affiliations and Expertise
Professor of Informatics, Sheffield Hallam University, Sheffield, UK
Hamid Arabnia Editor
Hamid R. Arabnia is currently a Full Professor of Computer Science at University of Georgia where he has been since October 1987. His research interests include Parallel and distributed processing techniques and algorithms, interconnection networks, and applications in Computational Science and Computational Intelligence (in particular, in image processing, medical imaging, bioinformatics, and other computational intensive problems). Dr. Arabnia is Editor-in-Chief of The Journal of is Associate Editor of IEEE Transactions on Information Technology in Biomedicine . He has over 300 publications (journals, proceedings, editorship) in his area of research in addition he has edited two titles Emerging Trends in ICT Security (Elsevier 2013), and Advances in Computational Biology (Springer 2012).
Affiliations and Expertise
Professor of Computer Science, University of Georgia, Athens, GA, USA