Information Security Practices : Emerging Threats and Perspectives /

This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigm...

Full description

Saved in:
Bibliographic Details
Corporate Authors: SpringerLink (Online service)
Group Author: Traor , Issa (Editor); Awad, Ahmed (Editor); Woungang, Isaac. (Editor)
Published: Springer International Publishing : Imprint: Springer,
Publisher Address: Cham :
Publication Dates: 2017.
Literature type: eBook
Language: English
Subjects:
Online Access: http://dx.doi.org/10.1007/978-3-319-48947-6
Summary: This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .
Carrier Form: 1 online resource (VII, 104 pages) : illustrations
ISBN: 9783319489476
Index Number: TK1
CLC: TP3
Contents: Chapter 1.Introduction Emerging Threats call for New Security Paradigms -- Chapter 2. Botnets Threat Analysis and Detection -- Chapter 3. Collective Framework for Fraud Detection using Behavioral Biometrics -- Chapter 4. The Hardware Trojan System: An On-line Suite of Tools for Hardware Trojan Analysis -- Chapter 5. The Hardware Trojan System: An On-line Suite of Tools for Hardware Trojan Analysis -- Chapter 6. Ensuring Online Exam Integrity through Continuous Biometric Authentication -- Chapter 7.An Enhanced CUSUM Algorithm for Anomaly Detection -- Chapter 8. Conclusion: Future Trends and Challenges.