05629nam 22007211 450 991045322290332120200520144314.00-12-410487-8(CKB)2550000001160042(EBL)1562332(OCoLC)863824418(SSID)ssj0001036627(PQKBManifestationID)11672609(PQKBTitleCode)TC0001036627(PQKBWorkID)11042613(PQKB)10944563(MiAaPQ)EBC1562332(CaSebORM)9780124114746(Au-PeEL)EBL1562332(CaPaEBR)ebr10800155(CaONFJC)MIL543247(EXLCZ)99255000000116004220130821h20142014 uy 0engur|n|---|||||txtccrEmerging trends in ICT security /edited by Babak Akhgar, Hamid R. Arabnia1st editionWaltham, Massachusetts :Morgan Kaufmann/Elsevier,[2014]©20141 online resource (662 p.)Description based upon print version of record.0-12-411474-1 1-306-11996-0 Includes bibliographical references and index.Front Cover; Emerging Trends in ICT Security; Copyright Page; Contents; Acknowledgments; Review Board; About the Editors; List of Contributors; Preface; 1 Information and Systems Security; 1 Theory/Reviews of the Field; 1 System Security Engineering for Information Systems; Introduction; System security engineering history; The system security engineering process; The revitalization of system security engineering; Established system security engineering methods, processes, and tools; Acquisition program protection planning; Information assurance; Systems engineering critical reviewsModern and emerging system security engineering methods, processes, and tools Discovery and understanding of complex systems for security; Mission assurance; Formalized security requirements; Early design considerations; Plan for failure; Security and system patterns; Leveraging system architectures for security; Agile and self-organizing system security; Security metrics and evaluation; Identified SSE research areas; Conclusion; Recommendations; Disclaimer; Acknowledgments; References; Further reading; 2 Metrics and Indicators as Key Organizational Assets for ICT Security AssessmentIntroduction GOCAME strategy overview; GOCAME conceptual framework; GOCAME process and the W5H rule; Security evaluation for a web system: A proof of concept; Target entity and information need; Security characteristic specification; Metric and indicator specifications; Implementing the M&E; Risk and security vulnerability issues; Metrics and indicators for repeatable and consistent analysis: a discussion; Related work; Conclusion and future work; References; 3 A Fresh Look at Semantic Natural Language Information Assurance and Security: NL IAS from Watermarking and Downgrading to...Introduction Early breakthrough in NL IAS; The conceptual foundation of NL IAS; NL IA applications; NL watermarking; NL tamperproofing; NL sanitizing/downgrading; NL steganography and steganalysis; A sketch of ontological semantic technology; Mature semantic NL IAS; Semantic forensics; Unintended inferences and the meaning of the unsaid; Situational conceptual defaults; The term, its origins, and the canonical case; Default reversal; Are defaults really common sense knowledge?; Underdetermination of reality by language; Scripts; Anonymization; Summary; Acknowledgments; References; 2 Methods4 An Approach to Facilitate Security Assurance for Information Sharing and Exchange in Big-Data Applications Introduction; UML extensions for XML security; Extensions for policy modeling and integration; Integrating local security policies into a global security policy; Assumptions and equivalence finding; Integration process for local SPSS; Resolving conflicts of integrated security rule sets; Creating the global SPSS; Related work; Conclusion; References; 5 Gamification of Information Security Awareness Training; Introduction; Literature review; General concepts; Serious gamesGames adoption in multiple domainsEmerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. Provides aInformation technologySecurity measuresComputer crimesPreventionCyberterrorismPreventionElectronic surveillanceElectronic books.Information technologySecurity measures.Computer crimesPrevention.CyberterrorismPrevention.Electronic surveillance.005.8Akhgar Babak959742Arabnia Hamid959823MiAaPQMiAaPQMiAaPQBOOK9910453222903321Emerging trends in ICT security2270431UNINA