Information security practices : emerging threats and perspectives
This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigm...
Saved in:
Other Authors: | , , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Cham, Switzerland :
Springer,
[2017]
|
Subjects: | |
ISBN: | 9783319489476 9783319489469 |
Physical Description: | 1 online resource |
LEADER | 06118cam a2200493Ii 4500 | ||
---|---|---|---|
001 | 99679 | ||
003 | CZ-ZlUTB | ||
005 | 20240914112127.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 170104s2017 sz ob 001 0 eng d | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d EBLCP |d IDEBK |d GW5XE |d N$T |d YDX |d OCLCF |d NJR |d CNCGM |d UPM |d Z5A |d OCLCQ |d VT2 |d OCLCA |d UAB |d IOG |d U3W |d CAUOI |d OCLCQ |d KSU |d RRP |d AU@ |d OCLCQ |d ESU |d OCLCQ |d LVT |d WYU |d TXI |d OCLCQ |d UKMGB |d MERER |d OCLCQ |d ERF |d UKBTH |d LEATE |d UKAHL |d OCLCQ |d LQU |d OCLCQ | ||
020 | |a 9783319489476 |q (electronic bk.) | ||
020 | |z 9783319489469 |q (print) | ||
024 | 7 | |a 10.1007/978-3-319-48947-6 |2 doi | |
024 | 8 | |a 10.1007/978-3-319-48 | |
035 | |a (OCoLC)967656012 |z (OCoLC)967767528 |z (OCoLC)974651024 |z (OCoLC)981863539 |z (OCoLC)1005832610 |z (OCoLC)1011950408 |z (OCoLC)1048157317 |z (OCoLC)1058377813 |z (OCoLC)1066589529 |z (OCoLC)1066631939 |z (OCoLC)1086520063 |z (OCoLC)1112520540 |z (OCoLC)1113014801 |z (OCoLC)1113448406 |z (OCoLC)1116170609 |z (OCoLC)1122818386 |z (OCoLC)1127113733 |z (OCoLC)1136562545 |z (OCoLC)1156182109 | ||
245 | 0 | 0 | |a Information security practices : |b emerging threats and perspectives / |c Issa Traoré, Ahmed Awad, Isaac Woungang, editors. |
264 | 1 | |a Cham, Switzerland : |b Springer, |c [2017] | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a počítač |b c |2 rdamedia | ||
338 | |a online zdroj |b cr |2 rdacarrier | ||
505 | 0 | |a Preface; Contents; Chapter 1: Introduction: Emerging Threats Call for New Security Paradigms; 1.1 Emerging Threats Landscape; 1.2 Next Generation Cybersecurity Systems; References; Chapter 2: Botnets Threat Analysis and Detection; 2.1 Introduction; 2.2 Evolution of Botnets: History and Topologies; 2.3 Famous Botnets; 2.3.1 ZeuS or Zbot; 2.3.2 Koobface; 2.3.3 Windigo; 2.4 Botnet Detection Evasion Techniques; 2.5 Botnet Detection Methodologies; 2.5.1 Passive Techniques; 2.5.1.1 Packet Inspection; 2.5.1.2 Analysis of Flow Records; 2.5.1.3 DNS-Based Approaches; 2.5.1.4 Analysis of Spam Records. | |
505 | 8 | |a 2.5.1.5 Analysis of (Application) Log Files2.5.1.6 Honeypots; 2.5.1.7 Evaluation of Antivirus; 2.5.1.8 Software Feedback; 2.5.2 Active Techniques; 2.5.2.1 Sinkholing; 2.5.2.2 DNS Cache Snooping; 2.5.2.3 Infiltration; 2.5.2.4 Tracking of Fast-Flux Network; 2.6 Defense Against Botnet Using Network Security Devices; 2.6.1 Intrusion Prevention and Detection Systems; 2.6.2 Network Firewalls; 2.6.2.1 Dynamic and Administrator Blacklist Data; 2.6.2.2 Traffic Classification and Reporting; 2.6.2.3 Domain Name System Snooping; 2.7 Security Measures Against Botnets; 2.7.1 Network Design. | |
505 | 8 | |a 2.7.1.1 Advance Threat Protection2.7.1.2 Intrusion Prevention and Detection System; 2.7.1.3 Email Security Systems; 2.7.1.4 Forensic Analysis; 2.7.1.5 Security Event Monitoring; 2.7.2 Application Usage; 2.7.2.1 HIPS (Host-Based Intrusion Prevention System); 2.7.2.2 End Point Security; 2.7.2.3 Application Firewall; 2.8 Conclusion; References; Chapter 3: Collective Framework for Fraud Detection Using Behavioral Biometrics; 3.1 Background; 3.2 Fraud Detection Framework; 3.3 Behavioral Identity Verification; 3.4 Experimental Evaluation; 3.4.1 Evaluation Metrics and Procedures; 3.4.2 Results. | |
505 | 8 | |a 3.5 ConclusionReferences; Chapter 4: The Hardware Trojan System: An Online Suite of Tools for Hardware Trojan Analysis; 4.1 Introduction; 4.2 Hardware Trojan Analysis Techniques; 4.2.1 Trojan Classification; 4.2.2 Trojan Evaluation; 4.3 The Hardware Trojan System; 4.3.1 The Classification Tool; 4.3.2 The Evaluation Tool; 4.3.3 The Web Environment; 4.4 Case Study; 4.4.1 Classification Tool; 4.4.2 Evaluation Tool; 4.5 Conclusion; References; Chapter 5: Combining Mouse and Eye Movement Biometrics for User Authentication; 5.1 Introduction; 5.2 Related Work. | |
505 | 8 | |a 5.2.1 Previous Research on Mouse Movements5.2.2 Previous Research on Eye Movements; 5.3 Experiment Setting and Design; 5.3.1 Experiment Setting; 5.3.2 Participants; 5.3.3 Experiment Design; 5.3.4 Experiment Procedure; 5.4 Data Processing and Feature Extraction; 5.4.1 Data Alignment; 5.4.2 Data Cleaning; 5.4.3 Data Visualization; 5.4.4 Feature Extraction; 5.5 Proposed Approaches; 5.5.1 Simple Multi-class Classification Model; 5.5.2 Binary Classification Model; 5.5.3 Regression Model Using Fusion; 5.6 Result and Discussion; 5.7 Conclusion and Future Research Direction; References. | |
504 | |a Includes bibliographical references and index. | ||
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
520 | |a This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. | ||
590 | |a SpringerLink |b Springer Complete eBooks | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer networks |x Security measures. | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
700 | 1 | |a Traoré, Issa, |d 1965- |e editor. | |
700 | 1 | |a Awad, Ahmed, |e editor. | |
700 | 1 | |a Woungang, Isaac, |e editor. | |
776 | 0 | 8 | |i Print version: |t Information security practices. |d Cham, Switzerland : Springer, [2017] |z 3319489461 |z 9783319489469 |w (OCoLC)959950255 |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://link.springer.com/10.1007/978-3-319-48947-6 |y Plný text |
992 | |c NTK-SpringerENG | ||
999 | |c 99679 |d 99679 | ||
993 | |x NEPOSILAT |y EIZ |