CYBER SECURITY AND DIGITAL FORENSICS Cyber security is an incredibly important issue that is constantly changing, with new methods, processes, and technologies coming online all the time. Books like this are invaluable to professionals working in this area, to stay abreast of all of these changes. Current cyber threats are getting more complicated and advanced with the rapid evolution of adversarial techniques. Networked computing and portable electronic devices have broadened the role of digital forensics beyond traditional investigations into computer crime. The overall increase in the…mehr
Cyber security is an incredibly important issue that is constantly changing, with new methods, processes, and technologies coming online all the time. Books like this are invaluable to professionals working in this area, to stay abreast of all of these changes.
Current cyber threats are getting more complicated and advanced with the rapid evolution of adversarial techniques. Networked computing and portable electronic devices have broadened the role of digital forensics beyond traditional investigations into computer crime. The overall increase in the use of computers as a way of storing and retrieving high-security information requires appropriate security measures to protect the entire computing and communication scenario worldwide. Further, with the introduction of the internet and its underlying technology, facets of information security are becoming a primary concern to protect networks and cyber infrastructures from various threats.
This groundbreaking new volume, written and edited by a wide range of professionals in this area, covers broad technical and socio-economic perspectives for the utilization of information and communication technologies and the development of practical solutions in cyber security and digital forensics. Not just for the professional working in the field, but also for the student or academic on the university level, this is a must-have for any library.
Audience: Practitioners, consultants, engineers, academics, and other professionals working in the areas of cyber analysis, cyber security, homeland security, national defense, the protection of national critical infrastructures, cyber-crime, cyber vulnerabilities, cyber-attacks related to network systems, cyber threat reduction planning, and those who provide leadership in cyber security management both in public and private sectorsHinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Mangesh M. Ghonge, PhD, is currently working at Sandip Institute of Technology and Research Center, Nashik, Maharashtra, India. He authored or co-authored more than 60 published articles in prestigious journals, book chapters, and conference papers. He is also the author or editor of ten books and has organized and chaired many national and international conferences. Sabyasachi Pramanik, PhD, is an assistant professor in the Department of Computer Science and Engineering, Haldia Institute of Technology, India. He earned his doctorate in computer science and engineering from the Sri Satya Sai University of Technology and Medical Sciences, Bhopal, India. He has many publications in various reputed international conferences, journals, and online book chapter contributions and is also serving as the editorial board member of many international journals. He is a reviewer of journal articles in numerous technical journals and has been a keynote speaker, session chair and technical program committee member in many international conferences. He has authored a book on wireless sensor networks and is currently editing six books for multiple publishers, including Scrivener Publishing. Ramchandra Mangrulkar, PhD, is an associate professor in the Department of Computer Engineering at SVKM's Dwarkadas J. Sanghvi College of Engineering, Mumbai, Maharashtra, India. He has published 48 papers and 12 book chapters and presented significant papers at technical conferences. He has also chaired many conferences as a session chair and conducted various workshops and is also a ICSI-CNSS Certified Network Security Specialist. He is an active member on boards of studies in various universities and institutes in India. Dac-Nhuong Le, PhD, is an associate professor and associate dean at Haiphong University, Vietnam. He earned his MSc and PhD in computer science from Vietnam National University, and he has over 20 years of teaching experience. He has over 50 publications in reputed international conferences, journals and online book chapter contributions and has chaired numerous international conferences. He has served on numerous editorial boards for scientific and technical journals and has authored or edited over 15 books by various publishers, including Scrivener Publishing.
Inhaltsangabe
Preface xvii
Acknowledgment xxvii
1 A Comprehensive Study of Security Issues and Research Challenges in Different Layers of Service-Oriented IoT Architecture 1 Ankur O. Bang, Udai Pratap Rao and Amit A. Bhusari
1.1 Introduction and Related Work 2
1.2 IoT: Evolution, Applications and Security Requirements 4
1.2.1 IoT and Its Evolution 5
1.2.2 Different Applications of IoT 5
1.2.3 Different Things in IoT 7
1.2.4 Security Requirements in IoT 8
1.3 Service-Oriented IoT Architecture and IoT Protocol Stack 10
1.3.1 Service-Oriented IoT Architecture 10
1.3.2 IoT Protocol Stack 11
1.3.2.1 Application Layer Protocols 12
1.3.2.2 Transport Layer Protocols 13
1.3.2.3 Network Layer Protocols 15
1.3.2.4 Link Layer and Physical Layer Protocols 16
1.4 Anatomy of Attacks on Service-Oriented IoT Architecture 24
1.4.1 Attacks on Software Service 24
1.4.1.1 Operating System-Level Attacks 24
1.4.1.2 Application-Level Attacks 25
1.4.1.3 Firmware-Level Attacks 25
1.4.2 Attacks on Devices 26
1.4.3 Attacks on Communication Protocols 26
1.4.3.1 Attacks on Application Layer Protocols 26
1.4.3.2 Attacks on Transport Layer Protocols 28
1.4.3.3 Attacks on Network Layer Protocols 28
1.4.3.4 Attacks on Link and Physical Layer Protocols 30
1.5 Major Security Issues in Service-Oriented IoT Architecture 31
1.5.1 Application - Interface Layer 32
1.5.2 Service Layer 33
1.5.3 Network Layer 33
1.5.4 Sensing Layer 34
1.6 Conclusion 35
References 36
2 Quantum and Post-Quantum Cryptography 45 Om Pal, Manoj Jain, B.K. Murthy and Vinay Thakur
2.1 Introduction 46
2.2 Security of Modern Cryptographic Systems 46
2.2.1 Classical and Quantum Factoring of A Large Number 47
2.2.2 Classical and Quantum Search of An Item 49
2.3 Quantum Key Distribution 49
2.3.1 BB84 Protocol 50
2.3.1.1 Proposed Key Verification Phase for BB84 51
2.3.2 E91 Protocol 51
2.3.3 Practical Challenges of Quantum Key Distribution 52
1 A Comprehensive Study of Security Issues and Research Challenges in Different Layers of Service-Oriented IoT Architecture 1 Ankur O. Bang, Udai Pratap Rao and Amit A. Bhusari
1.1 Introduction and Related Work 2
1.2 IoT: Evolution, Applications and Security Requirements 4
1.2.1 IoT and Its Evolution 5
1.2.2 Different Applications of IoT 5
1.2.3 Different Things in IoT 7
1.2.4 Security Requirements in IoT 8
1.3 Service-Oriented IoT Architecture and IoT Protocol Stack 10
1.3.1 Service-Oriented IoT Architecture 10
1.3.2 IoT Protocol Stack 11
1.3.2.1 Application Layer Protocols 12
1.3.2.2 Transport Layer Protocols 13
1.3.2.3 Network Layer Protocols 15
1.3.2.4 Link Layer and Physical Layer Protocols 16
1.4 Anatomy of Attacks on Service-Oriented IoT Architecture 24
1.4.1 Attacks on Software Service 24
1.4.1.1 Operating System-Level Attacks 24
1.4.1.2 Application-Level Attacks 25
1.4.1.3 Firmware-Level Attacks 25
1.4.2 Attacks on Devices 26
1.4.3 Attacks on Communication Protocols 26
1.4.3.1 Attacks on Application Layer Protocols 26
1.4.3.2 Attacks on Transport Layer Protocols 28
1.4.3.3 Attacks on Network Layer Protocols 28
1.4.3.4 Attacks on Link and Physical Layer Protocols 30
1.5 Major Security Issues in Service-Oriented IoT Architecture 31
1.5.1 Application - Interface Layer 32
1.5.2 Service Layer 33
1.5.3 Network Layer 33
1.5.4 Sensing Layer 34
1.6 Conclusion 35
References 36
2 Quantum and Post-Quantum Cryptography 45 Om Pal, Manoj Jain, B.K. Murthy and Vinay Thakur
2.1 Introduction 46
2.2 Security of Modern Cryptographic Systems 46
2.2.1 Classical and Quantum Factoring of A Large Number 47
2.2.2 Classical and Quantum Search of An Item 49
2.3 Quantum Key Distribution 49
2.3.1 BB84 Protocol 50
2.3.1.1 Proposed Key Verification Phase for BB84 51
2.3.2 E91 Protocol 51
2.3.3 Practical Challenges of Quantum Key Distribution 52