Cyber security : issues and current trends / Nitul Dutta, Nilesh Jadav, Sudeep Tanwar, Hiren Kumar Deva Sarma, Emil Pricop.
2022
QA76.9.A25 D87 2022
Linked e-resources
Linked Resource
Online Access
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Cyber security : issues and current trends / Nitul Dutta, Nilesh Jadav, Sudeep Tanwar, Hiren Kumar Deva Sarma, Emil Pricop.
Author
Dutta, Nitul, author.
ISBN
9789811665974 (electronic bk.)
9811665974 (electronic bk.)
9789811665967
9811665966
9811665974 (electronic bk.)
9789811665967
9811665966
Published
Singapore : Springer, [2022]
Copyright
©2022
Language
English
Description
1 online resource : illustrations (chiefly color)
Item Number
10.1007/978-981-16-6597-4 doi
Call Number
QA76.9.A25 D87 2022
Dewey Decimal Classification
005.8
Summary
This book presents various areas related to cybersecurity. Different techniques and tools used by cyberattackers to exploit a system are thoroughly discussed and analyzed in their respective chapters. The content of the book provides an intuition of various issues and challenges of cybersecurity that can help readers to understand and have awareness about it. It starts with a very basic introduction of security, its varied domains, and its implications in any working organization; moreover, it will talk about the risk factor of various attacks and threats. The concept of privacy and anonymity has been taken into consideration in consecutive chapters. Various topics including, The Onion Router (TOR) and other anonymous services, are precisely discussed with a practical approach. Further, chapters to learn the importance of preventive measures such as intrusion detection system (IDS) are also covered. Due to the existence of severe cyberattacks, digital forensics is a must for investigating the crime and to take precautionary measures for the future occurrence of such attacks. A detailed description of cyberinvestigation is covered in a chapter to get readers acquainted with the need and demands. This chapter deals with evidence collection from the victim's device and the system that has importance in the context of an investigation. Content covered in all chapters is foremost and reported in the current trends in several journals and cybertalks. The proposed book is helpful for any reader who is using a computer or any such electronic gadget in their daily routine. The content of the book is prepared to work as a resource to any undergraduate and graduate-level student to get aware about the concept of cybersecurity, various cyberattacks, and threats in the security. In addition to that, it aimed at assisting researchers and developers to build a strong foundation for security provisioning in any newer technology which they are developing.
Bibliography, etc. Note
Includes bibliographical references.
Access Note
Access limited to authorized users.
Digital File Characteristics
text file
PDF
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed November 8, 2021).
Added Author
Jadav, Nilesh, author.
Tanwar, Sudeep, author.
Sarma, Hiren Kumar Deva, author.
Pricop, Emil, author.
Tanwar, Sudeep, author.
Sarma, Hiren Kumar Deva, author.
Pricop, Emil, author.
Series
Studies in computational intelligence ; v. 995. 1860-9503
Available in Other Form
Print version: 9789811665967
Linked Resources
Online Access
Record Appears in
Online Resources > Ebooks
All Resources
All Resources
Table of Contents
Chapter 1. Introduction to Cybersecurity
Chapter 2. Being Hidden and Anonymous
Chapter 3. TOR-The Onion Router
Chapter 4. DarkNet and Hidden Services
Chapter 5. Introduction to Digital Forensics
Chapter 6. Intrusion Detection Systems fundamentals
Chapter 7. Introduction to Malware Analysis
Chapter 8. Design of a Virtual Cybersecurity Lab
Chapter 9. Importance of Cyber Law.
Chapter 2. Being Hidden and Anonymous
Chapter 3. TOR-The Onion Router
Chapter 4. DarkNet and Hidden Services
Chapter 5. Introduction to Digital Forensics
Chapter 6. Intrusion Detection Systems fundamentals
Chapter 7. Introduction to Malware Analysis
Chapter 8. Design of a Virtual Cybersecurity Lab
Chapter 9. Importance of Cyber Law.