You are previewing Information Security in Diverse Computing Environments.
O'Reilly logo
Information Security in Diverse Computing Environments

Book Description

Information security systems have become more popular due to the prevalence of criminal activity over benign attacks. Because computer systems are constantly changing, it is important to explore new security measures and unconventional approaches to solving issues. Information Security in Diverse Computing Environments provides the latest empirical research and theoretical frameworks in the area of information security. This reference book presents research on developing sufficient security measures for new environments by discussing challenges faced by researchers as well as unconventional solutions to these problems. This book will be useful for academics, students, professionals, executives, and researchers who want to improve their understanding of the role of information security at different levels of the knowledge society.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
  5. Dedication
  6. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
    2. List of Reviewers
  7. Foreword
    1. REFERENCES
  8. Preface
    1. CHALLENGES AND OPPORTUNITIES
    2. ORGANIZATION OF THIS BOOK
    3. REFERENCES
  9. Acknowledgment
  10. Section 1: Privacy, Anonymity, and Trust Management
    1. Chapter 1: Diversity in Security Environments
      1. ABSTRACT
      2. INTRODUCTION
      3. RESOURCE CONSTRAINED ENVIRONMENTS
      4. SOCIAL MEDIA USE ON MOBILE PHONES
      5. E-HEALTH APPLICATIONS AND MOBILE SECURITY
      6. CRIME REPORTING AND THE ISSUE OF ANONYMITY ON THE WEB
      7. CONCLUSION
      8. REFERENCES
      9. ADDITIONAL READING
      10. KEY TERMS AND DEFINITIONS
    2. Chapter 2: Foreground Trust as a Security Paradigm
      1. ABSTRACT
      2. INTRODUCTION
      3. TRUST? HOW DO WE DO THIS?
      4. PRACTICALITIES
      5. TEN COMMANDMENTS FOR REAL PEOPLE
      6. MOVING FORWARD INTO THE FUTURE, WITH AN EYE ON MCLUHAN’S REAR VIEW MIRROR
      7. REFERENCES
      8. KEY TERMS AND DEFINITIONS
      9. APPENDIX
    3. Chapter 3: A State-of-the-Art Review of Data Stream Anonymization Schemes
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND: ANONYMIZATION TECHNIQUES
      4. DATA STREAM ANONYMIZATION
      5. DESCRIPTION: REVIEW OF FAANST
      6. CONCLUSION
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
    4. Chapter 4: Is It Privacy or Is It Access Control?
      1. ABSTRACT
      2. INTRODUCTION
      3. PRIVACY VS. ACCESS CONTROL IN COMPUTER SYSTEMS
      4. THE OM-AM MODEL
      5. THE USER
      6. DISCUSSION
      7. ACKNOWLEDGMENT
      8. REFERENCES
      9. ADDITIONAL READING
      10. KEY TERMS AND DEFINITIONS
      11. ENDNOTES
    5. Chapter 5: Design of an IPTV Conditional Access System Supporting Multiple-Services
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. PAY TELEVISION
      5. CONTENT PROTECTION
      6. DIGITAL VIDEO BROADCASTING
      7. SECURE TWO-PARTY COMMUNICATIONS
      8. CRYPTOGRAPHY
      9. PROPOSED CA FRAMEWORK
      10. SECURE BROADCASTING
      11. HIERARCHY OF KEYS
      12. ONE-WAY FUNCTION TREES (OFT)
      13. MARKS
      14. MULTIPLE SERVICE ARCHITECTURE
      15. RELIABLE KEY DELIVERY
      16. BATCHED UPDATES
      17. PROPOSED KEY MANAGEMENT FRAMEWORK
      18. INITIAL KEY ESTABLISHMENT
      19. KEY SERVER OPERATIONS
      20. MULTICAST GROUP SECURITY
      21. RESULTS AND EVALUATION
      22. FUTURE RESEARCH DIRECTIONS
      23. CONCLUSION
      24. REFERENCES
      25. ADDITIONAL READING
      26. KEY TERMS AND DEFINITIONS
  11. Section 2: Cyber-Defense Challenges
    1. Chapter 6: Standing Your Ground
      1. ABSTRACT
      2. INTRODUCTION
      3. EVOLUTION OF SECURITY
      4. CURRENT CYBER DEFENSE ISSUES
      5. FUTURE CHALLENGES
      6. CONCLUSION
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
      10. ENDNOTES
    2. Chapter 7: Necessary Standard for Providing Privacy and Security in IPv6 Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. PRIVACY, SECURITY, ANONYMITY, AND THEIR CONFLICTS
      4. MECHANISMS USED TO ATTACK IPV6 ENABLED NETWORKS
      5. AVAILABLE PENETRATION TESTING TOOLS
      6. A FLEXIBLE FRAMEWORK
      7. SECURITY AND PRIVACY RECOMMENDATIONS
      8. CONCLUSION
      9. REFERENCES
      10. ENDNOTES
    3. Chapter 8: A Security Analysis of MPLS Service Degradation Attacks Based on Restricted Adversary Models
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. REAL-TIME NETWORKS
      5. MPLS AND POLICY ROUTING
      6. A SIMPLIFIED MPLS POLICY MODEL
      7. ADVERSARY MODEL FOR MPLS NETWORKS
      8. THREAT ANALYSIS
      9. CONCLUSION
      10. REFERENCES
      11. ADDITIONAL READING
      12. KEY TERMS AND DEFINITIONS
    4. Chapter 9: The Future of National and International Security on the Internet
      1. ABSTRACT
      2. CYBER SECURITY
      3. BACKGROUND
      4. LAWS AND POLICIES TO COMBAT TERRORISM
      5. TOOLS AND METHODS FOR NETWORK ATTACKS
      6. WHO IS CONNECTED AND WHY?
      7. WHERE DO PEOPLE CONNECT?
      8. INTERNET STALKING
      9. FUTURE OF INTERNET CONNECTIVITY: SOCIAL NETWORKS
      10. EMERGING TECHNOLOGIES AND THE INTERNET
      11. EMERGING AREAS IN HUMAN COMPUTER INTERACTION FOR COUNTERING CYBER ATTACKS
      12. CONCLUSION
      13. REFERENCES
      14. KEY TERMS AND DEFINITIONS
  12. Section 3: Forensics, Malware Detection, and Analysis
    1. Chapter 10: Similarity Measure for Obfuscated Malware Analysis
      1. ABSTRACT
      2. INTRODUCTION
      3. MALWARE AND DETECTION TECHNIQUES
      4. METAMORPHIC MALWARE DETECTION METHODS
      5. DATA MINING TECHNIQUES FOR MALWARE DETECTION
      6. PROPOSED METHOD
      7. SIMILARITY MEASUREMENT INDICES
      8. EXPERIMENTS AND RESULTS
      9. CONCLUSION
      10. FUTURE SCOPE
      11. OPEN RESEARCH PROBLEMS
      12. ACKNOWLEDGMENT
      13. REFERENCES
      14. KEY TERMS AND DEFINITIONS
    2. Chapter 11: Mobile Worms and Viruses
      1. ABSTRACT
      2. INTRODUCTION
      3. DEVELOPMENTS OF MOBILE MALWARE
      4. VIRUS AND ITS VARIANTS
      5. ATTACKER’S GOAL
      6. ATTACK VECTORS
      7. MOBILE MALWARE
      8. VIRUS DETECTION AND PREVENTION
      9. MOBILE ANTIVIRUS
      10. THREAT MITIGATION
      11. CONCLUSION
      12. REFERENCES
      13. KEY TERMS AND DEFINITIONS
    3. Chapter 12: On Complex Crimes and Digital Forensics
      1. ABSTRACT
      2. INTRODUCTION
      3. ON SCIENCE, FORENSIC SCIENCE, AND EXPERT TESTIMONY
      4. FORENSIC CRAFT AND SCIENCE
      5. DIGITAL FORENSIC SCIENCE
      6. ALTERNATIVE PERSPECTIVES ON ERROR RATES AND DIGITAL FORENSIC SCIENCE
      7. CONCLUSION
      8. ACKNOWLEDGMENT
      9. REFERENCES
      10. ADDITIONAL READING
      11. KEY TERMS AND DEFINITIONS
      12. ENDNOTES
    4. Chapter 13: Transform Domain Techniques for Image Steganography
      1. ABSTRACT
      2. INTRODUCTION
      3. PRELIMINARIES
      4. CHARACTERISTICS OF STEGANOGRAPHIC SYSTEM
      5. STEGANOGRAPHY APPLICATIONS
      6. PERFORMANCE METRICS
      7. IMAGE STEGANOGRAPHY TECHNIQUES
      8. SPATIAL DOMAIN TECHNIQUES
      9. TRANSFORM DOMAIN TECHNIQUES
      10. DISCRETE COSINE TRANSFORM DOMAIN TECHNIQUES
      11. WAVELET DOMAIN TECHNIQUES
      12. SPREAD SPECTRUM TECHNIQUES
      13. INTELLIGENT TECHNIQUES
      14. THE FUTURE OF IMAGE STEGANOGRAPHY
      15. CONCLUSION
      16. REFERENCES
      17. ADDITIONAL READING
      18. KEY TERMS AND DEFINITIONS
  13. Section 4: Cloud Security
    1. Chapter 14: Experiences with Threat Modeling on a Prototype Social Network
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. ONLINE SOCIAL NETWORKS AND THE ELGG FRAMEWORK
      5. THREAT MODELLING APPROACHES: COMPARATIVE ANALYSIS
      6. DISCUSSION
      7. CONCLUSION
      8. REFERENCES
      9. ADDITIONAL READING
      10. KEY TERMS AND DEFINITIONS
    2. Chapter 15: Solving Security and Availability Challenges in Public Clouds
      1. ABSTRACT
      2. INTRODUCTION
      3. ARCHITECTURE
      4. DESIGN
      5. PERFORMANCE EVALUATION
      6. SECURITY
      7. RELATED WORK
      8. CONCLUSION
      9. FUTURE WORK
      10. REFERENCES
      11. ADDITIONAL READING
      12. KEY TERMS AND DEFINITIONS
      13. ENDNOTES
    3. Chapter 16: Information Security Innovation
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND AND RELATED WORK
      4. A GENERIC SERVICE MODEL FOR THE SECURITY IYP PLATFORM
      5. CONCLUSION AND FUTURE WORK
      6. ACKNOWLEDGMENT
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
  14. Concluding Thoughts on Information Security in Diverse Computing Environments
  15. Compilation of References
  16. About the Contributors