Information Security and Privacy in Smart Devices : Tools, Methods, and Applications » MIRLIB.RU - ТВОЯ БИБЛИОТЕКА
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Information Security and Privacy in Smart Devices : Tools, Methods, and Applications
/
Information Security and Privacy in Smart Devices : Tools, Methods, and ApplicationsНазвание: Information Security and Privacy in Smart Devices: Tools, Methods, and Applications
Автор: Carlos Rabadao, Leonel Santos
Издательство: IGI Global
Год: 2023
Страниц: 352
Язык: английский
Формат: epub (true)
Размер: 13.8 MB

In recent years, smart devices have become commonplace in our daily lives. On the Internet of Things (IoT), these devices powered new intelligent services. Their application enabled the rise of intelligent cities, smart agriculture, and Industry 4.0. However, smart devices collect and share large amounts of data, including the habits and preferences of their users. Cybersecurity incidents in intelligent environments may impact services used by millions across the world and make private information public. Information Security and Privacy in Smart Devices: Tools, Methods, and Applications presents research challenges, innovative insights, and trends related to solutions, methods, processes, and applications for maintaining information security and privacy in intelligent environments. Covering topics such as information retrieval methods, electronic health records, and misinformation detection, this premier reference source is an excellent resource for security professionals, government officials, business leaders and executives, IT managers, hospital administrators, students of higher education, librarians, researchers, and academicians.

Chapter 1 discusses the design of remotely readable metering systems that fully conform to legal regulations. The chapter presents eight steps for data controllers that make metering systems legally compliant and lists recommendations for intelligent meter manufacturers that remove the burden of being a data processing controller.

Chapter 2 discusses the security, effectiveness, and drawbacks of authentication systems based on distinct authentication factors, like knowledge, ownership, location, and social data, as well as some unresolved issues and future research directions.

Recent technological innovations turned a myriad of devices, from smartphones to IoT devices, into daily life. On the other hand, it also highly increased the number of unstructured data sources available. Contextual cybersecurity information gathered from data sources such as sensing data, application logs, and vulnerability reports may be aggregated and used with Cyber Threat Intelligence (CTI) to assist cybersecurity officers in making timely decisions. Chapter 3 showcases the use of CTI in intelligent environments and how to incorporate and integrate data from multiple sources directly into the analysis efforts.

The controller area network (CAN) serial bus is the most employed communication protocol in vehicles. Such a protocol was designed with robust fault tolerance but little concern for security. Chapter 4 describes the CAN's typical architecture and its vulnerabilities. The chapter discusses using intrusion detection systems (IDS) as a potential solution to the security concerns raised by CAN bus vulnerabilities and also presents several case studies on IDS implementations for secure CAN bus systems.

Chapter 5 deals with security and privacy concerns in the context of the Intelligent Transportation System. Although these systems have been studied for a long time, their implementation started in more recent years. Intelligent Transportation systems are very relevant in the context of smart cities, as they reduce the time spent in transit and make road trips more secure and efficient.

Indeed, preserving privacy became a major concern in recent years. Privacy-Preserving Data Publishing (PPDP) algorithms and tools aim to balance the privacy protection of sensitive data and the utility of anonymized data. Chapter 6 reviews the use of PPDP in the presence of Multiple Sensitive Attributes. The chapter presents a comparative analysis of the effectiveness of PPDP algorithms, focusing on privacy and utility goals.

Скачать Information Security and Privacy in Smart Devices : Tools, Methods, and Applications





ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!





[related-news]
[/related-news]
Комментарии 0
Комментариев пока нет. Стань первым!