Vai al contenuto principale della pagina

Cybersecurity Vigilance and Security Engineering of Internet of Everything



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Naseer Qureshi Kashif Visualizza persona
Titolo: Cybersecurity Vigilance and Security Engineering of Internet of Everything Visualizza cluster
Pubblicazione: Cham : , : Springer, , 2024
©2024
Edizione: 1st ed.
Descrizione fisica: 1 online resource (229 pages)
Altri autori: NeweThomas  
JeonGwanggil  
ChehriAbdellah  
Nota di contenuto: Intro -- Editor's Note -- Preface -- Part A: Security Threats and Vulnerabilities -- Part B: Security Vigilance and Security Engineering for IoE Networks -- Acknowledgments -- Cyber Skills -- Contents -- About the Authors -- Part I: Security Threats and Vulnerabilities -- Chapter 1: Internet of Everything: Evolution and Fundamental Concepts -- 1.1 Introduction -- 1.2 Enabling Communication Technologies for IoE Networks -- 1.3 IoE Applications -- 1.4 IoE Execution and Implementation Challenges -- 1.5 Acceptance and Sustainability -- 1.6 Proposed Five-Layer Conceptual Model -- 1.6.1 Everything Layer -- 1.6.2 Application Layer -- 1.6.3 Virtual Layer -- 1.6.4 Data Handling Layer -- 1.6.5 Communication Layer -- 1.7 Discussion and Findings -- 1.8 Conclusion -- References -- Chapter 2: Cybersecurity Threats and Attacks in IoE Networks -- 2.1 Introduction -- 2.2 Internet of Everything -- 2.2.1 IoE Components -- 2.2.2 IoE Key Enabling Technologies -- 2.3 IoE Threat Landscape -- 2.3.1 IoE Threat Modeling -- 2.4 IoE Cybersecurity Architecture -- 2.4.1 Cybersecurity Vulnerabilities, Threats, and Attacks in Perception Layer -- 2.4.2 Identity-Based Trust and Privacy Provocation -- 2.4.3 Spoofing and Sybil Attacks -- 2.4.4 Access-Level Attacks -- 2.4.5 Transmitting Data Attacks -- 2.4.6 Attacks Based on Device Property -- 2.4.7 Attacks Based on Adversary Location -- 2.4.8 Attacks Based on Attack Strategy -- 2.4.9 Insecure Initialization and Configuration -- 2.5 Cybersecurity Considerations and Solutions in Perception Layer -- 2.5.1 Cybersecurity Vulnerabilities, Threats, and Attacks in Network Layer -- 2.5.1.1 Security Solutions for Wired Networks -- 2.5.1.2 Security Solutions for Mobile Networks -- 2.5.1.3 Security Solutions for Wireless Networks -- 2.5.2 Cybersecurity Vulnerabilities, Threats, and Attacks in Support/Middleware Layer.
2.5.3 Cybersecurity Considerations and Solutions in Support/Middleware Layer -- 2.5.4 Cybersecurity Vulnerabilities, Threats, and Attacks in Application Layer -- 2.5.5 Cybersecurity Considerations and Solutions in Application Layer -- 2.5.6 IoE Business Layer Security -- 2.5.7 IoE End-to-End Security -- 2.6 Conclusion -- References -- Chapter 3: Attack Detection Mechanisms for Internet of Everything (IoE) Networks -- 3.1 Introduction -- 3.2 Definition, Elements, and Applications of IoE Networks -- 3.2.1 IoE Network Components -- 3.2.2 Applications of IoE Networks -- 3.3 Challenges and Issues -- 3.4 IoE Security Requirements -- 3.5 Security Attacks in IoE -- 3.6 IoE: Security Vulnerabilities -- 3.7 Security Risks in IoE -- 3.8 Privacy Challenges in IoE -- 3.9 Attack Detection and Countermeasures -- 3.10 Conclusion -- References -- Chapter 4: Cyber-Resilience, Principles, and Practices -- 4.1 Introduction -- 4.2 Building Cyber-Resilience in Industry Using CYBER INTEL -- 4.2.1 Traction Plc. (Selected Use-Case) -- 4.2.2 Cyber-Threat Landscape -- 4.2.3 Data Security and Risk Management -- 4.2.4 Cyber and Data Protection Laws & -- Regulations -- 4.2.5 Governance, Risk and Control - Data Protection -- 4.2.6 NIST Risk Management Framework -- 4.2.7 Incident Response Planning -- 4.2.7.1 Preparation -- 4.2.7.2 Detection and Analysis -- 4.2.7.3 Containment, Eradication and Recovery -- 4.2.7.4 Post Incident Activity -- 4.3 Cybersecurity Compliance -- 4.4 Governance, Risk & -- Compliance - Audit Assurance -- 4.5 Cyber-Resilience -- 4.6 Enhanced Cybersecurity Posture Achieved Using the CYBER INTEL Framework -- 4.7 Conclusion and Future Directions -- References -- Chapter 5: Future Cybersecurity Challenges for IoE Networks -- 5.1 Overview -- 5.2 Introduction -- 5.3 IoE Working Architecture -- 5.3.1 Sensors and Devices -- 5.3.2 Connectivity.
5.3.3 Cloud and Edge Computing -- 5.3.4 Big Data Analytics -- 5.3.5 Artificial Intelligence and Machine Learning -- 5.3.6 Security -- 5.4 Applications of IoE -- 5.5 Security Architecture of IoT as Compared to IoE -- 5.6 Generic Challenges of IoE Network -- 5.7 Cybersecurity Challenges in IoE -- 5.7.1 IoE Network Vulnerabilities -- 5.8 Future Threads to IoE Networks -- 5.9 Conclusion -- References -- Part II: Security Vigilance and Security Engineering for IoE Networks -- Chapter 6: Networking and Security Architectures for IoE Networks -- 6.1 Overview -- 6.2 Internet of Everything -- 6.3 Pillars of IoE -- 6.4 Proposed Security Architecture for IoE Networks -- 6.4.1 Advanced Wire- and Wireless-Based Technologies for IoE Security Architecture -- 6.4.2 IEEE 802.15.4 Medium Access Control (MAC) Superframe Structure for Network Communication -- 6.4.3 IEEE 802.15.6 Medium Access Control (MAC) Superframe Structure for Network Communication -- 6.4.3.1 MAC Superframe Structure of IEEE 802.15.6 -- 6.5 Data Collection, Recognition, and Processing in Multiple Environment of IoE -- 6.6 Diverse Technologies in IoEs -- 6.6.1 Internet of Ad Hoc Network (IoAV) -- 6.6.2 Internet of Vehicular Ad Hoc Network (IoVAN) -- 6.6.3 Internet of Mobile Ad Hoc Networks (IoMANs) -- 6.6.4 Internet of Ambulance (IoA) -- 6.6.5 Internet of Air Traffic (IoAT) -- 6.6.6 Internet of Smart Building (IoSM) -- 6.6.7 Internet of Underwater Things (IoUTs) -- 6.7 Security in IoE Networks -- 6.7.1 Intrusion Detection Systems -- 6.7.2 Authentication -- 6.8 Proposed DIP Architecture to Secure IoE Networks -- 6.9 Conclusion -- References -- Chapter 7: Machine Learning-Based Detection and Prevention Systems for IoE -- 7.1 Overview -- 7.2 Evolution of IoT to IoE -- 7.3 Importance of Machine Learning in IoE -- 7.4 Intrusion Detection and Prevention Systems.
7.5 Existing IDPS Solutions Designed for IoE Networks -- 7.6 Attacks in IoE Networks and Its Pretension by Using ML-Based IDPS Systems -- 7.7 Pros and Cons of ML in Detection and Prevention Systems -- 7.8 Conclusion -- References -- Chapter 8: Role of Blockchain for IoE Infrastructures and Applications -- 8.1 Internet of Everything -- 8.2 Introduction to Blockchain -- 8.3 Types of Blockchain -- 8.4 Understanding How Blockchain Works -- 8.5 Role of Blockchain in the Internet of Everything -- 8.6 A Framework for Blockchain in IoE -- 8.7 Conclusion -- References -- Chapter 9: Cybersecurity as a Service -- 9.1 Introduction -- 9.2 CSaaS Functions -- 9.2.1 Security Personnel as a Service -- 9.2.2 Cyber-awareness Training -- 9.2.3 Vulnerability Assessment -- 9.2.4 Periodic Penetration Testing -- 9.2.5 E-mail Security -- 9.2.6 Identity and Access Management -- 9.2.7 Cyber Insurance -- 9.2.8 Incident Response -- 9.2.9 Business Continuity/Disaster Recovery Planning -- 9.2.10 Security Information and Event Management -- 9.2.11 System Patching and Updates -- 9.2.12 Security Standards Compliance -- 9.3 Future of CSaaS -- 9.4 Findings and Suggestions -- 9.5 Conclusion -- References -- Chapter 10: Big Data Analytics for Cybersecurity in IoE Networks -- 10.1 Introduction -- 10.2 Big Data Analytics -- 10.3 Securing IoE with Big Data Analytics -- 10.4 Related Work -- 10.4.1 Big Data Commercial Solutions for Cybersecurity -- 10.5 Processing Methodology Using Big Data -- 10.6 Cybersecurity Architecture Based on Big Data -- 10.7 Data Analytics Architecture for Cybersecurity Applications -- 10.7.1 Indicators Module -- 10.8 Discussion -- 10.9 Conclusion -- References -- Chapter 11: Cybersecurity Standards and Policies for CPS in IoE -- 11.1 Overview -- 11.2 Introduction -- 11.3 Information Security Standards Requirements, Policy, and Elements.
11.3.1 Information Security Policy Elements -- 11.4 Existing IoE Security Standards -- 11.4.1 ISO 27KX - ISO -- 11.4.2 ISO 27001 -- 11.4.3 ISO 27002 -- 11.4.4 ISO 38500 -- 11.4.5 HIPAA -- 11.4.6 GDPR -- 11.4.7 PCI-DSS -- 11.4.8 NIST-800-53 -- 11.4.9 COBIT -- 11.4.10 PRINCE2 -- 11.4.11 NIST CSF -- 11.5 Technical Comparison of the Standards -- 11.6 A Security Framework for IoE Networks -- 11.7 Conclusion -- References -- Chapter 12: Future Privacy and Trust Challenges for IoE Networks -- 12.1 Overview -- 12.2 Internet of Everything -- 12.3 Concepts, Basic Cardinals, Significance -- 12.4 Challenges and Vulnerabilities -- 12.4.1 People Security -- 12.4.2 Data Security -- 12.4.3 Security of Things -- 12.5 Data Trust and Mistrust in IoE -- 12.5.1 Trustful -- 12.5.2 Untruthful -- 12.5.3 Trust Is Critical in IoE -- 12.5.4 Privacy and Trust Issues -- 12.6 Security and Privacy Issues -- 12.7 Open Issues in Research, Future Trends, and Way Forward -- 12.7.1 Challenges -- 12.7.2 Open Research Issues -- 12.8 Conclusions -- References -- Index.
Titolo autorizzato: Cybersecurity Vigilance and Security Engineering of Internet of Everything  Visualizza cluster
ISBN: 3-031-45162-7
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910767586503321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Internet of Things Series