Cover image for Emerging Trends in ICT Security.
Emerging Trends in ICT Security.
Title:
Emerging Trends in ICT Security.
Author:
Akhgar, Babak.
ISBN:
9780124104877
Personal Author:
Physical Description:
1 online resource (662 pages)
Series:
Emerging Trends in Computer Science and Applied Computing
Contents:
Front Cover -- Emerging Trends in ICT Security -- Copyright Page -- Contents -- Acknowledgments -- Review Board -- About the Editors -- List of Contributors -- Preface -- 1 Information and Systems Security -- 1 Theory/Reviews of the Field -- 1 System Security Engineering for Information Systems -- Introduction -- System security engineering history -- The system security engineering process -- The revitalization of system security engineering -- Established system security engineering methods, processes, and tools -- Acquisition program protection planning -- Information assurance -- Systems engineering critical reviews -- Modern and emerging system security engineering methods, processes, and tools -- Discovery and understanding of complex systems for security -- Mission assurance -- Formalized security requirements -- Early design considerations -- Plan for failure -- Security and system patterns -- Leveraging system architectures for security -- Agile and self-organizing system security -- Security metrics and evaluation -- Identified SSE research areas -- Conclusion -- Recommendations -- Disclaimer -- Acknowledgments -- References -- Further reading -- 2 Metrics and Indicators as Key Organizational Assets for ICT Security Assessment -- Introduction -- GOCAME strategy overview -- GOCAME conceptual framework -- GOCAME process and the W5H rule -- Security evaluation for a web system: A proof of concept -- Target entity and information need -- Security characteristic specification -- Metric and indicator specifications -- Implementing the M&E -- Risk and security vulnerability issues -- Metrics and indicators for repeatable and consistent analysis: a discussion -- Related work -- Conclusion and future work -- References.

3 A Fresh Look at Semantic Natural Language Information Assurance and Security: NL IAS from Watermarking and Downgrading to... -- Introduction -- Early breakthrough in NL IAS -- The conceptual foundation of NL IAS -- NL IA applications -- NL watermarking -- NL tamperproofing -- NL sanitizing/downgrading -- NL steganography and steganalysis -- A sketch of ontological semantic technology -- Mature semantic NL IAS -- Semantic forensics -- Unintended inferences and the meaning of the unsaid -- Situational conceptual defaults -- The term, its origins, and the canonical case -- Default reversal -- Are defaults really common sense knowledge? -- Underdetermination of reality by language -- Scripts -- Anonymization -- Summary -- Acknowledgments -- References -- 2 Methods -- 4 An Approach to Facilitate Security Assurance for Information Sharing and Exchange in Big-Data Applications -- Introduction -- UML extensions for XML security -- Extensions for policy modeling and integration -- Integrating local security policies into a global security policy -- Assumptions and equivalence finding -- Integration process for local SPSS -- Resolving conflicts of integrated security rule sets -- Creating the global SPSS -- Related work -- Conclusion -- References -- 5 Gamification of Information Security Awareness Training -- Introduction -- Literature review -- General concepts -- Serious games -- Games adoption in multiple domains -- Benefits of digital games -- Gamification system -- System architecture -- Software tools -- Game design -- Storyboards -- Password awareness game -- Phishing awareness game -- Information security awareness games -- Information security awareness metrics -- Conclusion and future plans -- Acknowledgments -- References -- 6 A Conceptual Framework for Information Security Awareness, Assessment, and Training -- Introduction.

Background and literature -- Human factors and information security -- Information security learning continuum -- Awareness -- Training -- Education -- Dimensions of information security awareness -- Knowledge -- Attitude -- Behavior -- A field study -- Concluding remarks -- References -- Further Reading -- 7 Security Projects for Systems and Networking Professionals -- Introduction -- Background -- Cryptography -- Assignment in symmetric encryption -- Assignment in hash functions -- Extra credit assignment on steganography -- Assignment in a key exchange algorithm -- Assignment in asymmetric encryption -- Demonstrations -- Wireless network security -- 802.11 Wireless security -- 802.11 WEP Key cracking experiment -- Conclusion -- References -- Further Reading -- 3 Case Study -- 8 Assessing the Role of Governments in Securing E-Business: The Case of Jordan -- Introduction -- Literature review -- The role of government in E-business security -- Overview of the Electronic Transaction Law (ETL): Law No. 85 of 2001 -- Overview of the National E-commerce Strategy -- Security in Jordan's E-business initiatives: An analysis -- Analysing ETL in relation to E-business security -- Analyzing security within the National E-commerce Strategy -- Discussion -- Conclusion and recommendations -- References -- 2 Network and Infrastructure Security -- 4 Theory Reviews of the Field -- 9 A Survey of Quantum Key Distribution (QKD) Technologies -- Cryptography -- Quantum key distribution -- Quantum key distribution systems -- QKD system architectures -- The first QKD system: BB84 -- Los alamos: QKD leaves the laboratory -- Plug and play: QKD made easier -- First entanglement-based system: EPR and Bell's theorem -- Continuous variable QKD: short-ranged but fast and secure -- QKD networks -- DARPA network: introducing layers -- SECOQC Network: mixing and matching with nodes.

SwissQuantum network: simplifying QKD integration -- Tokyo network: a high-speed network -- The future of QKD -- Quantum repeaters -- Quantum memory -- Free-space QKD: satellites -- Device independent QKD (DI-QKD) -- Measurement device independent QKD (MDI-QKD) -- A military QKD usage scenario -- Conclusion -- Disclaimer -- Acknowledgments -- References -- 10 Advances in Self-Security of Agent-Based Intrusion Detection Systems -- Introduction -- Overview -- Framework for self-security, self-reliability and self-integrity of agent-based IDSs -- Self-security -- Authentication/authorization and secure message exchange -- Key life cycle management -- Self-reliability of message exchange -- Self-reliability of components -- Self-integrity -- Prototyping and extending IDS-NIDIA -- Tests -- Related works -- Conclusion -- Acknowledgments -- References -- Further reading -- 11 Secure Communication in Fiber-Optic Networks -- Introduction -- Confidentiality -- Optical encryption -- Optical CDMA -- Optical key distribution -- Privacy and optical steganography -- Availability -- Jamming and anti-jamming -- Optical chaos-based communications -- Summary -- References -- 5 Methods -- 12 Advanced Security Network Metrics -- Introduction -- Related work -- Method description -- Principle of the method -- Metrics extraction -- Functions for metrics extraction -- Metrics definition -- Statistical metrics -- Dynamic metrics -- Localization metrics -- Distributed metrics -- Behavioral metrics -- Description of experiments -- Metrics extraction process -- Discriminators extraction process -- Mining and assessment process -- Results of experiments -- Conclusion -- References -- 13 Designing Trustworthy Software Systems Using the NFR Approach -- Introduction -- The NFR approach -- The Phoenix system and trustworthiness deficit.

Application of the NFR approach for designing a trustworthy Phoenix system -- Develop NFR softgoals and their decompositions -- Develop operationalizing softgoals and their decompositions -- Develop goal tradeoffs and rationale -- Developing goal criticalities -- Evaluation and analysis -- Validation and lessons learned -- Summary -- Acknowledgments -- References -- 14 Analyzing the Ergodic Secrecy Rates of Cooperative Amplify-and-Forward Relay Networks over Generalized Fading Channels -- Introduction -- Secure cooperative wireless communications -- Improving wireless physical layer security using cooperative relays in a Gaussian channel -- Ergodic secrecy rates of cooperative amplify-and-forward relay networks -- Computational results -- Tightness of the approximation for the MGF of SNR -- Effects of fade distributions -- Effects of transmit power allocation in distinct transmission phases -- Effects of dissimilar mean signal strengths -- Effects of increasing number of cooperative relays -- Effects of increasing number of eavesdroppers -- Conclusion -- Appendix -- References -- 15 Algebraic Approaches to a Network-Type Private Information Retrieval -- Introduction -- The data processing scheme and statement of the problem -- Description of the data processing scheme -- Constraints on parameters and complexities of the data processing scheme -- Algorithmic description of the solution -- The (n, w)-Encoding of indices and polynomial representation of the database -- Encoding the algorithm -- Constructing the l-th replica to the query -- Decoding of the bit xi by the user-receiver -- Implementing the data processing algorithms -- Algebraic description of the solution -- Cyclotomic classes of GF(2m) having the maximum size m -- Assigning the encoding matrices.

Representing the algorithm for constructing the bit xi as finding the solution to the two-hypotheses testing problem.
Abstract:
Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. Provides a multidisciplinary approach to security with coverage of communication systems, information mining, policy making, and management infrastructures Discusses deployment of numerous security solutions, including, cyber defense techniques and defense against malicious code and mobile attacks Addresses application of security solutions in real-life scenarios in several environments, such as social media, big data and crowd sourcing.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Added Author:
Electronic Access:
Click to View
Holds: Copies: