Cover Page

Series Editor

Guy Pujolle

Cyber-Vigilance and Digital Trust

Cyber Security in the Era of Cloud Computing and IoT

Edited by

Wiem Tounsi

images

Introduction

This book starts by dealing with cyber threat intelligence in Chapter 1. Cyber threat intelligence is an actionable defense and evidence-based knowledge to reduce the gap between advanced attacks and organization defense means in order to aid specific decisions or to illuminate the risk landscape. This chapter classifies and makes distinctions among existing threat intelligence types and focuses particularly on technical threat intelligence issues and the emerging research, trends and frameworks.

Since threat data are sensitive, organizations are often reluctant to share threat information with their peers when they are not in a trusted environment. Trust, combined with new cloud services, is a solution to improve collective response to new threats. To deepen this approach, the second chapter of this book addresses digital trust and identifies mechanisms underlying trust management systems. It introduces basic concepts of trust management and classifies and analyzes several trust management systems. This chapter shows how trust management concepts are used in recent systems to address new challenges introduced by cloud computing.

When threats are not well addressed, any vulnerability could be exploited and could generate costs for the company. These costs can be of human, technical and financial nature. Thus, to get ahead of these threats, a preventive approach aiming to analyze risks is paramount. This is the subject of the third chapter of this book, which presents a complete information system risk analysis method deployed on various networks. This method is applicable to and is based on network security extensions of existing risk management standards and methods.

Finally, a detective approach based on both dynamic and static analysis is defined in the fourth chapter to defend sensitive data of mobile users, against information flow attacks launched by third-party applications. A formal and technical approach based on a data tainting mechanism is proposed to handle control flow in Java and native applications’ code and to solve the under-tainting problem, particularly in Android systems.

Introduction written by Wiem TOUNSI