Blockchain And Other Emerging Technologies For Digital Business Strategies

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book aims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst performing business activities. Furthermore, this book looks to investigate the interactions from both the organization strategy including the cross-functional actors/stakeholders whom are operating within the organization and the various characteristics of operating in a cyber secure ecosystem. The book provides a valuable reference for IT directors, strategic leaders, cybersecurity experts, network security professionals. It is also aimed at researchers seeking to obtain a more profound knowledge of machine learning and deep learning in the context of cybersecurity. Furthermore, the book is an exceptional advanced text for Ph.D. and master’s degree programs in cybersecurity, network security and computer science. Each chapter is written by an internationally renowned expert who has extensive experience in law enforcement, industry or academia. Furthermore, this book blends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills.

Author(s): Hamid Jahankhani, David V. Kilpin, Stefan Kendzierskyj
Series: Advanced Sciences And Technologies For Security Applications
Edition: 1
Publisher: Springer
Year: 2022

Language: English
Commentary: TruePDF
Pages: 318
Tags: Business Strategy And Leadership; Data And Information Security; Emerging Technologies; Artificial Intelligence

Contents
Cybersecurity Challenges in Small and Medium Enterprise (SMEs)
1 Introduction
2 Implications for Social Change
3 Information Security Risk Management
3.1 Information Technology Capability and Investment
3.2 Management Attitude Toward Security
3.3 Training and Awareness
4 Does Cloud Answer the Cybersecurity Challenges in SMEs?
5 Cybersecurity Frameworks
5.1 NIST Cybersecurity Framework
5.2 The Center for Internet Security (CIS) Critical Security Controls
5.3 COSO Enterprise Risk Management Framework
5.4 ISO/IEC 27001
5.5 Italian Cybersecurity Framework
5.6 Control Objectives for Information and Related Technologies (COBIT)
5.7 Information Technology Infrastructure Library (ITIL) Framework
5.8 Information Security for Small and Medium Sized Enterprises (ISSA) 5173 (UK)
6 The Most Common Types of Cyber-Attacks in Businesses
7 Security Information and Event Management (SIEM)
8 Conclusions
References
Artificial Intelligence Based Malicious Traffic Detection
1 Introduction
2 Literature Review
3 Research Methodology
3.1 Neural Networks
3.2 Building and Training of the Model
3.3 Tools and Virtual Environments
3.4 Ethical/Social/Legal Issues
3.5 Limitations
4 Data Analysis and Critical Discussion
4.1 Data Pre-processing
4.2 Artificial Intelligence System
4.3 AI Model Analysis
4.4 Analysis of AI Model Using IoT-23 Dataset
4.5 Performance Analysis Using TensorBoard
5 Conclusions and Future Work
References
Video Camera in the Ambient Assisted Living System. Health Versus Privacy
1 Introduction
2 Medical Data Registration in AAL
2.1 Vital Signs
2.2 AAL for MCI and Dementia Patients
2.3 Video Observation in AAL
3 AAL Evaluation Methods
3.1 Conceptual Stage
3.2 Model
3.3 Prototype
3.4 Impact Assessment
3.5 Questionnaires
3.6 Questionnaire. Statistical Analysis
4 Research
4.1 Method
4.2 Reliability
4.3 Focus Group
4.4 Health Versus Privacy. Results
5 Conclusion
References
An Examination of How the Interaction Between Senior IT Managers and C-Level Executives Impacts on Cyber Resilience When Undertaking a Digital Transformation Project
1 Introduction
2 Literature Review
3 Research Methodology
3.1 Research Design
3.2 Data Collection Method
3.3 Research Philosophy
3.4 Research Approach
3.5 Population and Sampling
3.6 Data Analysis
3.7 Ethical Considerations
4 Data Analysis
4.1 Cyber Resilience
5 Methodologies and Frameworks
5.1 Cyber Resilience—A Business Problem or an IT Problem?
6 Critical Discussion and Recommendations
7 Conclusions
References
Digital Twin Technologies, Architecture, and Applications: A Comprehensive Systematic Review and Bibliometric Analysis
1 Introduction
2 Related Work
2.1 DT Definitions
2.2 DT Characteristics
2.3 Digital Twin Technologies
2.4 DT Architecture
2.5 Digital Twin Applications
3 Materials and Methods
3.1 Identification of Sources and Data Collection
3.2 Data Analysis Methods
4 Findings and Discussion
4.1 Findings
4.2 Discussion
5 Conclusion and Recommendation
5.1 Conclusion
5.2 Limitations
5.3 Future Works
References
Emerging Technologies: Blockchain and Smart Contracts
1 Introduction
1.1 From Conception to Implementation
1.2 Core Elements
2 The Fundamentals of Blockchain
2.1 Node Architecture
2.2 Consensus Types
2.3 Digital Signatures and Cryptographic Hash
2.4 Types of Blockchains
2.5 Ethereum and Smart Contracts
3 Beyond Blockchain
3.1 Distributed Ledger Technology
3.2 Benefits of DLT and Blockchain
3.3 Challenges of DLT and Blockchain
4 Use Case Examples
4.1 Bitcoin and Cryptocurrencies
4.2 Smart Contract Implementations
4.3 Financial Services
4.4 Anti-Money Laundering
4.5 Healthcare and Pharmaceuticals
4.6 Supply Chain
4.7 Agriculture
5 Implementation in Modern Businesses
5.1 Discovery and Preparedness Assessment
5.2 Design and Planning
5.3 Implementation and Review
6 Future Trends
7 Conclusion
References
An Investigation into How Smartphones Can Be Secured Against MiTM Attacks: Financial Sector
1 Introduction
2 Literature Review
2.1 MiTM Attacks
2.2 Security Vulnerabilities and Attacks in Mobile Banking and Trading Apps
2.3 Android and iOS—Security Compromise Issues and Analysis
2.4 Cyberattacks During COVID-19 Pandemic
2.5 Blockchain Technology
2.6 Using Artificial Intelligence Mitigation Predicated ML Techniques Against Attacks
2.7 New Security Features in Wi-Fi 6 WPA3 and Enhanced WPA2 Security
3 Methodologies and Frameworks
3.1 Research Design
3.2 Data Analysis
3.3 MiTM Attack Demonstrations
4 Data Analysis and Discussion
4.1 Explaining the 4-Way Handshake Problem/vulnerability
4.2 WPA3 Dragonfly Handshake and the Dragonblood Vulnerability
4.3 Zero-Day Attack
4.4 Data Analysis and Data Visualization
4.5 Comparative Data Analysis Between MiTM DoS and ARP Poisoning Attacks
4.6 Security in 802.11ax and 802.11be; 5G and 6G
4.7 Wi-Fi and Human Health
5 Conclusion and Future Work
References
Digital Transformation, Leadership, and Markets
1 Digital Leadership
2 Cyber Security Defence Including Ransomware Attacks for Small and Medium-Sized Businesses in the Digital Economy
3 Information Governance, Security, and e-Governance
4 The Role of AR/ VR and Holographic Technology in Corporate Decision Making
5 Emerging Technologies (Blockchain, Zero Trust and Digital Twin)
5.1 Blockchain Technology
5.2 Zero Trust Security Strategies and Guideline
5.3 Digital Twin
6 Ethics, Privacy, Safety and Security of Digital Systems
6.1 Artificial Intelligence and Machine Learning in Management
6.2 Big Data; Harvesting and Digital Footprint
6.3 Cybercrimes
7 Conclusions
References
Challenges and Opportunities of Autonomous Cyber Defence (ACyD) Against Cyber Attacks
1 Introduction
1.1 The Import Role and Influence of AI/ML in Cyber Security
2 How Malware Cyber Attacks Occur?
2.1 How Malware Attacks Can Be Detected?
2.2 Threat Actors and Impacts of Attacks
3 Literature Review
3.1 Malware Identification
3.2 Challenges of Detecting AI Cyber Attack
4 Research Methodology
4.1 Research Limitation
4.2 Ethical, Economical, Legal, Social and Political Issues
5 Research Findings and Critical Discussion
5.1 Detecting and Preventing Autonomous Malware
5.2 Implementing and Detecting Countermeasures
5.3 Mitre ATT&CK
5.4 Malicious Autonomous Malware Attack
5.5 How to Auto Detect Autonomous Reflective Injection Attack (Critical Mitre Attack)
5.6 Analysis of the Detection and Corrective Action Taken
5.7 User Behaviour Anomaly
5.8 Education and Training
5.9 Legislative and Regulatory Controls
6 Conclusion and Future Works
References
Secure Deployment of IOT Devices
1 Literature Review
1.1 IoT Architecture
1.2 IoT Security Challenges
1.3 IoT Attacks Based on Three-Layered IoT Architecture
1.4 Smart Devices in SMEs
1.5 Existing Guidelines for Secure Integration of IoT Devices
1.6 Related Academic Works
1.7 Research Approach
2 Experimental Work
2.1 Phase 1: Securing Network Using a Router
2.2 Phase 2: Using Extra Firewall
2.3 Shared Phase: Securing IoT Device
3 Discussion
4 Conclusion
5 Limitations and Future Works
References