Home > Computing and Information Technology > Computer security > Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT
10%
Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT

Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT

          
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

Cyber threats are ever increasing. Adversaries are getting more sophisticated and cyber criminals are infiltrating companies in a variety of sectors. In today’s landscape, organizations need to acquire and develop effective security tools and mechanisms – not only to keep up with cyber criminals, but also to stay one step ahead. Cyber-Vigilance and Digital Trust develops cyber security disciplines that serve this double objective, dealing with cyber security threats in a unique way. Specifically, the book reviews recent advances in cyber threat intelligence, trust management and risk analysis, and gives a formal and technical approach based on a data tainting mechanism to avoid data leakage in Android systems

Table of Contents:
Introduction ix Wiem TOUNSI Chapter 1. What Is Cyber Threat Intelligence and How Is It Evolving? 1 Wiem TOUNSI 1.1. Introduction 1 1.2. Background 3 1.2.1. New Generation Threats 3 1.2.2. Analytical Frameworks 6 1.3. Cyber Threat Intelligence 9 1.3.1. Cyber Threat Intelligence Sources 9 1.3.2. Cyber Threat Intelligence Sub-Domains 11 1.3.3. Technical Threat Intelligence (TTI) 13 1.4. Related Work 14 1.5. Technical Threat Intelligence Sharing Problems 16 1.5.1. Benefits of CTI Sharing for Collective Learning 16 1.5.2. Reasons for Not Sharing 17 1.6. Technical Threat Intelligence Limitations 21 1.6.1. Quantity Over Quality 21 1.6.2. IOC-Specific Limitations 22 1.7. Cyber Threat Intelligent Libraries or Platforms 25 1.7.1. Benefits of CTI Libraries Based In the Cloud 26 1.7.2. Reluctance to Use Cloud Services 26 1.8. Discussion 27 1.8.1. Sharing Faster Is Not Sufficient 27 1.8.2. Reducing the Quantity of Threat Feeds 28 1.8.3. Trust to Share Threat Data and to Save Reputation Concerns 30 1.8.4. Standards for CTI Representation and Sharing 31 1.8.5. Cloud-Based CTI Libraries for Collective Knowledge and Immunity 34 1.9. Evaluation of Technical Threat Intelligence Tools 36 1.9.1. Presentation of Selected Tools 37 1.9.2. Comparative Discussion 38 1.10. Conclusion and Future Work 39 1.11. References 40 Chapter 2. Trust Management Systems: A Retrospective Study on Digital Trust 51 Reda YAICH 2.1. Introduction 51 2.2. What Is Trust? 52 2.3. Genesis of Trust Management Systems 54 2.3.1. Access Control Model 54 2.3.2. Identity-Based Access Control 55 2.3.3. Lattice-Based Access Control 57 2.3.4. Role-Based Access Control 58 2.3.5. Organization-Based Access Control 59 2.3.6. Attribute-Based Access Control 61 2.4. Trust Management 62 2.4.1. Definition 62 2.4.2. Trust Management System 64 2.4.3. Foundations 65 2.4.4. Automated Trust Negotiation 70 2.5. Classification of Trust Management Systems 72 2.5.1. Authorization-Based TMSs 73 2.5.2. Automated Trust Negotiation Systems 81 2.6. Trust Management In Cloud Infrastructures 90 2.6.1. Credentials-Based Trust Models 90 2.6.2. SLA-Based Trust Models 90 2.6.3. Feedback-Based Trust Models 91 2.6.4. Prediction-Based Trust Models 92 2.7. Conclusion 93 2.8. References 94 Chapter 3. Risk Analysis Linked to Network Attacks 105 Kamel KAROUI 3.1. Introduction 105 3.2. Risk Theory 107 3.2.1. Risk Analysis Terminology 107 3.2.2. Presentation of the Main Risk Methods 109 3.2.3. Comparison of the Main Methods 116 3.3. Analysis of IS Risk In the Context of IT Networks 120 3.3.1. Setting the Context 120 3.3.2. Risk Assessment 127 3.3.3. Risk Treatment 133 3.3.4. Acceptance of Risks 136 3.3.5. Risk Communication 137 3.3.6. Risk Monitoring 138 3.4. Conclusion 138 3.5. References 138 Chapter 4. Analytical Overview on Secure Information Flow In Android Systems: Protecting Private Data Used By Smartphone Applications 141 Mariem GRAA 4.1. Introduction 142 4.2. Information Flow 143 4.2.1. Explicit Flows 143 4.2.2. Implicit Flows 143 4.2.3. Covert Channels 144 4.3. Data Tainting 145 4.3.1. Interpreter Approach 145 4.3.2. Architecture-Based Approach 146 4.3.3. Static Taint Analysis 146 4.3.4. Dynamic Taint Analysis 147 4.4. Protecting Private Data In Android Systems 149 4.4.1. Access Control Approach 149 4.4.2. Preventing Private Data Leakage Approach 153 4.4.3. Native Libraries Approaches 157 4.5. Detecting Control Flow 160 4.5.1. Technical Control Flow Approaches 160 4.5.2. Formal Control Flow Approaches 162 4.6. Handling Explicit and Control Flows In Java and Native Android Appsʼ Code 164 4.6.1. Formal Specification of the Under-Tainting Problem 164 4.6.2. Formal Under-Tainting Solution 166 4.6.3. System Design 175 4.6.4. Handling Explicit and Control Flows In Java Android Appsʼ Code 176 4.6.5. Handling Explicit and Control Flows In Native Android Appsʼ Code 180 4.6.6. Evaluation 184 4.6.7. Discussion 187 4.7. Protection Against Code Obfuscation Attacks Based on Control Dependencies In Android Systems 188 4.7.1. Code Obfuscation Definition 188 4.7.2. Types of Program Obfuscations 189 4.7.3. Obfuscation Techniques 189 4.7.4. Code Obfuscation In Android System 190 4.7.5. Attack Model 191 4.7.6. Code Obfuscation Attacks 192 4.7.7. Detection of Code Obfuscation Attacks 194 4.7.8. Obfuscation Code Attack Tests 195 4.8. Detection of Side Channel Attacks Based on Data Tainting In Android Systems 198 4.8.1. Target Threat Model 199 4.8.2. Side Channel Attacks 200 4.8.3. Propagation Rules for Detecting Side Channel Attacks 203 4.8.4. Implementation 205 4.8.5. Evaluation 207 4.9. Tracking Information Flow In Android Systems Approaches Comparison: Summary 210 4.10. Conclusion and Highlights 215 4.11. References 216 List of Authors 227 Index 229


Best Sellers


Product Details
  • ISBN-13: 9781786304483
  • Publisher: ISTE Ltd and John Wiley & Sons Inc
  • Publisher Imprint: ISTE Ltd and John Wiley & Sons Inc
  • Height: 236 mm
  • No of Pages: 256
  • Spine Width: 20 mm
  • Weight: 476 gr
  • ISBN-10: 1786304481
  • Publisher Date: 10 May 2019
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Sub Title: Cyber Security in the Era of Cloud Computing and IoT
  • Width: 160 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT
ISTE Ltd and John Wiley & Sons Inc -
Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA