Cyber Security and Network Security. Группа авторов
Чтение книги онлайн.
Читать онлайн книгу Cyber Security and Network Security - Группа авторов страница 8
The current trends and future directions of diverse Cyber security and Network Security Research with applications in various domains are covered in this book. Assaults on computers are gradually becoming one of the most common problems on the planet. As the scope of digital misbehavior grows, it is critical to look into fresh techniques and advancements that can aid ensure the internet network’s security. Continuous technological advancements have necessitated a deliberate approach to security challenges.
Chapter 1 explores that data security, both inside and outside client devices, is a very important problem in today’s society, which is primarily operated through programs interacting over the internet. The MSME sector and new businesses are primarily moving to the cloud to take advantage of the emerging virtual market prospects and to change their work culture to the online arena. As a result, workplace communication that previously took place behind closed doors and in locked storage rooms with data has transitioned to a more public setting, with files being sent through the public internet to public facing servers. As many of the servers for Public/Hybrid Cloud models are owned jointly by two or more parties/stakeholders, this creates a whole new set of security and compliance issues. As a result, data in transit, i.e. data moving in and out of the cloud, as well as data at rest, i.e. data stored in the cloud, must be encrypted so that no third party can access it without the owner’s permission. Data from a client application, such as an Enterprise Communication Application, would be encrypted using updated algorithms and accessible securely through a set of Access Control capabilities with Least Privilege Access Policies in this suggested study model. The data is then packaged and sent over SSL Layers to a server-side application instance running in a public cloud (here)/private cloud, which decrypts the data and sorts it accordingly before saving it to object-based storages, NoSQL databases, and ledger databases with high availability and security at rest. The data at rest is further encrypted, and when requested, it can be packaged and given back to the client application with the essential encryption in transit conditions met. The transactions are carried out using role-based assigning systems and least access privilege access mode, thus obliterating the ideas of data eavesdropping, personal security risks, and so on.
Chapter 2 discusses the use of cloud technology which has grown in recent years. Cloud computing has become an essential component of modern life. Many businesses have been attracted to relay because of the on-demand service providing flexibility enabled by cloud technology. It is not necessary to purchase servers, databases, or other advanced technologies in order to start a new business. Simultaneously, data security in the cloud is extremely concerning and necessitates some attention. With the use of the user’s cloud records, switches, and routers, cybercriminals can gain access to the user’s systems in a variety of methods. Cloud computing is distributed computing, and it is impossible to imagine cloud computing without these techniques. The security procedures are still in their infancy. Identifying the cyber criminal’s cybernetic proof is critical. Cloud service providers rarely give cloud security analysts access to cloud logs or virtual machine instances. For cyber criminals to abuse cloud computations at any time, they only need cybernetic evidence. To prevent cyber criminals from intruding, security procedures must be strengthened. Cloud forensics is one approach to carry out such tasks. There is a lot of research going on in this subject, but there are still a lot of problems to tackle. HPCBC is a high-performance cluster-based computing (HPCBC) technology that can be employed in IoT and AI applications instead of supercomputers. HPCBC uses a parallel processing system. Cloud forensics could be given a new direction with the support of high-performance cluster-based computing, according to this article. Simultaneous imaging and upload, as well as encryption, are available for the files. With the Remote desktop connection, the files should be processed in real-time stream processing. This survey article offers a variety of perspectives on cloud forensic methods and methodologies.
Chapter 3 includes that in the last few decades, cyber-attacks have become far more common. According to statistics, 12.4 million attacks were documented in 2009, and this number has since climbed to 812.67 million known occurrences in 2018. To be fair, these are merely the documented cases; there are many more. Small cyber attacks to massive Ransom ware attacks or a mix of several complex cyber attacks that include advanced exploitation techniques and persistence capacity for long-term infiltration campaigns. However, the deployment of malware was a common thread in all of the cyber attacks that have occurred thus far. To counter these attacks, we must first comprehend malware’s basic structure, functionality, and impacts on the target. This paper gives an in-depth look at malware architectures by studying the malware using a technique known as malware analysis, as well as other related methods that vary based on the type of malware and a closer look at several types of malware, as well as certain well-known malware methods.
Chapter 4 discusses that fraud is one of the most common sources of substantial financial consequences in today’s society, not just for businesses but also for individual customers. The extraction of user profiles based on previous transaction data and then deciding whether or not an incoming transaction is a fraud based on those profiles is an important approach of detecting fraud. The suggested block-chain technology enables certified users to securely store, review, and exchange digital data, facilitating the development of trust, integrity, and transparency in online commercial connections. Block-chain systematically examines the resilience of block-chain-based reputation systems, with a focus on the secure and reliable extraction and transfer of data to customers. Block-chain uses cryptographic hashes generated from summarized shopping blocks that are signed and sent to enable a safe and secure online buying experience without the need for third-party intervention.
In Chapter 5, it is shown that the demand for blockchain-based identity management systems is especially evident in the internet age; we’ve been dealing with identity management issues since the internet’s inception. Privacy, security, and usability have all been cited as major concerns. User identities are organized using identity management systems (IDMSs), which also manage authentication, authorization, and data interchange over the internet. In addition to a lack of interoperability, single points of vulnerability, and privacy concerns, such as allowing bulk data collection and device tracking, traditional identity management systems suffer from a lack of interoperability, single points of vulnerability, and privacy concerns. Blockchain technology has the potential to alleviate these problems by allowing users to track who owns their own IDs and authentication credentials, as well as enabling novel information ownership and administration frameworks with built-in control and