首页 > 最新文献

Cybersecurity Fundamentals最新文献

英文 中文
Computers and Networks 计算机和网络
Pub Date : 2020-04-28 DOI: 10.1201/9781003035626-1
Kutub Thakur, A. Pathan
{"title":"Computers and Networks","authors":"Kutub Thakur, A. Pathan","doi":"10.1201/9781003035626-1","DOIUrl":"https://doi.org/10.1201/9781003035626-1","url":null,"abstract":"","PeriodicalId":127635,"journal":{"name":"Cybersecurity Fundamentals","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114963019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless Network Security 无线网络安全
Pub Date : 2020-04-28 DOI: 10.1201/9781003035626-9
Kutub Thakur, A. Pathan
With the penetration of mobile device use as well as embedded and cyber-physical systems deployment, the underlying wireless communication and network systems have become critical society infrastructures, and thus their security and privacy are critical to the wellbeing of our society. This course will exam the challenges in providing secure communication and network services in a variety of wireless systems, as well as the existing and emerging approaches to managing these challenges. Focus will be placed on securing the operation and performance of wireless networks, with less emphasis on information security. Topics to be covered include vulnerabilities, attacks, security mechanisms, and trade-offs at various layers of the network protocol stack, from aspects of physical communication to application and service security issues; examples include jamming, MAC-layer misbehavior, selective packet dropping, decentralized trust and reputation, and crosslayer holistic attacks. Systems of interest include, but are not limited to, personal devices, connected vehicles, IoT and cyber-physical systems, wireless infrastructure, and ad hoc networks.
随着移动设备的普及以及嵌入式和网络物理系统的部署,底层无线通信和网络系统已成为重要的社会基础设施,因此它们的安全和隐私对我们社会的福祉至关重要。本课程将探讨在各种无线系统中提供安全通信和网络服务的挑战,以及管理这些挑战的现有和新兴方法。重点将放在确保无线网络的运行和性能,减少对信息安全的重视。涵盖的主题包括网络协议栈各层的漏洞、攻击、安全机制和权衡,从物理通信到应用程序和服务安全问题;例子包括干扰、mac层不当行为、选择性丢包、分散信任和声誉以及跨层整体攻击。感兴趣的系统包括但不限于个人设备、联网车辆、物联网和网络物理系统、无线基础设施和特设网络。
{"title":"Wireless Network Security","authors":"Kutub Thakur, A. Pathan","doi":"10.1201/9781003035626-9","DOIUrl":"https://doi.org/10.1201/9781003035626-9","url":null,"abstract":"With the penetration of mobile device use as well as embedded and cyber-physical systems deployment, the underlying wireless communication and network systems have become critical society infrastructures, and thus their security and privacy are critical to the wellbeing of our society. This course will exam the challenges in providing secure communication and network services in a variety of wireless systems, as well as the existing and emerging approaches to managing these challenges. Focus will be placed on securing the operation and performance of wireless networks, with less emphasis on information security. Topics to be covered include vulnerabilities, attacks, security mechanisms, and trade-offs at various layers of the network protocol stack, from aspects of physical communication to application and service security issues; examples include jamming, MAC-layer misbehavior, selective packet dropping, decentralized trust and reputation, and crosslayer holistic attacks. Systems of interest include, but are not limited to, personal devices, connected vehicles, IoT and cyber-physical systems, wireless infrastructure, and ad hoc networks.","PeriodicalId":127635,"journal":{"name":"Cybersecurity Fundamentals","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128330627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile Device Security 移动设备安全
Pub Date : 2020-04-28 DOI: 10.1201/b18165-21
Kutub Thakur, A. Pathan
Concerns for Rapid Mobile Adoption The use of mobile technology is a cornerstone of the White House’s Digital Government Strategy aimed at increasing the productivity within the federal government and delivering mobile-enabled services to citizens. However, gaps in mobile security have been identified as major barriers to expanding the use of mobile technology. A 2013 report indicated that 38 percent of smartphone users have been victims of cyber crime. This rate is expected to grow with mobile threats on the rise. For instance, 3.5 million unique malware and high-risk apps were seen in 2014, 10 times more than reported in 2012. Without a radical change, current and future investments in mobile technology will succumb to unmanageable risk that attenuates the benefits afforded by mobile technology.
对快速采用移动技术的担忧 移动技术的使用是白宫数字政府战略的基石,该战略旨在提高联邦政府的工作效率,并为公民提供移动服务。然而,移动安全方面的差距已被确认为扩大移动技术应用的主要障碍。2013 年的一份报告显示,38% 的智能手机用户曾是网络犯罪的受害者。随着移动威胁的增加,预计这一比例还将上升。例如,2014 年出现了 350 万个独特的恶意软件和高风险应用程序,是 2012 年报告的 10 倍。如果不进行彻底改变,当前和未来对移动技术的投资将屈服于无法控制的风险,从而削弱移动技术带来的益处。
{"title":"Mobile Device Security","authors":"Kutub Thakur, A. Pathan","doi":"10.1201/b18165-21","DOIUrl":"https://doi.org/10.1201/b18165-21","url":null,"abstract":"Concerns for Rapid Mobile Adoption The use of mobile technology is a cornerstone of the White House’s Digital Government Strategy aimed at increasing the productivity within the federal government and delivering mobile-enabled services to citizens. However, gaps in mobile security have been identified as major barriers to expanding the use of mobile technology. A 2013 report indicated that 38 percent of smartphone users have been victims of cyber crime. This rate is expected to grow with mobile threats on the rise. For instance, 3.5 million unique malware and high-risk apps were seen in 2014, 10 times more than reported in 2012. Without a radical change, current and future investments in mobile technology will succumb to unmanageable risk that attenuates the benefits afforded by mobile technology.","PeriodicalId":127635,"journal":{"name":"Cybersecurity Fundamentals","volume":"44 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141209849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 193
Password Management 密码管理
Pub Date : 2020-04-28 DOI: 10.1201/9781003035626-7
Kutub Thakur, A. Pathan
New! Self-service password reset Starting Sept. 23 Systems Administration employees can now reset their CU account passwords themselves. With this new service, you will be able to reset your own password if it is expired or forgotten from anywhere, 24/7 rather than contacting the Service Desk after you enroll in this new service. Once you have enrolled, use our How to Guide [3] for step-by-step instructions or head to the password reset page [4]. Enrollment To participate in self-service password, System Administration employees must opt-in to the service. This allows us to authenticate your back-up email to reset your password with a personal account from anywhere, 24/7. Haven’t enrolled yet? An email will be sent to all System Administration staff Monday, Sept. 23 from noreplyauthmanager@cu.edu [5]. Can’t find the enrollment email? Manage your enrollment [6]or Contact the Service Desk [7]. We also have a How to Guide [8] to help.
新!自9月23日起,系统管理员工现在可以自己重置CU帐户密码。有了这项新服务,如果你的密码过期或忘记了,你可以在任何地方24/7重置你自己的密码,而不是在你注册这项新服务后联系服务台。注册后,请使用我们的“如何使用指南”[3]获取逐步说明,或前往密码重置页面[4]。登记参与密码自助服务,系统管理员员工必须选择加入。这使我们可以验证您的备份电子邮件,以重置您的个人帐户密码,从任何地方,24/7。还没报名?一封电子邮件将于9月23日星期一从noreplyauthmanager@cu.edu发送给所有系统管理人员[5]。找不到注册邮箱?管理您的注册[6]或联系服务台[7]。我们也有一个如何指导[8]来帮助。
{"title":"Password Management","authors":"Kutub Thakur, A. Pathan","doi":"10.1201/9781003035626-7","DOIUrl":"https://doi.org/10.1201/9781003035626-7","url":null,"abstract":"New! Self-service password reset Starting Sept. 23 Systems Administration employees can now reset their CU account passwords themselves. With this new service, you will be able to reset your own password if it is expired or forgotten from anywhere, 24/7 rather than contacting the Service Desk after you enroll in this new service. Once you have enrolled, use our How to Guide [3] for step-by-step instructions or head to the password reset page [4]. Enrollment To participate in self-service password, System Administration employees must opt-in to the service. This allows us to authenticate your back-up email to reset your password with a personal account from anywhere, 24/7. Haven’t enrolled yet? An email will be sent to all System Administration staff Monday, Sept. 23 from noreplyauthmanager@cu.edu [5]. Can’t find the enrollment email? Manage your enrollment [6]or Contact the Service Desk [7]. We also have a How to Guide [8] to help.","PeriodicalId":127635,"journal":{"name":"Cybersecurity Fundamentals","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127759532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile Device Security 移动设备安全
Pub Date : 2020-04-28 DOI: 10.1201/9781003035626-11
Fei Yu
Concerns for Rapid Mobile Adoption The use of mobile technology is a cornerstone of the White House’s Digital Government Strategy aimed at increasing the productivity within the federal government and delivering mobile-enabled services to citizens. However, gaps in mobile security have been identified as major barriers to expanding the use of mobile technology. A 2013 report indicated that 38 percent of smartphone users have been victims of cyber crime. This rate is expected to grow with mobile threats on the rise. For instance, 3.5 million unique malware and high-risk apps were seen in 2014, 10 times more than reported in 2012. Without a radical change, current and future investments in mobile technology will succumb to unmanageable risk that attenuates the benefits afforded by mobile technology.
移动技术的使用是白宫数字政府战略的基石,旨在提高联邦政府内部的生产力,并向公民提供移动服务。然而,移动安全方面的差距已被确定为扩大移动技术使用的主要障碍。2013年的一份报告显示,38%的智能手机用户曾是网络犯罪的受害者。随着移动威胁的增加,这一比例预计还会继续增长。例如,2014年发现了350万个独特的恶意软件和高风险应用程序,是2012年报告的10倍。如果没有根本性的改变,当前和未来对移动技术的投资将屈服于无法控制的风险,从而削弱移动技术带来的好处。
{"title":"Mobile Device Security","authors":"Fei Yu","doi":"10.1201/9781003035626-11","DOIUrl":"https://doi.org/10.1201/9781003035626-11","url":null,"abstract":"Concerns for Rapid Mobile Adoption The use of mobile technology is a cornerstone of the White House’s Digital Government Strategy aimed at increasing the productivity within the federal government and delivering mobile-enabled services to citizens. However, gaps in mobile security have been identified as major barriers to expanding the use of mobile technology. A 2013 report indicated that 38 percent of smartphone users have been victims of cyber crime. This rate is expected to grow with mobile threats on the rise. For instance, 3.5 million unique malware and high-risk apps were seen in 2014, 10 times more than reported in 2012. Without a radical change, current and future investments in mobile technology will succumb to unmanageable risk that attenuates the benefits afforded by mobile technology.","PeriodicalId":127635,"journal":{"name":"Cybersecurity Fundamentals","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122316553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Cybersecurity Basics 网络安全基础知识
Pub Date : 2020-04-28 DOI: 10.1201/9781003035626-2
Kutub Thakur, A. Pathan
{"title":"Cybersecurity Basics","authors":"Kutub Thakur, A. Pathan","doi":"10.1201/9781003035626-2","DOIUrl":"https://doi.org/10.1201/9781003035626-2","url":null,"abstract":"","PeriodicalId":127635,"journal":{"name":"Cybersecurity Fundamentals","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133774719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cybersecurity Standards 网络安全标准
Pub Date : 2020-04-28 DOI: 10.1201/9781003035626-12
Kutub Thakur, A. Pathan
{"title":"Cybersecurity Standards","authors":"Kutub Thakur, A. Pathan","doi":"10.1201/9781003035626-12","DOIUrl":"https://doi.org/10.1201/9781003035626-12","url":null,"abstract":"","PeriodicalId":127635,"journal":{"name":"Cybersecurity Fundamentals","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128607257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cybersecurity Fundamentals
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1