<p>A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise</p> <p><b>Overview</b></p> <ul> <li>Learn sample forms and process flows for quick and easy use.</li> <li>An easy-to-follow reference for implementing information security in the enterpri
Security Analytics: A Data Centric Approach to Information Security
β Scribed by Mehak Khurana, Shilpa Mahajan
- Publisher
- CRC Press/Chapman & Hall
- Year
- 2022
- Tongue
- English
- Leaves
- 236
- Series
- Chapman & Hall/CRC Cyber-Physical Systems
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
The book gives a comprehensive overview of security issues in cyber physical systems by examining and analyzing the vulnerabilities. It also brings current understanding of common web vulnerabilities and its analysis while maintaining awareness and knowledge of contemporary standards, practices, procedures and methods of Open Web Application Security Project. This book is a medium to funnel creative energy and develop new skills of hacking and analysis of security and expedites the learning of the basics of investigating crimes, including intrusion from the outside and damaging practices from the inside, how criminals apply across devices, networks, and the internet at large and analysis of security data.
Features
- Helps to develop an understanding of how to acquire, prepare, visualize security data.
- Unfolds the unventured sides of the cyber security analytics and helps spread awareness of the new technological boons.
- Focuses on the analysis of latest development, challenges, ways for detection and mitigation of attacks, advanced technologies, and methodologies in this area.
- Designs analytical models to help detect malicious behaviour.
The book provides a complete view of data analytics to the readers which include cyber security issues, analysis, threats, vulnerabilities, novel ideas, analysis of latest techniques and technology, mitigation of threats and attacks along with demonstration of practical applications, and is suitable for a wide-ranging audience from graduates to professionals/practitioners and researchers.
β¦ Table of Contents
Cover
Half Title
Series Page
Title Page
Copyright Page
Table of Contents
Preface
Editors
Contributors
Chapter 1: A Reliable Blockchain Application for Music in a Decentralized Network
1.1 Introduction
1.1.1 Need of Change in Music Industry
1.1.2 Challenges Faced by the Music Industry
1.2 Introduction to Blockchain
1.3 Blockchain Technologies
1.3.1 Smart Contracts
1.3.2 Ethereum
1.4 Framework for Royalty Distribution Using Blockchain
1.5 Implementation and Results
1.6 Future Research Prospects
1.6.1 Universal Music Database
1.6.2 Digital Content Distribution and Licensing
1.6.3 Affordable Music Sampling
1.7 Drawbacks
1.8 Conclusion
References
Chapter 2: An Authentic Data-Centric Application for Medical Stores
2.1 Introduction
2.1.1 Purpose
2.1.2 Intended Audience
2.1.3 Product Scope
2.1.4 Tech Stack Description
2.1.5 Existing System
2.2 Literature Survey
2.3 Proposed Methodology for a Data-Centric Approach in Medical Stores
2.3.1 Implementation of Intelligent Pharmacy Application
2.3.2 Results and Discussion
2.4 Conclusion
References
Chapter 3: Intelligent Data-Analytic Approach for Restaurant Recommendation
3.1 Introduction to Machine Learning
3.2 Related Work
3.2.1 Exploring Venue Popularity
3.2.2 Software Fault Prediction
3.2.3 Temperature and Humidity Data Analysis
3.2.4 Educational Data Mining for Prediction of Student Performance
3.2.5 Crime Prediction and Forecasting
3.2.6 Ship Trajectory Prediction
3.2.7 Incident Analysis and Prediction
3.2.8 Cross-Validation of Protein Structural Class Prediction
3.3 Research Methodology β from Collecting Data to Suggesting Places
3.3.1 Data Sources (Our Data Points)
3.3.2 Analysis of the Venues Retrieved (Formatting and Cleaning)
3.3.3 Some Venues Have Been Replaced with New Venues
3.3.4 Clustering β Finding Similar Places
3.3.5 K-Means Clustering β the Hot Approach
3.4 Result and Analysis
3.4.1 Categories β Types of Restaurants
3.4.2 Average Rating for the Places
3.4.3 Average Price Per Person of Venues
3.5 Conclusion
References
Chapter 4: Investigation on Mobile Forensics Tools to Decode Cyber Crime
4.1 Introduction to Mobile Forensics: Process and Methodology
4.2 Preservation of Evidences in Mobile Device
4.3 Acquisition from Mobile Device
4.4 Examination and Analysis: Tools and Techniques
4.5 SIM Forensics and Reporting of Evidences
4.6 Conclusion
References
Chapter 5: Investigation of Feeding Strategies in Microstrip Patch Antenna for Various Applications
5.1 Introduction
5.2 Microstrip Patch Antennas
5.3 Electromagnetic Bandgap Structure
5.4 Metamaterial Structure
5.5 Multiple Input and Multiple Output (MIMO) Systems
5.6 Techniques of Microstrip Patch Antennas
5.7 Advantages and Disadvantages
5.8 Applications
5.9 Tools of Microstrip Patch Antenna
5.10 Parameters of Microstrip Patch Antenna
5.11 Conclusion
References
Chapter 6: Optical Encryption of Images Using Partial Pivoting Lower Upper Decomposition Based on Two Structured Deterministic Phase Masks in the Hybrid Transform Domain
6.1 Introduction
6.2 Theoretical Background
6.2.1 Discrete Cosine Transform
6.2.2 Fractional Fourier Transform
6.2.3 Structured Deterministic Phase Mask
6.3 Proposed Cryptosystem
6.4 Simulation and Evaluation
6.4.1 Statistical Analysis
6.4.2 Attack Analysis
6.4.3 NPCR and UACI Analysis
6.4.4 Key Sensitivity Analysis
6.5 Performance Comparison
6.6 Conclusion
References
Chapter 7: A Comparative Analysis of Blockchain Integrated IoT Applications
7.1 Introduction
7.2 Introduction to Internet of Things
7.2.1 IoT Architecture
7.2.2 Challenges in IoT
7.3 Introduction to Blockchain
7.3.1 Important Features of Blockchain
7.3.2 Types of Blockchain Models
7.3.3 Blockchain Benefits
7.3.4 Technology for Secure Blockchain Architecture
7.4 Integration of Blockchain and IoT
7.4.1 Advantages of Using Blockchain IoT
7.5 Analysis of Various IoT Applications with Blockchain
7.5.1 Supply Chain
7.5.2 Ride Hiring System
7.5.3 Solar Energy
7.5.4 Printing Machine
7.5.5 Home Space
7.5.6 Waste Management
7.5.7 Agriculture System
7.5.8 Healthcare System
7.5.9 Miscellaneous Applications
7.5.10 Application Implementation
7.5.11 Analysis of Blockchain Integrated IoT Applications
7.6 Conclusion and Summary
References
Chapter 8: Blockchain: A New Power-Driven Technology for Smart Cities
8.1 Introduction: Background and Driving Forces
8.2 Solar Energy Smart Grid Powered with Blockchain
8.3 Feedback and Opinion Gathering with Blockchain
8.4 Conducting Elections and Referendums
8.5 Citizen Rating Based on Environmental Awareness
8.6 Secure Storage of Private and Sensitive Data of Citizens
8.7 Generating New Streams of Income for Local Administrative and Municipal Bodies
8.8 Blockchain-Based Universal Identification
8.9 Education
8.10 Healthcare
8.11 Parking Management
8.12 Resource Management
8.13 Resource Management
8.14 Limitation of Blockchain
8.15 Conclusion
References
Chapter 9: Mutual Surf-Scaling Factor Features Analysis for Detecting DDoS Attacks Based on LatticeΒ Behavioral Using Spread Spectral Soft-Max-Recurrent Neural Networks
9.1 Introduction
9.2 Related Work
9.3 Mutual Surf-Scaling Factor Features Analysis for Detecting DDoS Attacks
9.3.1 Data Preprocessing
9.3.2 Lattice Behavioral Access Rate (LBAW)
9.3.3 Social Spider Comp Feature Section (S2CFS)
9.3.4 Mutual Scaling Features and Ranking
9.3.5 Soft-Max Logical Activation Function (SmLAF)
9.3.6 Spread Spectral Recurrent Neural Network (S2RNN)
9.4 Result and Discussion
9.5 Conclusion
References
Chapter 10: Provably Secure Role Delegation Scheme for Medical Cyber-Physical Systems
10.1 Introduction
10.1.1 Proxy Signature Technique
10.1.2 Forward-Secure Technique
10.2 Related Work
10.2.1 Case Study
10.3 Framework for Proposed Methodology
10.3.1 The Proposed PB-FSPS Algorithm
Setup Phase
System Initialization/Define Public Parameters
Warrant Generation Phase
Warrant Verification Phase
Forward-Secure Proxy Key Generation
Forward-Secure Proxy Signature Generation
Forward-Secure Proxy Signature Verification
Correctness of Proposed Algorithm
10.4 Protocol Analysis Using BAN Logic
10.4.1 Idealized Protocol
10.4.2 Initial Assumptions
10.4.3 Goals
10.4.4 Protocol Analysis
Consider Message 2
Consider Message 3
10.5 Simulation Study of PB-FSPS
10.6 Conclusion
References
Chapter 11: FRAME Routing to Handle Security Attacks in Wireless Sensor Networks
11.1 Introduction
11.2 Literature Survey
11.3 FRAME Routing Algorithm
11.3.1 FRAME Routing
11.3.2 Bayesian Network
11.4 Results and Discussion
11.4.1 AODV Without Attacks
11.4.2 AODV with Attacks
11.4.3 FRAME Without Attacks
11.4.4 FRAME with Attacks
11.5 Conclusion
11.5.1 Summary of the Work
11.5.2 Performance Analysis and Conclusion
11.5.3 Future Scope
References
Chapter 12: A Blockchain Security Management Based on Rehashing Shift Code Rail Encryption Using Circular Shift Round Random Padding Key for Decentralized Cloud Environment
12.1 Introduction
12.2 Related Work
12.3 Problem Consideration
12.4 Materials and Methods for Improved Blockchain Security
12.5 Hyperledger Transaction Security
12.6 Smart Contracting Security
12.7 Blockchain Initialization
12.8 Padding Key Substitution-Algorithm
12.9 Hash Key Generation on Padding
12.10 Circular Shifting Block Generation
12.11 Rehashing Shift Code Rail Encryption
12.12 Peer Verification on Exponential Session
12.13 Verified Authenticity Key Logs
12.14 Result and Discussion
12.15 Conclusion
References
Chapter 13: Application of Exact Barrier-Penalty Function for Developing Privacy Mechanisms in Cyber-Physical Systems
13.1 Introduction
13.2 Related Work
13.3 Problem Formulation
13.4 Proposed Mechanism
13.5 Experimental Results
13.6 Future Scope
13.7 Conclusion
References
Index
π SIMILAR VOLUMES
<p>A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise</p> <p><b>Overview</b></p> <ul> <li>Learn sample forms and process flows for quick and easy use.</li> <li>An easy-to-follow reference for implementing information security in the enterpri
<p>Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provid
<p><i>Information Security Analytics</i> gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques.</p> <p><i>Information Securit
<p><i>Information Security Analytics</i> gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques.</p><p><i>Information Security
In the Digital Age you need to find new approaches for Information and Cyber Security. This book describes the risk-based approach to transform information security considering the influences of the human factor. It is intended for people who want to protect the information of an organization in a h