Cybersecurity Vigilance and Security Engineering of Internet of Everything

This book first discusses cyber security fundamentals then delves into security threats and vulnerabilities, security vigilance, and security engineering for Internet of Everything (IoE) networks. After an introduction, the first section covers the security threats and vulnerabilities or techniques...

Full description

Bibliographic Details
Other Authors: Naseer Qureshi, Kashif (Editor), Newe, Thomas (Editor), Jeon, Gwanggil (Editor), Chehri, Abdellah (Editor)
Format: eBook
Language:English
Published: Cham Springer Nature Switzerland 2024, 2024
Edition:1st ed. 2024
Series:Internet of Things, Technology, Communications and Computing
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Description
Summary:This book first discusses cyber security fundamentals then delves into security threats and vulnerabilities, security vigilance, and security engineering for Internet of Everything (IoE) networks. After an introduction, the first section covers the security threats and vulnerabilities or techniques to expose the networks to security attacks such as repudiation, tampering, spoofing, and elevation of privilege. The second section of the book covers vigilance or prevention techniques like intrusion detection systems, trust evaluation models, crypto, and hashing privacy solutions for IoE networks. This section also covers the security engineering for embedded and cyber-physical systems in IoE networks such as blockchain, artificial intelligence, and machine learning-based solutions to secure the networks. This book provides a clear overview in all relevant areas so readers gain a better understanding of IoE networks in terms of security threats, prevention, and other security mechanisms. Discusses cyber security threats and vulnerabilities, security vigilance, and security engineering for IoE networks; Provides prevention techniques like intrusion detection, trust evaluation, crypto, and hashing privacy solutions; Features tips to secure networks from security attacks like repudiation, tampering, spoofing, and elevation of privilege
Physical Description:XVII, 220 p. 43 illus., 38 illus. in color online resource
ISBN:9783031451621