Handbook of computer networks and cyber security : principles and paradigms /

This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with exa...

Full description

Bibliographic Details
Other Authors: Agrawal, Dharma P (Dharma Prakash), 1945-, Gupta, Brij, 1982-, Gupta, Deepak, 1983-, Martinez Pérez, Gregorio, Martinez Pérez, Gregorio
Format: Book
Language:English
Published: Cham : Springer, 2020
Subjects:
LEADER 07765nam a2200697Ia 4500
001 ff532eb3-2f49-4c87-82c9-f28b77bea04f
005 20240421000000.0
008 200104s2020 sz of 000 0 eng d
015 |a GBC076963  |2 bnb 
016 7 |a 019662706  |2 Uk 
019 |a 1134852754  |a 1137815853  |a 1239623731 
020 |a 3030222772  |q (electronic bk.) 
020 |a 9783030222772  |q (electronic bk.) 
020 |z 3030222764 
020 |z 9783030222765  |q (print) 
024 8 |a 10.1007/978-3-030-22 
035 |a (OCoLC)1134853898  |z (OCoLC)1134852754  |z (OCoLC)1137815853   |z (OCoLC)1239623731 
035 |a (OCoLC)1134853898  |z (OCoLC)1134852754  |z (OCoLC)1137815853  |z (OCoLC)1239623731 
035 9 |a (OCLCCM-CC)1134853898 
037 |a com.springer.onix.9783030222772  |b Springer Nature 
040 |a EBLCP  |b eng  |c EBLCP  |d GW5XE  |d OCLCF  |d ESU  |d N$T  |d YDX  |d DKU  |d BRX  |d LQU  |d UPM  |d UKMGB  |d UKAHL  |d MUB  |d OCLCO 
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d GW5XE  |d OCLCF  |d ESU  |d N$T  |d YDX  |d DKU  |d BRX  |d LQU   |d UPM  |d UKMGB  |d UKAHL  |d MUB  |d OCLCO  |d OCLCQ  |d OCLCO  |d COM  |d CSt 
049 |a MAIN 
050 4 |a TK5105.5 
082 0 4 |a 004.6  |2 23 
245 0 0 |a Handbook of computer networks and cyber security :  |b principles and paradigms /  |c Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta, editors 
260 |a Cham :  |b Springer,  |c 2020 
300 |a 1 online resource (957 p.) 
300 |a 1 online resource (957 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a 6.2 Authentication Service 
500 |a Description based upon print version of record 
505 0 |a Intro -- Preface -- Acknowledgment -- Contents -- About the Editors -- 1 Security Frameworks in Mobile Cloud Computing -- 1 Introduction -- 2 Architecture of Mobile Cloud Computing -- 3 Security Aspects of Mobile Cloud Computing -- 4 Security Frameworks for Mobile Cloud Computing -- 4.1 Authentication Frameworks for Mobile Cloud Computing -- 4.2 Privacy Preserving Security Frameworks for MCC -- 4.3 Secure Data Storage Frameworks for MCC -- 4.4 Security Frameworks for Computation Using MCC -- 5 Attack, Risk Assessment, and Verifiability in Mobile Clouds -- 6 Summary and Discussion 
505 8 |a 2.2 Mean Failure Cost Model (MFC): A Quantitative Cybersecurity Risk Assessment Model -- 2.3 Mean Failure Cost (MFC) Limits -- 3 Cloud Computing Environments -- 3.1 Cloud Computing Architecture -- 3.2 Cloud Computing Security Issues -- 4 MFCext and MFCint: New Quantitative Security Risk Assessment Models -- 4.1 Security Threat Space Intrusion -- 4.1.1 Internal Threats -- 4.1.2 External Threats -- 4.1.3 Internal/External Threats -- 4.2 MFCext and MFCint: The Proposed Model -- 4.3 Illustration of the Cybersecurity Model: A Cloud Computing System -- 4.4 Validation of the MFCint and the MFCext 
505 8 |a 4.1 Smart-Model: System Architecture -- 4.2 Component Views -- 4.3 Flow of Information Management -- 5 Security Solutions for Smart Model -- 5.1 Model Description -- 5.2 Key Generation -- 5.2.1 Encryption to Top Cloud -- 5.2.2 Encryption to IS -- 5.2.3 Proxy Re-encryption -- 5.2.4 Signature Generation by Top Cloud -- 5.2.5 Signature Generation in Regional Cloud -- 5.2.6 Signature Generation by End-Users -- 6 Schemes for Secure Framework -- 6.1 Confidentiality -- 6.1.1 Encryption to Top Cloud -- 6.1.2 Encryption to Information Storage -- 6.1.3 Proxy Re-encryption to Information Storage 
505 8 |a 4.5 MFCext and MFCint Limits and Advantages -- 5 The MFC Extension Model (MFCE) -- 5.1 The MFCE Model -- 5.2 Illustration of the MFC Extension Model: Cloud Computing System -- 5.2.1 The Impact Threats Classes Matrix -- 5.2.2 The Threat Classes Matrix -- 5.3 Validation of the MFCE Model -- 6 Conclusion -- References -- 4 A Novel AckIBE-Based Secure Cloud Data Management Framework -- 1 Introduction -- 1.1 Support of Cloud Computing -- 2 Related Literature -- 2.1 Security Approaches of Smart Model -- 3 Basic IB Schemes -- 3.1 Other IB Schemes -- 4 Secure Smart Model 
505 8 |a 7 Conclusion -- References -- 2 An Investigation Study of Privacy Preserving in Cloud Computing Environment -- 1 Introduction -- 2 Privacy-Preserving Methods -- 3 Searchable Encryption-Based Techniques -- 3.1 Symmetric-Key Based Techniques -- 3.2 Fuzzy-Searchable Encryption -- 3.3 Public-Key Encryption -- 4 Conclusion and Future Work -- References -- 3 Towards New Quantitative Cybersecurity Risk Analysis Models for Information Systems: A Cloud ComputingCase Study -- 1 Introduction -- 2 Motivation: Quantitative Cybersecurity Risk Assessment Models -- 2.1 Related Work 
520 |a This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference 
588 0 |a Print version record 
596 |a 22 
650 0 |a Computer networks  |v Handbooks, manuals, etc 
650 0 |a Computer security  |v Handbooks, manuals, etc 
650 6 |a Réseaux d'ordinateurs  |v Guides, manuels, etc 
650 6 |a Sécurité informatique  |v Guides, manuels, etc 
650 7 |a Computer networks  |2 fast 
650 7 |a Computer security  |2 fast 
655 0 |a Electronic books 
655 4 |a Electronic books 
655 7 |a Handbooks and manuals  |2 fast 
700 1 |a Agrawal, Dharma P  |q (Dharma Prakash),  |d 1945- 
700 1 |a Gupta, Brij,  |d 1982- 
700 1 |a Gupta, Deepak,  |d 1983- 
700 1 |a Martinez Pérez, Gregorio 
700 1 |a Martinez Pérez, Gregorio 
776 0 8 |i Print version:  |a Gupta, Brij B  |t Handbook of Computer Networks and Cyber Security : Principles and Paradigms  |d Cham : Springer,c2020  |z 9783030222765 
776 0 8 |i Print version:  |a Gupta, Brij B  |t Handbook of Computer Networks and Cyber Security : Principles and Paradigms.  |d Cham : Springer, ©2020   |z 9783030222765 
999 1 0 |i ff532eb3-2f49-4c87-82c9-f28b77bea04f  |l a13574227  |s US-CST  |m handbook_of_computer_networks_and_cyber_securityprinciples_and_paradig_____2020_______sprina___________________________________________________________________________e 
999 1 0 |i ff532eb3-2f49-4c87-82c9-f28b77bea04f  |l 12603012  |s US-ICU  |m handbook_of_computer_networks_and_cyber_securityprinciples_and_paradig_____2020_______sprina___________________________________________________________________________e 
999 1 1 |l a13574227  |s ISIL:US-CST  |t BKS  |a SUL INTERNET  |b 13574227-1001  |c INTERNET RESOURCE  |d ASIS  |x SUL  |y 13574227-1001  |p UNLOANABLE