Combating Security Breaches and Criminal Activity in the Digital Sphere

Editor/Author Geetha, S. and Phamila, Asnath Victy
Publication Year: 2016
Publisher: IGI Global

Single-User Purchase Price: $205.00
Unlimited-User Purchase Price: $307.50
ISBN: 978-1-5225-0193-0
Category: Technology & Engineering - Technology
Image Count: 95
Book Status: Available
Table of Contents

Combating Security Breaches and Criminal Activity in the Digital Sphere is a pivotal reference source for the latest scholarly research on current trends in cyber forensic investigations, focusing on advanced techniques for protecting information security and preventing potential exploitation for online users.

Share this

Table of Contents

  • Editorial Advisory Board and List of Reviewers
  • Preface
  • Section 1: Digital Sphere Threats and Vulnerabilities
  • Chapter 1: A Review on Digital Sphere Threats and Vulnerabilities
  • ABSTRACT
  • 1. INTRODUCTION
  • 2. BACKGROUND
  • 3. DIGITAL SPHERE ISSUES
  • 4. SECURITY THREATS
  • 5. SECURITY VULNERABILITIES
  • 6. SECURITY ATTACKS
  • 7. FUTURE WORK
  • 8. CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 2: Advances in Biometrics for Secure Human Authentication System
  • ABSTRACT
  • INTRODUCTION
  • BACKGROUND
  • FUTURE RESEARCH DIRECTIONS
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 3: Against Spoofing Attacks in Network Layer
  • ABSTRACT
  • INTRODUCTION
  • VARIOUS SPOOFING ATTACKS
  • DEFENSE SCHEMES FOR NETWORK LAYER SPOOFING
  • CONCLUSION
  • REFERENCES
  • Chapter 4: Classification of Cybercrimes and Punishments under the Information Technology Act, 2000
  • ABSTRACT
  • INTRODUCTION
  • BACKGROUND
  • LAWS RELATED TO CYBER CRIMES IN INDIA
  • SOLUTIONS AND RECOMMENDATIONS
  • FURTHER RESEARCH DIRECTIONS
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Section 2: Techniques for Combating Security Breaches
  • Chapter 5: Cloud Crime and Fraud
  • ABSTRACT
  • INTRODUCTION
  • BACKGROUND
  • SECURITY AND PRIVACY ISSUES
  • SOLUTIONS AND RECOMMENDATIONS
  • FUTURE RESEARCH DIRECTIONS
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 6: Combating Cyber Security Breaches in Digital World Using Misuse Detection Methods
  • ABSTRACT
  • 1. INTRODUCTION
  • 2. BACKGROUND
  • 3. DATA SET USED IN THIS RESEARCH
  • 4. PROPOSED MODEL FOR MISUSE DETECTION SYSTEM
  • 5. CLASSIFICATION RESULTS
  • 6. COMPARISON OF PERFORMANCE
  • 7. CONCLUSION AND FUTURE WORK
  • REFERENCES
  • Chapter 7: Critical Video Surveillance and Identification of Human Behavior Analysis of ATM Security Systems
  • ABSTRACT
  • INTRODUCTION
  • FUNDAMENTAL ELEMENTS IN VIDEO TRACKING
  • TRACKING AND PEOPLE COUNTING SYSTEM
  • TRACKING AND COUNTING SYSTEM ARCHITECTURE
  • CASE STUDY
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 8: Digital Evidence in Practice
  • ABSTRACT
  • 1. INTRODUCTION
  • 2. CLASSIFICATION OF DIGITAL EVIDENCE
  • 3. COLLECTION OF DIGITAL EVIDENCE
  • 4. VALIDATION OF DIGITAL EVIDENCE
  • 5. PRESERVING THE DIGITAL EVIDENCE
  • 6. TOOLS
  • 7. STANDARDS FOR THE EXCHANGE OF DIGITAL EVIDENCE
  • 8. CONCLUSION
  • REFERENCES
  • Section 3: Cyber Forensics and Investigation
  • Chapter 9: Digital Forensic and Machine Learning
  • ABSTRACT
  • INTRODUCTION TO FORENSIC COMPUTING
  • NEED FOR DIGITAL FORENSIC
  • DIGITAL FORENSIC TOOLS
  • TYPES OF FORENSIC HARDWARE
  • DIGITAL FORENSIC INVESTIGATION SOFTWARE TOOLS
  • MACHINE LEARNING
  • DIGITAL FORENSIC AND MACHINE LEARNING
  • SOLUTION
  • A SUMMARIZED WORKFLOW OF THE METHODOLOGY
  • CONCLUSION AND FUTURE WORK
  • REFERENCES
  • Chapter 10: Effective Recognition of Stereo Image Concealed Media of Interpolation Error with Difference Expansion
  • ABSTRACT
  • INTRODUCTION
  • INTERPOLATION AND REVERSIBLE DATA HIDING
  • BACKGROUND
  • PROPOSED STEGANALYSIS ALGORITHM
  • EXPERIMENTAL RESULTS
  • CONCLUSION
  • REFERENCES
  • Chapter 11: Mobile Malware
  • ABSTRACT
  • INTRODUCTION
  • OWASP TOP 10 MOBILE RISKS OF 2015
  • WIRELESS AND APPLICATION ATTACK TYPES
  • BASIC FORENSIC PROCEDURE
  • SIGNS OF MALWARE
  • MALWARE ANALYSIS
  • MITIGATION AND DETERRENT TECHNIQUES
  • REFERENCES
  • Chapter 12: Network Intrusion Detection and Prevention Systems on Flooding and Worm Attacks
  • ABSTRACT
  • INTRODUCTION TO NETWORK ATTACKS
  • CLASSIFICATION OF ATTACKS
  • OBJECTIVES OF DETECTION MECHANISMS FOR NETWORK SECURITY
  • RELATED WORKS AND LITERATURE SURVEY
  • DETECTING THE SOURCE OF TCP SYN FLOOD ATTACK
  • ISSUES IN EXISTING TECHNIQUES
  • PROPOSED SOLUTION TO DETECT THE SOURCE OF TCP SYN FLOOD ATTACK
  • COMPARISON WITH EXISTING TECHNIQUES
  • NETWORK INTRUSION PREVENTIVE STRATEGIES: FLOODING ATTACKS
  • CENTRALIZED WORM DETECTOR (CWD) TECHNIQUE
  • TWO FISH ALGORITHM
  • CENTRALISED WORM DETECTOR (CWD) TECHNIQUE IMPLEMENTATION
  • COMPARISON WITH THE EXISTING TECHNIQUES
  • NETWORK INTRUSION PREVENTION STRATEGIES: WORM ATTACKS
  • SUMMARY AND CONCLUSION
  • REFERENCES
  • Section 4: Visual Information Security
  • Chapter 13: A Systematic Mapping of Security Mechanisms
  • ABSTRACT
  • INTRODUCTION
  • INTERNET INFRASTRUCTURE ATTACKS
  • ATTACK MOTIVATIONS
  • ATTACK CLASSIFICATION
  • CONCLUSION
  • REFERENCES
  • Chapter 14: Understanding Anti-Forensics Techniques for Combating Digital Security Breaches and Criminal Activity
  • ABSTRACT
  • INTRODUCTION
  • NETWORK ANTI-FORENSICS
  • HARD DISK ANTI-FORENSICS
  • HARD DISKS WIPE
  • HARD DISK PHYSICAL DESTRUCTION
  • STEGANOGRAPHY
  • REFERENCES
  • Chapter 15: Visual Cryptography for Securing Images in Cloud
  • ABSTRACT
  • INTRODUCTION
  • VISUAL CRYPTOGRAPHY
  • RANDOM GRID BASED VISUAL CRYPTOGRAPHY
  • SEGMENT-BASED VISUAL CRYPTOGRAPHY
  • MULTIPLE IMAGE VISUAL CRYPTOGRAPHY (MIVC)
  • EXTENDED VISUAL CRYPTOGRAPHY SYSTEM (EVCS)
  • VISUAL CRYPTOGRAPHY FOR GRAYSCALE AND COLOR IMAGES USING HALFTONING TECHNIQUES
  • PROGRESSIVE VISUAL CRYPTOGRAPHY
  • VISUAL CRYPTOGRAPHY USING CHAOTIC MAPPING
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 16: Visual Sensor Networks
  • ABSTRACT
  • INTRODUCTION
  • VSN APPLICATIONS
  • FUTURE OF SECURITY IN VSN
  • CONCLUSION
  • REFERENCES
  • ADDITIONAL READING
  • KEY TERMS AND DEFINITIONS
  • Compilation of References
  • About the Contributors