دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش:
نویسندگان: Hamid Jahankhani
سری: Advanced Sciences and Technologies for Security Applications
ISBN (شابک) : 3031201590, 9783031201592
ناشر: Springer
سال نشر: 2023
تعداد صفحات: 481
[482]
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 9 Mb
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Cybersecurity in the Age of Smart Societies: Proceedings of the 14th International Conference on Global Security, Safety and Sustainability, London, September 2022 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب امنیت سایبری در عصر جوامع هوشمند: مجموعه مقالات چهاردهمین کنفرانس بین المللی امنیت جهانی، ایمنی و پایداری، لندن، سپتامبر 2022 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب فرصتی را برای محققان، دانشمندان، مقامات دولتی، استراتژیستها و اپراتورها و نگهبانان سیستمها و زیرساختهای بزرگ، پیچیده و پیشرفته فراهم میکند تا دانش خود را با وضعیت بهترین عملکرد در حوزههای چالش برانگیز در حین شبکهسازی با نمایندگان برجسته، محققان و ارائه دهندگان راه حل. همهگیری مداوم سطح جدیدی از تهدیدات را ایجاد کرده است که چالشهای جدیدی را در مورد حریم خصوصی، حفاظت از دادهها، برنامههای مخرب، شبکههای محافظتنشده یا شبکههایی با حفاظت اولیه که به عنوان دروازهای به زیرساختهای بزرگتر با معماری پیچیده استفاده میشوند، و سوءاستفاده ناخواسته مانند موارد زیر را ایجاد میکند. مرتبط با سوگیری الگوریتمی همه اینها تعداد بردارهای حمله ای را که می توان برای حمله به چنین شبکه هایی استفاده کرد، افزایش داده است.
با تکیه بر 13 سال رویداد موفق در زمینه امنیت اطلاعات، پزشکی قانونی دیجیتال و جرایم سایبری، چهاردهمین ICGS3- کنفرانس 22 با هدف ارائه یک برنامه اطلاعاتی به شرکت کنندگان با نمایندگانی از سراسر صنعت و جهان است. چالشهای پیچیدگی، سرعت سریع تغییر و مسائل ریسک/فرصت مرتبط با محصولات، سیستمها، رویدادهای خاص و زیرساختها. در عصر بیسابقهای که محیطهای بیسابقه، سیاسی و اقتصادی در سراسر جهان وجود دارد، سیستمهای مبتنی بر رایانه با چالشها، اختلافات و مسئولیتهای روزافزونی مواجه هستند و در حالی که اینترنت بستری جهانی برای تبادل ایدهها، کالاها و خدمات ایجاد کرده است، همچنین فرصت های بی حد و حصری برای جرایم سایبری ایجاد کرد.
این جلد مطالب جدیدی را ارائه می دهد و از طریق پیشرفت های فناوری به دانش کمک می کند. که در هوش مصنوعی (AI)، یادگیری ماشین، بلاک چین و محاسبات کوانتومی ساخته می شوند. انتظار میرود که این فناوریها که توسط یک انقلاب دیجیتال هدایت میشوند، مخرب باشند و تحول دیجیتالی عمدهای را در نحوه عملکرد جوامع امروزی ایجاد کنند. در نتیجه، اگرچه این پیشرفتها مزایای اجتماعی و اقتصادی را فراهم میکنند، اما چالشهای جدیدی را نیز فراهم میکنند که صنعت امنیت برای مبارزه با آنها باید بازی خود را ارتقا دهد.
This book provides an opportunity for researchers, scientists, government officials, strategist and operators and maintainers of large, complex and advanced systems and infrastructure to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. The ongoing pandemic has created a new level of threats which presents new challenges around privacy, data protection, malicious application, unprotected networks or networks with basic protection that are being used as a gateway to larger infrastructure with complicated architecture, and unintentional misuse such as those associated with algorithmic bias. All these have increased the number of attack vectors that can be used to attack such networks.
Drawing on 13 years of successful events on information security, digital forensics and cyber-crime, the 14th ICGS3-22 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. In an era of unprecedented volatile, political and economic environment across the world, computer-based systems face ever more increasing challenges, disputes and responsibilities, and whilst the Internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber-crime.
This volume presents new materials and contribute to knowledge through the technological advances that are being made across artificial intelligence (AI), machine learning, blockchain and quantum computing. These technologies driven by a digital revolution are expected to be disruptive and provide major digital transformation in the way societies operate today. As result, although these advances provide social and economic benefits, but, also, provide new challenges that security industry need to raise their game to combat them.
Committee 14th International Conference on Security, Safety and Sustainability, ICGS3-22 Cybersecurity in the Age of Smart Societies 07th and 08th September 22 Contents Security Risk Management and Cybersecurity: From the Victim or from the Adversary? 1 Introduction 2 Dynamics of Cyber Risk. A Challenge from the Uncertain 3 Security Risk Management and Cybersecurity: From the Victim 4 Security and Cybersecurity Management: From the Adversary 5 Security Risk Management and Cybersecurity—Victim and Adversary 6 Conclusions References Comparison of Cybersecurity Methodologies for the Implementing of a Secure IoT Architecture 1 Introduction 2 Analysis of Methodologies 3 Assurance of Architecture 4 Case Study 5 Discussion of Results 6 Conclusions References A Critical Review into the Digital Transformation of Land Title Management: The Case of Mining in Zimbabwe 1 Introduction 2 Deployment of the Cadastre System in Zimbabwe 3 Blockchain Technology and Its Implications for Land Title Management 4 The Applicability of Blockchain and SSI Technology to Mining Title Management: Adaptation or Adoption? 5 Discussion of Applicability of Blockchain and SSI Technology to Mining Title Management 6 Steps Toward the Creation of a Smart City 7 How Blockchain-SSI Technology Can Facilitate the Adoption of Transparency and Accountability Initiatives (TAIs) 8 Conclusions References Harnessing Big Data for Business Innovation and Effective Business Decision Making 1 Introduction 2 Literature Review 2.1 Unstructured Data and Its Importance 2.2 Big Data Analytics and Its Various Facets in Business Practice 2.3 Source of Big Data Analytics and Its Role on Decision Making 2.4 Evaluation of Data Analytical Tools and Its Implication on Unstructured Data Analysis 3 Experimentation 4 Data Analysis and Mining 5 Discussion and Conclusions References Building a Resilient Cybersecurity Workforce: A Multidisciplinary Solution to the Problem of High Turnover of Cybersecurity Analysts 1 Introduction 1.1 People, Process, and Technology 1.2 Research Aim and Objectives 2 Literature Review 2.1 The Need for Security Operations in Contemporary Organisations 2.2 The Existing Skills Gap Problem in Cybersecurity and SOCs 2.3 The Current High Turnover Rate of SOC Analyst 2.4 The Cocktail of Reasons for Employee Turnover 2.5 The Risk Implications of High Turnover of SOC Analysts on Organisations 2.6 Finding Solutions to the High Turnover (a Multidisciplinary Approach) 3 Research Methodology 3.1 Sample Selection and Data Collection 3.2 Data Analysis 4 Data Presentation, Findings and Analysis 4.1 The Coding Framework 4.2 Data Coding, Categorisation, and Thematic Analysis 4.3 Other Emergent Codes from Empirical Data 5 Discussion 5.1 There is an Awareness of the Current High Turnover of SOC Analysts and the Potential Risk Implications to organisation’s Security Posture 5.2 Reasons for the Current High Turnover of SOC Analysts Are Many, Thus, Needing Tactical Solutions, Because There is no ‘One-Size-Fits-All’ Solution 5.3 The Role of Digital Leaders is Critical to Finding and Implementing Sustainable Solutions to the High Turnover of SOC Analysts 5.4 Understanding the Needs and Motivation of the New Generation of Employees is Critical in Employee Engagement and Retention 6 Conclusion and Recommendations 6.1 Recommendations 6.2 Further Research References The Reality of Cyber Security in Bangladesh, Relevant Laws, Drawbacks and Challenges 1 Introduction 2 Cyber Security in the Global Village 3 Cyber Violence Against Women in Bangladesh Coontext 3.1 Effects of Cyber Violence 4 Challenges to Bangladesh and Bangladesh Government 5 Existing Acts Related to Cyber Security and Their Limitations 6 Policy Opinions 6.1 Reform of the Legal Structure 6.2 Maintaining Rules of Cyber Security 6.3 Individual Awareness 7 Conclusion References Automatic Detection of Cyberbullying: Racism and Sexism on Twitter 1 Introduction 2 Literature Review 3 Methodology and Experimental Set-Up 3.1 Dataset Processing 3.2 TextCNN Simulation 3.3 Model Training and Optimisation 3.4 Model Prediction 3.5 Presentation and Analysis of Results 4 Analysis and Evaluation 4.1 Emotional Disposition Analysis 4.2 Commentary on Emotional Mining 5 Conclusions References Spying on Kids’ Smart Devices: Beware of Security Vulnerabilities! 1 Introduction 2 Literature Review 3 Methodology 3.1 MITM Attack—Rogue AP 3.2 Bluetooth Tracking 3.3 SMS Hacking 4 Experimental Findings 4.1 Results of MITM Attack—Rogue AP 4.2 Results of Bluetooth Attack 4.3 Results of SMS Hacking 5 Conclusions References IoT-Penn: A Security Penetration Tester for MQTT in the IoT Environment 1 Introduction 2 Background 3 Problem Statement 4 Background Knowledge 5 Research Approach 6 Experimental Design 6.1 Designing an MQTT Packet Capturing Tool 6.2 IoTPenn Application Design 7 Experimental Execution and Results 7.1 Attack 1: Packet Sniffing 7.2 Attack 2: Identity Spoofing 7.3 Attack 3: Privilege Escalation 7.4 Attack 4: CONNECT Flood 7.5 Attack 5: PUBLISH Flood 7.6 Attack 6: Excessive Payload 8 Results Interpretation 8.1 Research Limitations 8.2 Future Research 9 Conclusion References An Analysis of Cybersecurity Data Breach in the State of California 1 Introduction 2 Aims and Objectives 2.1 Aim 2.2 Specific Objectives 2.3 Research Question 3 California’s Data Security Breach Reporting Law 4 Methodology 4.1 Data Source 4.2 Data Scraping 4.3 Data Structure 5 Presentations of Findings 5.1 Analysis: Companies 5.2 Attack Analysis 5.3 Personal Information Analysis 6 Discussion of Findings 7 Limitations 8 Conclusion References Profiling Cyber Attackers by Classification Techniques; A Case Study on Russian Hackers 1 Introduction 1.1 AIMS and Objectives 2 Literature Review 2.1 Data Mining 2.2 Data Mining Techniques 2.3 Classification in Data Mining 2.4 Current Literature on Profiling and Data Mining Techniques 3 Methodology 3.1 Tools 3.2 Data Collection 3.3 Data Categorization 3.4 Data Analysis Method 4 Findings 4.1 Decision Tree Analysis 4.2 K—Nearest Neighbour Analysis 4.3 Naïve Bayes Analysis 4.4 Support Vector Machine Analysis 4.5 Multilayer Perceptron 5 Discussion of Findings 6 Conclusion 6.1 Contribution to Knowledge 6.2 Limitaions 6.3 Future Work References Developing a Novel Digital Forensics Readiness Framework for Wireless Medical Networks Using Specialised Logging 1 Introduction 2 Background and Literature Review 2.1 Evolution of Healthcare Networks 2.2 The Sensitivity of Healthcare Data 2.3 Security Challenges of Wireless Medical Networks (WMNs) 2.4 Digital Forensics Readiness (DFR) 2.5 Centralised DFR Within Wireless Medical Networks 2.6 Decentralised DFR Within Wireless Medical Networks 2.7 Blockchain Technology 3 A New Framework for DFR in Wireless Medical Networks (WMNs) 3.1 Introduction 3.2 Data Collection Layer (DCL) 3.3 Network Layer (NL) 3.4 Evidence Management Layer (EML) 4 Digital Forensics Investigation Process Using the Proposed Framework 5 Evaluation of Proposed Framework 5.1 Introduction 5.2 Standards-Based Evaluation 5.3 Scenario-Based Evaluation 6 Conclusion References Assembly, Deployment and Extension of Blockchain Based Decentralized Autonomous Organizations: A Framework Point of View 1 Introduction 2 Features of a DAO 2.1 Decentralisation 2.2 Autonomous 2.3 Transparent 2.4 Secure 2.5 Based on Smart Contracts 2.6 Financing and Tokens 3 Frameworks 3.1 Minimum Viable DAO 3.2 Smart Contracts 3.3 Shares and Governance 3.4 Rage Quit 4 Improved and Alternative DAO Frameworks 4.1 Future Frameworks 5 Challenges and Recommendations 5.1 Voter Apathy 5.2 Risk of Centralisation 5.3 Not Everyone is an Expert on Everything 6 Conclusion References Artificial Intelligence Techniques in Cybersecurity Management 1 Introduction 2 Related Surveys on AI in Cybersecurity 3 AI in Cybersecurity 3.1 AI as a Tool in Combating Cyberattacks Why Cybersecurity is Essential 3.2 Why Cybersecurity is Essential 3.3 AI Algorithms in Cybersecurity 3.4 Impact of AI in Cybersecurity Management 3.5 Cybersecurity Frameworks and Solutions 4 Conclusion References The Role of Blockchain to Reduce the Dissemination of Fake News on Social Media and Messaging Platforms 1 Introduction 2 Literature Review 2.1 COVID-19, Misinformation, and the Risks 2.2 Machine Learning 2.3 Cryptocurrencies 2.4 The Internet and Other Technologies 2.5 Blockchain Integration 3 Research Method 3.1 Voting Model 3.2 DeHide 3.3 Blockchain and Keyed Watermarking-Based Model 4 Critical Discussion 4.1 Conclusions and Future Work References Profiling Suspected Chinese Cyber Attacks by Classification Techniques 1 Introduction 2 Literature Review 2.1 Introduction to Data-Mining 2.2 Data-Mining Related Works 2.3 Classification 3 Methodology 3.1 Data-Mining Tools Used 3.2 Gathering of Datasets 3.3 Categorisation of the Dataset 3.4 Data Pre-Processing Stage 3.5 Dataset Statistics 3.6 Ethical Considerations 3.7 Section Conclusion 4 Research Findings 4.1 K-Fold Cross Validation 4.2 Application of Various Classifiers 4.3 Section Conclusion 5 Research Discussions 5.1 Introduction 5.2 Evaluation of Research Results 5.3 Section Conclusion 6 Research Conclusion 6.1 Contribution to Knowledge 6.2 Limitations to the Study 6.3 Recommendations for Future Research Ideas References What Drives Generation Z to Behave Security Compliant? An Extended Analysis Using the Theory of Planned Behaviour 1 Introduction 2 Literature Review 2.1 Security Awareness 2.2 Behavioural Economics and Theory of Planned Behaviour 2.3 Generation Z 3 Research Methodology 3.1 First Attribute: Attitude 3.2 Second Attribute: Subjective Norms 3.3 Third Attribute: Perceived Behavioural Control 3.4 Results 4 Results, Analysis and Evaluation 4.1 General Discussions 4.2 Proposal for Implementation 5 Research Evaluation and Limitations References Cyber Security Compliance Among Remote Workers 1 Introduction 1.1 Background 1.2 Problem Description 1.3 Significance of the Study 1.4 Objectives 2 Literature Review 2.1 Cybersecurity Compliance Framework 2.2 Organizational Cybersecurity Culture 2.3 Cybersecurity Compliance Practices 2.4 Work Design and Remote Working 3 Methodology 4 The Conceptual Framework and Hypothesis Development 5 Results 6 Discussion and Recommendations 6.1 Organizational Cyber Security Compliance Strategies Awareness 6.2 Cybersecurity Compliance Challenges of Remote Workers 6.3 Maintaining Trust, Safeguarding, and Reducing Insider Risk/Human Error Through Compliance 6.4 Recommendations 7 Conclusion References An Analysis of the Dark Web Challenges to Digital Policing 1 Introduction 2 Background and Context 3 Challenges 3.1 Technical 3.2 Legal 3.3 Ethical 4 Recommendations 4.1 Technical 4.2 Legal 4.3 Ethical 5 Discussion 6 Conclusion References Are Small Medium Enterprises Cyber Aware? 1 Introduction 2 Methods 2.1 Interviewees Profiles 3 Results 4 Discussion 5 Conclusion References ‘HOAXIMETER’—An Effective Framework for Fake News Detection on the World Wide Web 1 Introduction 2 Literature Review 3 Methodology 3.1 Analysis of Previously Proposed Frameworks 3.2 HOAXIMETER 4 Conclusion and Future Work References Cyber Resiliency in Electric Power Industry Based on the Maturity Model 1 Introduction 2 Cyber Security Model of Smart Power Networks (SGMM) 3 Eight Aspects of Smart Grid Cyber Security Maturity Model 4 Levels of the SGMM Model 5 The Process of Developing a Roadmap for Smart Cyber Security in Energy Distribution and Transmission Companies 6 Assessment of the Current Situation 6.1 Organizational Business Goals 6.2 Awareness of Stakeholder Needs and Regulatory Requirements 6.3 Smart Cyber Security Outlook 6.4 Gap Analysis 6.5 Ideation 7 Predicting and Prioritizing Actions 8 Conclusion References Blockchain Technology in Cybersecurity Management 1 Introduction 2 Related Research on Blockchain in Cybersecurity Management 3 The Use of Blockchain to Improve Cybersecurity 4 Conclusion References The Impact of the Internet on Terrorism and Violent Extremism 1 Introduction 2 The Internet as an Attractive Option 3 The Exploitation of the Internet in Cyberterrorism 4 Acts of Terrorism Using the Internet 5 The Use of the Internet to Counter Cyber Threats 6 Discussion and Concluding Remarks References A Critical Review of Digital Twin Confidentiality in a Smart City 1 Introduction 2 Background and Related Work 2.1 Digital Twin Computing Background 2.2 Smart City Background and Digital Twin Relevance 2.3 Digital Twin Integration with Smart Cities 2.4 Relatable Standards and Guidance for Smart City Digital Twins 2.5 Legal Requirements to Protect Private Data 3 Organisations Concerned with the Development of Smart Cities 4 Current Considerations for Digital Twin Cyber Security 5 Risks and Architectural Requirements 6 Conclusion References IoE Security Risk Analysis in a Modern Hospital Ecosystem 1 Introduction 1.1 Overview of Cyber-Attacks in the Healthcare Industry 2 Related Work 3 Methodology 4 IT Defense Recommendations for Hospitals 5 Conclusions References The Future Era of Quantum Computing 1 Introduction 2 Encryption and Decryption 3 Quantum Computing Implementation 4 E-Commerce and E-Payments 5 Blockchain 6 IBM 7 Conclusion 8 Future Work References