Description
Taylor and Francis Ltd Cyber Security Threats and Challenges Facing Human Life 1st Edition 2022 Hardbound by Shekokar, Narendra
Cyber Security Threats and Challenges Facing Human Life provides a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain. This book offers detailed analysis of effective countermeasures and mitigations. The financial sector, healthcare, digital manufacturing, and social media are some of the important areas in which cyber-attacks are frequent and cause great harm. Hence, special emphasis is given to the study and analysis of cyber security challenges and countermeasures in those four important areas.KEY FEATURES* Discusses the prominence of cyber security in human life* Discusses the significance of cyber security in the post-COVID-19 world * Emphasizes the issues, challenges, and applications of cyber security mitigation methods in business and different sectors* Provides comphrension of the impact of cyber security threats and challenges in digital manufacturing and the internet of things environment* Offers understanding of the impact of big data breaches and future trends in data securityThis book is primarily aimed at undergraduate students, graduate students, researchers, academicians, and professionals who are interested in exploring their research and knowledge in cyber security domain. Section 1: Cyber Security Concepts and Application1. Cyber security challenges in digital manufacturing and possible ways of mitigation. 2. An Efficient Proxy Signature based Authority Delegation Scheme for Medical Cyber Physical System. 3. The impact of COVID-19 Pandemic on cybersecurity issues of Healthcare domain: A scoping review. 4. Cyber Threats: A Fear over IndustriesSection 2: Cyber Security and IoT5. A comprehensive survey of existing security techniques in IoT protocol stack. 6. Impact of cyber security threats on IoT applications. 7. Need of Internet of Things (IoT) Forensics : Case Studies and AnalysisSection 3: Detection Techniques8. A comparative analysis of tree based algorithms and application of XGBoost Classifier in Malware Detection. 9. An assessment on Game-based Cyber Defense strategy for SDN. 10. Smart Computing - Cyber Threats and Mitigation TechniquesSection 4: Cyber Security and Languages11. SQL Injection Attacks on Indian Websites - A case studySection 5: Cyber Security and its Future12. Information Security Systems and its future. 13.Different Similarity Measures for Secure Name Matching in Record Linkage