Cybersecurity Vigilance and Security Engineering of Internet of Everything

This book first discusses cyber security fundamentals then delves into security threats and vulnerabilities, security vigilance, and security engineering for Internet of Everything (IoE) networks. After an introduction, the first section covers the security threats and vulnerabilities or techniques...

Full description

Bibliographic Details
Other Authors: Naseer Qureshi, Kashif (Editor), Newe, Thomas (Editor), Jeon, Gwanggil (Editor), Chehri, Abdellah (Editor)
Format: eBook
Language:English
Published: Cham Springer Nature Switzerland 2024, 2024
Edition:1st ed. 2024
Series:Internet of Things, Technology, Communications and Computing
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03593nmm a2200385 u 4500
001 EB002188051
003 EBX01000000000000001325536
005 00000000000000.0
007 cr|||||||||||||||||||||
008 231206 ||| eng
020 |a 9783031451621 
100 1 |a Naseer Qureshi, Kashif  |e [editor] 
245 0 0 |a Cybersecurity Vigilance and Security Engineering of Internet of Everything  |h Elektronische Ressource  |c edited by Kashif Naseer Qureshi, Thomas Newe, Gwanggil Jeon, Abdellah Chehri 
250 |a 1st ed. 2024 
260 |a Cham  |b Springer Nature Switzerland  |c 2024, 2024 
300 |a XVII, 220 p. 43 illus., 38 illus. in color  |b online resource 
505 0 |a Introduction -- Part A: Security Threats and Vulnerabilities -- Internet of Everything: Evolution and fundamental concepts -- Cybersecurity Threats and Attacks in IoE Networks -- Attacks Detection Mechanism for IoE Networks -- Cyber Resilience, Principles, and Practices -- Future Cybersecurity Challenges for IoE Networks -- Part B: Security Vigilance and Security Engineering for IoE Networks -- Networking and Security Architectures for IoE Networks -- Machine Learning-Based Detection and Prevention Systems for IoE -- Role of Blockchain Models for IoE Infrastructures and Applications -- Cybersecurity as a Service -- Big data Analytics for Cybersecurity in IoE Networks -- Cybersecurity Standards and Policies for CPS in IoE -- Future Privacy, and Trust Challenges for IoE Networks -- Conclusion 
653 |a Security Science and Technology 
653 |a Internet of things 
653 |a Security systems 
653 |a Internet of Things 
653 |a Telecommunication 
653 |a Cyber-Physical Systems 
653 |a Communications Engineering, Networks 
653 |a Cooperating objects (Computer systems) 
700 1 |a Newe, Thomas  |e [editor] 
700 1 |a Jeon, Gwanggil  |e [editor] 
700 1 |a Chehri, Abdellah  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Internet of Things, Technology, Communications and Computing 
028 5 0 |a 10.1007/978-3-031-45162-1 
856 4 0 |u https://doi.org/10.1007/978-3-031-45162-1?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 621.382 
520 |a This book first discusses cyber security fundamentals then delves into security threats and vulnerabilities, security vigilance, and security engineering for Internet of Everything (IoE) networks. After an introduction, the first section covers the security threats and vulnerabilities or techniques to expose the networks to security attacks such as repudiation, tampering, spoofing, and elevation of privilege. The second section of the book covers vigilance or prevention techniques like intrusion detection systems, trust evaluation models, crypto, and hashing privacy solutions for IoE networks. This section also covers the security engineering for embedded and cyber-physical systems in IoE networks such as blockchain, artificial intelligence, and machine learning-based solutions to secure the networks. This book provides a clear overview in all relevant areas so readers gain a better understanding of IoE networks in terms of security threats, prevention, and other security mechanisms. Discusses cyber security threats and vulnerabilities, security vigilance, and security engineering for IoE networks; Provides prevention techniques like intrusion detection, trust evaluation, crypto, and hashing privacy solutions; Features tips to secure networks from security attacks like repudiation, tampering, spoofing, and elevation of privilege