Details

Cyber-Vigilance and Digital Trust


Cyber-Vigilance and Digital Trust

Cyber Security in the Era of Cloud Computing and IoT
1. Aufl.

von: Wiem Tounsi

139,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 29.04.2019
ISBN/EAN: 9781119618379
Sprache: englisch
Anzahl Seiten: 256

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

Cyber threats are ever increasing. Adversaries are getting more sophisticated and cyber criminals are infiltrating companies in a variety of sectors. In today’s landscape, organizations need to acquire and develop effective security tools and mechanisms – not only to keep up with cyber criminals, but also to stay one step ahead.<br /> <br /> Cyber-Vigilance and Digital Trust develops cyber security disciplines that serve this double objective, dealing with cyber security threats in a unique way. Specifically, the book reviews recent advances in cyber threat intelligence, trust management and risk analysis, and gives a formal and technical approach based on a data tainting mechanism to avoid data leakage in Android systems
<p><b>Introduction ix</b><br /> <i>Wiem TOUNSI</i></p> <p><b>Chapter 1. What Is Cyber Threat Intelligence and How Is It Evolving? </b><b>1<br /> </b><i>Wiem TOUNSI</i></p> <p>1.1. Introduction 1</p> <p>1.2. Background 3</p> <p>1.2.1. New Generation Threats 3</p> <p>1.2.2. Analytical Frameworks 6</p> <p>1.3. Cyber Threat Intelligence 9</p> <p>1.3.1. Cyber Threat Intelligence Sources 9</p> <p>1.3.2. Cyber Threat Intelligence Sub-Domains 11</p> <p>1.3.3. Technical Threat Intelligence (TTI) 13</p> <p>1.4. Related Work 14</p> <p>1.5. Technical Threat Intelligence Sharing Problems 16</p> <p>1.5.1. Benefits of CTI Sharing for Collective Learning 16</p> <p>1.5.2. Reasons for Not Sharing 17</p> <p>1.6. Technical Threat Intelligence Limitations 21</p> <p>1.6.1. Quantity Over Quality 21</p> <p>1.6.2. IOC-Specific Limitations 22</p> <p>1.7. Cyber Threat Intelligent Libraries or Platforms 25</p> <p>1.7.1. Benefits of CTI Libraries Based In the Cloud 26</p> <p>1.7.2. Reluctance to Use Cloud Services 26</p> <p>1.8. Discussion 27</p> <p>1.8.1. Sharing Faster Is Not Sufficient 27</p> <p>1.8.2. Reducing the Quantity of Threat Feeds 28</p> <p>1.8.3. Trust to Share Threat Data and to Save Reputation Concerns 30</p> <p>1.8.4. Standards for CTI Representation and Sharing 31</p> <p>1.8.5. Cloud-Based CTI Libraries for Collective Knowledge and Immunity 34</p> <p>1.9. Evaluation of Technical Threat Intelligence Tools 36</p> <p>1.9.1. Presentation of Selected Tools 37</p> <p>1.9.2. Comparative Discussion 38</p> <p>1.10. Conclusion and Future Work 39</p> <p>1.11. References 40</p> <p><b>Chapter 2. Trust Management Systems: A Retrospective Study on Digital Trust </b><b>51<br /> </b><i>Reda YAICH</i></p> <p>2.1. Introduction 51</p> <p>2.2. What Is Trust? 52</p> <p>2.3. Genesis of Trust Management Systems 54</p> <p>2.3.1. Access Control Model 54</p> <p>2.3.2. Identity-Based Access Control 55</p> <p>2.3.3. Lattice-Based Access Control 57</p> <p>2.3.4. Role-Based Access Control 58</p> <p>2.3.5. Organization-Based Access Control 59</p> <p>2.3.6. Attribute-Based Access Control 61</p> <p>2.4. Trust Management 62</p> <p>2.4.1. Definition 62</p> <p>2.4.2. Trust Management System 64</p> <p>2.4.3. Foundations 65</p> <p>2.4.4. Automated Trust Negotiation 70</p> <p>2.5. Classification of Trust Management Systems 72</p> <p>2.5.1. Authorization-Based TMSs 73</p> <p>2.5.2. Automated Trust Negotiation Systems 81</p> <p>2.6. Trust Management In Cloud Infrastructures 90</p> <p>2.6.1. Credentials-Based Trust Models 90</p> <p>2.6.2. SLA-Based Trust Models 90</p> <p>2.6.3. Feedback-Based Trust Models 91</p> <p>2.6.4. Prediction-Based Trust Models 92</p> <p>2.7. Conclusion 93</p> <p>2.8. References 94</p> <p><b>Chapter 3. Risk Analysis Linked to Network Attacks </b><b>105<br /> </b><i>Kamel KAROUI</i></p> <p>3.1. Introduction 105</p> <p>3.2. Risk Theory 107</p> <p>3.2.1. Risk Analysis Terminology 107</p> <p>3.2.2. Presentation of the Main Risk Methods 109</p> <p>3.2.3. Comparison of the Main Methods 116</p> <p>3.3. Analysis of IS Risk In the Context of IT Networks 120</p> <p>3.3.1. Setting the Context 120</p> <p>3.3.2. Risk Assessment 127</p> <p>3.3.3. Risk Treatment 133</p> <p>3.3.4. Acceptance of Risks 136</p> <p>3.3.5. Risk Communication 137</p> <p>3.3.6. Risk Monitoring 138</p> <p>3.4. Conclusion 138</p> <p>3.5. References 138</p> <p><b>Chapter 4. Analytical Overview on Secure Information Flow In Android Systems: Protecting Private Data Used By Smartphone Applications </b><b>141<br /> </b><i>Mariem GRAA</i></p> <p>4.1. Introduction 142</p> <p>4.2. Information Flow 143</p> <p>4.2.1. Explicit Flows 143</p> <p>4.2.2. Implicit Flows 143</p> <p>4.2.3. Covert Channels 144</p> <p>4.3. Data Tainting 145</p> <p>4.3.1. Interpreter Approach 145</p> <p>4.3.2. Architecture-Based Approach 146</p> <p>4.3.3. Static Taint Analysis 146</p> <p>4.3.4. Dynamic Taint Analysis 147</p> <p>4.4. Protecting Private Data In Android Systems 149</p> <p>4.4.1. Access Control Approach 149</p> <p>4.4.2. Preventing Private Data Leakage Approach 153</p> <p>4.4.3. Native Libraries Approaches 157</p> <p>4.5. Detecting Control Flow 160</p> <p>4.5.1. Technical Control Flow Approaches 160</p> <p>4.5.2. Formal Control Flow Approaches 162</p> <p>4.6. Handling Explicit and Control Flows In Java and Native Android Appsʼ Code 164</p> <p>4.6.1. Formal Specification of the Under-Tainting Problem 164</p> <p>4.6.2. Formal Under-Tainting Solution 166</p> <p>4.6.3. System Design 175</p> <p>4.6.4. Handling Explicit and Control Flows In Java Android Appsʼ Code 176</p> <p>4.6.5. Handling Explicit and Control Flows In Native Android Appsʼ Code 180</p> <p>4.6.6. Evaluation 184</p> <p>4.6.7. Discussion 187</p> <p>4.7. Protection Against Code Obfuscation Attacks Based on Control Dependencies In Android Systems 188</p> <p>4.7.1. Code Obfuscation Definition 188</p> <p>4.7.2. Types of Program Obfuscations 189</p> <p>4.7.3. Obfuscation Techniques 189</p> <p>4.7.4. Code Obfuscation In Android System 190</p> <p>4.7.5. Attack Model 191</p> <p>4.7.6. Code Obfuscation Attacks 192</p> <p>4.7.7. Detection of Code Obfuscation Attacks 194</p> <p>4.7.8. Obfuscation Code Attack Tests 195</p> <p>4.8. Detection of Side Channel Attacks Based on Data Tainting In Android Systems 198</p> <p>4.8.1. Target Threat Model 199</p> <p>4.8.2. Side Channel Attacks 200</p> <p>4.8.3. Propagation Rules for Detecting Side Channel Attacks 203</p> <p>4.8.4. Implementation 205</p> <p>4.8.5. Evaluation 207</p> <p>4.9. Tracking Information Flow In Android Systems Approaches Comparison: Summary 210</p> <p>4.10. Conclusion and Highlights 215</p> <p>4.11. References 216</p> <p>List of Authors 227</p> <p>Index 229</p>
<p>Wiem Tounsi, PhD, is Head of the Managed Security Services and R&D division at Axians Cybersecurity Paris, France. Her research interests include network security and privacy issues, mainly policies management, threat analysis and lightweight cryptography. She has authored several research papers in high-level international journals and conferences, and has been an invited keynote speaker at several major scientific conferences. </p>

Diese Produkte könnten Sie auch interessieren:

MDX Solutions
MDX Solutions
von: George Spofford, Sivakumar Harinath, Christopher Webb, Dylan Hai Huang, Francesco Civardi
PDF ebook
53,99 €
Concept Data Analysis
Concept Data Analysis
von: Claudio Carpineto, Giovanni Romano
PDF ebook
107,99 €
Handbook of Virtual Humans
Handbook of Virtual Humans
von: Nadia Magnenat-Thalmann, Daniel Thalmann
PDF ebook
150,99 €