Title Cybersecurity and Privacy
Subtitle Bridging the Gap (River Publishers Series in Software Engineering)
Author Samant Khajuria, Lene Sørensen, Knud Erik Skouby
ISBN 9788793519664
List price USD 109.00
Price outside India Available on Request
Original price
Binding Hardbound
No of pages 238
Book size 152 X 235 mm
Publishing year 2017
Original publisher River Publishers (Eurospan Group)
Published in India by .
Exclusive distributors Viva Books Private Limited
Sales territory India, Sri Lanka, Bangladesh, Pakistan, Nepal, .
Status New Arrival
About the book Send Enquiry


The huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is increasingly on the agenda both at company and at individual level.


Cybersecurity and Privacy - bridging the gap addresses two very complex fields of the digital world, i.e., Cybersecurity and Privacy. These multifaceted, multidisciplinary and complex issues are usually understood and valued differently by different individuals, data holders and legal bodies. But a change in one field immediately affects the others. Policies, frameworks, strategies, laws, tools, techniques, and technologies - all of these are tightly interwoven when it comes to security and privacy.


This book is another attempt to bridge the gap between the industry and academia. The book addresses the views from academia and industry on the subject. Technical topics discussed in the book include:

  • Cybersecurity
  • Encryption
  • Privacy policy
  • Trust
  • Security and Internet of Things
  • Botnets
  • Data risks
  • Cloudbased Services
  • Visualization




List of Figures

List of Tables

List of Abbreviations


Chapter 1: An Introduction to Security Challenges in User-Facing Cryptographic Software - (Greig Paul and James Irvine) • Usability and Security • Background • Practical Cryptographic Implementation • Analysis of a Selection of Android Encryption Apps • Main Findings • Priorities to Improve upon Existing Applications • Implementation Considerations • Key Derivation Stage • Master Key Generation and Use • Cipher Use and Initialisation • Indistinguishability and Resistance to Malleability • Authentication of Ciphertexts • Padding Attacks • Discussion • Conclusions • References

Chapter 2: “Take It or Leave It”: Effective Visualization of Privacy Policies - (Prashant S. Dhotre,
Anurag Bihani, Samant Khajuria and Henning Olesen) • Introduction • Related Work • Survey and Machine Learning-based Methodologies • Privacy Enhancing Tools • Privacy Policy Elucidator Tool (PPET) • Privacy Categories Definition (Core Contents of a Privacy Policy) • General Description of the Tool • Corpus Design • Preprocessing • Privacy Policy Detector • Database Description • PPET Architecture and Modelling • Classification • Summarization and Ranking • Results • Recommendations • Conclusion and Future Work • References

Chapter 3: A Secure Channel Using Social Messaging for Distributed Low-Entropy Steganography - (Eckhard Pfluegel, Charles A. Clarke,
Joakim G. Randulff, Dimitris Tsaptsinos and James Orwell) • Introduction • Outline of Proposed Method • Research Contributions • Chapter Organisation • Previous Work • UP Anonymity • UGC Confidentiality • Distributed High-Entropy Steganography Approach • Proposed Architecture • Implementation • Conclusion • References

Chapter 4: Computational Trust - (Birger Andersen, Bipjeet Kaur and Henrik Tange) • Introduction • Trust • Security and Trust • Trust Models • Fuzzy Trnst Model Description • Reputation Evaluation • Eigen Trust Algorithm • Notion of Trust • Example: PGP Web of Trust • Example: X.509 Certificates • Summary • References

Chapter 5: Security in Internet of Things - (Egon Kidmose and Jens Myrup Pedersen) • Introduction • Examples of Problematic IoT Devices • IP Camera • Internet Gateways • Smart Energy Meters • Automotive IoT • IoT and Health • The Smart Home and Appliances • Security Challenges in IoT • Security Recommendations • Conclusion • References

Chapter 6: Security in the Industrial Internet of Things - (Aske Hornbæk Knudsen, Jens Myrnp Pedersen, Mikki Alexander, Mousing SØrensen and Theis Dahl Villumsen) • Introduction • Background • Introducing Penetration Testing • Methods • Tools • Findings • Results • Recommendations • Conclusion • References

Chapter 7: Modern & Resilient Cybersecurity The Need for Principles, Collaboration Innovation Education & the Occasional Application of Power - (Ole Kjeldseu) • Introduction • Trends • Trends in Summary • Protect Detect & Respond • Protect • Detect • Respond • Beyond Protect Detect and Respond • Cyber-Offense • Deterrence & Disruption • Resilience • Importance of Culture to a Resilient Cybersecurity Strategy • Global Security Intelligence Graph • The Use of Big Data • Emerging Innovative Technologies • Cloud Computing • Internet of Things • Artificial lntelligence • Partnerships • Conclusion

Chapter 8: Building Secure Data Centers for Cloud Based Services - A Case Study - (Lars Kierkegaard) • The Emergence of a New Industrial Era • Cloud Based Services and Data Centers • Types of Data Centers • Security Considerations • Case: Teracom A/S • Future Perspectives • References

Chapter 9: Pervasive Governance - Understand and Secure Your Transaction Data & Content - (Kristoffer Rohde) • Introduction • The Challenges and Risks of Unmanaged Data & Content • The Fragmented Approach • The Classic Records Management Approach • Keeping Legacy Systems Alive - Just In Case The Ideal Scenario • Enterprise content management • Core retention capability • Formal records management capability • Archiving & decommissioning – privacy by design • The Need for a pervasive Governance Strategy • Understanding Your Unstructured Content • Automated Intelligence • Content Classification • Actionable Intelligence through Reporting • Automating Policy • An Application Decommissioning Program • The Decommissioning Factory • Developing a Roadmap • Phase 1: Program Governance • Phase 2: Application Decommissioning Factory Bootstrap • Train IT staff • Coordinate with other business services • Automate technology selection • Use proof of concept to reduce risk • Phase 3: Application Decommissioning Projects • Business and data analysis • Design and build • Conclusion – Solving the Challenges of Unmanaged Data & Content • References

Chapter 10: Challenges of Cyber Security and a Fundamental Way to Address Cyber Security - (Fei Liu and Marcus Wong) • Introduction • Security by Design • Functional Design over Security Design • Proliferation of Internet • Being a Big Target • Quick to Market • Design Aspect • Cyber Security Paradigm Shift • Security Assurance • Security Assurance Challenges • Market Place Challenges • Regulatory Challenges • Requirements of Security Assurance • Security Assurance Process • Goals of Security Assurance • Challenges of Security Assurance • 3GPP Security Assurance • 3GPP Security Assurance Approach • Security Assurance around the Globe • Conclusion • References


About the Editors

About the Editors:

Samant Khajuria, CMI/Aalborg University, Denmark

Lene Sørensen, CMI/Aalborg University, Denmark

Knud Erik Skouby, CMI/Aalborg University, Denmark

Target Audience:

This book is a useful for people interested in Cybersecurity, Encryption, Privacy policy, Trust, Security and Internet of Things, Botnets, Data risks, Cloudbased Services and Visualization.

Special prices are applicable to the authorised sales territory only.
Prices are subject to change without prior notice.