Security Designs for the Cloud, IoT, and Social Networking

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Along with providing an overview of cloud computing, this book talks about the various other dimensions involved in it such as the risk issues and security challenges in cloud computing. It highlights the appplication safety and service vulnerability in cloud network. It also gives an introduction to IoT security and its open challenges, IoT architecture security and the introduction into the social network and its security issues, as well as the cyberspace security in the digital age.

Author(s): Adele Kuzmiakova
Publisher: Arcler Press
Year: 2022

Language: English
Pages: xx; 240
City: Burlington
Tags: Computer and Information Science

Cover
Title Page
Copyright
ABOUT THE EDITOR
TABLE OF CONTENTS
List of Figures
List of Tables
List of Abbreviations
Preface
Chapter 1 Cloud Computing Overview
1.1. Introduction
1.2. Cloud Computing Layers
1.3. Deployment Models for Cloud
1.4. Computing Architectures
1.5. Expected Benefits
1.6. Reduced Costs
1.7. Architectural Considerations
1.8. Information Classification
1.9. Security Fundamentals of Cloud Computing Software
1.10. Symmetric Encryption Algorithms
1.11. Advanced Encryption Standard (AES)
1.12. Asymmetric Encryption Algorithms
1.13. Confidentiality, Integrity, and Availability (CIA)
1.14. Cloud Security Services
1.15. Conclusion
References
Chapter 2 Risks Issues and Security Challenges in Cloud Computing
2.1. Introduction
2.2. What Is Cloud Computing?
2.3. Cloud Computing Risks and Challenges in Businesses
2.4. Standardization Activities in Cloud Computing
2.5. Vulnerabilities and Threats
2.6. Strategies to Mitigate Cloud Risk
2.7. Conclusion
References
Chapter 3 Application Safety and Service Vulnerability in Cloud Network
3.1. Introduction
3.2. Cloud Application Security in Different Cloud Services
3.3. Top Cloud Application Security Threats
3.4. What Cloud Application Security Options Are Available?
3.5. Who Is In Charge of Cloud Application Security?
3.6. Essential Characteristics of Cloud Network
3.7. Cloud-Specific Vulnerabilities
3.8. The Best Defense in Cloud Network Safety
3.9. Privacy-Preservation for Sensitive Data in Cloud Computing
3.10. Conclusion
References
Chapter 4 Introduction to Internet of Things (IoT) Security and Its Open Challenges
4.1. Introduction
4.2. What is IoT ?
4.3. Security Role in the IoT Development
4.4. IoT Architecture
4.5. The Importance of IoT Security
4.6. Essential Focus Areas for IoT Security
4.7. How to Ensure Your Iot System is Secure?
4.8. Trust, Data Confidentiality, and Privacy In IoT
4.9. Biggest Security Challenges for IoT
4.10. Future of IoT
4.11. Conclusion
References
Chapter 5 IoT Architecture Security
5.1. Introduction
5.2. IoT Architecture
5.3. IoT Security Threats, Impacts, and Challenges
5.4. IoT Ecosystems Are Difficult to Monitor and Manage
5.5. IoT Ecosystems Can Be Inherently Insecure
5.6. IoT Standards and Regulations are Obscure
5.7. Security in IOT
5.8. Security Features At Various Layer of IoT
5.9. Software Defined Networks (SDN)
5.10. SDN Based Architecture for IOT
5.11. Security Architecture Issues in the IOT
5.12. Insecure Access Control
5.13. Conclusion
References
Chapter 6 Security in Enabling Technologies
6.1. Introduction
6.2. Application of Tracking Technology
6.3. High-Reliability System Configuration
6.4. Privacy Concerns for 6LoWPAN
6.5. Security Concerns For 6LoWPAN
6.6. Challenges in Fog Computing
6.7. Temporary Stateless Addresses Auto-Configuration
6.8. Discussion of Security Framework for SDN
6.9. Conclusion
References
Chapter 7 Introduction to Social Network and Its Security Issues
7.1. Introduction
7.2. Social Networking
7.3. Historical Development of Social Networking Sites
7.4. Types of Social Networks
7.5. Popular Social Websites
7.6. Applications
7.7. Impact of Social Networks on Society
7.8. Some Security Issues In Social Network
7.9. National Security Issues
7.10. Recommendations and Countermeasures
7.11. Conclusion
References
Chapter 8 Cyberspace Security in Digital Age
8.1. The Start of Cybersecurity
8.2. Importance of Cyber Security in the Digital World?
8.3. Why Cyber Security is Critical for Companies?
8.4. The Importance of Cybersecurity In Digital Transformation
8.5. Why is Cybersecurity Lagging In Digital Transformation?
8.6. How Can Cybersecurity Ensure Successful Digital Transformation?
8.7. Overcoming Paralysis by Analysis When it Comes to Cyber Risk and Cyber Security
8.8. Embedding Cybersecurity Into Digital Transformation
8.9. Security in the Digital Age
8.10. Cybersecurity Best Practices
8.11. Cybersecurity’s Dual Mission During the Coronavirus Crisis
8.12. Vulnerability Discovery Models (VDMS)
8.13. Conclusion
References
Index
Back Cover