ebook img

Cross-Industry Applications of Cyber Security Frameworks PDF

265 Pages·2022·6.134 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Cross-Industry Applications of Cyber Security Frameworks

Cross-Industry Applications of Cyber Security Frameworks Sukanta Kumar Baral Indira Gandhi National Tribal University, India Richa Goel Amity University, India Md Mashiur Rahman Bank Asia Ltd., Bangladesh Jahangir Sultan Bentley University, USA Sarkar Jahan Royal Bank of Canada, Canada A volume in the Advances in Information Security, Privacy, and Ethics (AISPE) Book Series Published in the United States of America by IGI Global Information Science Reference (an imprint of IGI Global) 701 E. Chocolate Avenue Hershey PA, USA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: [email protected] Web site: http://www.igi-global.com Copyright © 2022 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher. Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. Library of Congress Cataloging-in-Publication Data Names: Baral, Sukanta Kumar, 1966- editor. | Goel, Richa, 1980- editor. | Rahman, Md. Mashiur, 1980- editor. | Sultan, Jahangir, 1956- editor. | Jahan, Sarkar, 1979- editor. Title: Cross-industry applications of cyber security frameworks / Sukanta Kumar Baral, Richa Goel, Md Mashiur Rahman, Jahangir Sultan, and Sarkar Jahan, editors. Description: Hershey, PA : Information Science Reference, an imprint of IGI Global, [2022] | Includes bibliographical references and index. | Summary: “This book posits that rather than cybersecurity being simply an issue of securing systems and networks, corporate leaders need to think in terms of assuring the integrity and durability of the interconnected business and social structures that sit on top of an increasingly complex technology landscape”-- Provided by publisher. Identifiers: LCCN 2022013979 (print) | LCCN 2022013980 (ebook) | ISBN 9781668434482 (h/c) | ISBN 9781668434499 (s/c) | ISBN 9781668434505 (ebook) Subjects: LCSH: Computer networks--Security measures. | Computer security. | Industries--Data processing--Security measures. Classification: LCC TK5105.59 .C758 2022 (print) | LCC TK5105.59 (ebook) | DDC 005.8--dc23/eng/20220525 LC record available at https://lccn.loc.gov/2022013979 LC ebook record available at https://lccn.loc.gov/2022013980 This book is published in the IGI Global book series Advances in Information Security, Privacy, and Ethics (AISPE) (ISSN: 1948-9730; eISSN: 1948-9749) British Cataloguing in Publication Data A Cataloguing in Publication record for this book is available from the British Library. All work contributed to this book is new, previously-unpublished material. The views expressed in this book are those of the authors, but not necessarily of the publisher. For electronic access to this publication, please contact: [email protected]. Advances in Information Security, Privacy, and Ethics (AISPE) Book Series ISSN:1948-9730 EISSN:1948-9749 Editor-in-Chief: Manish Gupta State University of New York, USA Mission As digital technologies become more pervasive in everyday life and the Internet is utilized in ever increasing ways by both private and public entities, concern over digital threats becomes more prevalent. The Advances in Information Security, Privacy, & Ethics (AISPE) Book Series provides cutting-edge research on the protection and misuse of information and technology across various industries and settings. Comprised of scholarly research on topics such as identity management, cryptography, system security, authentication, and data protection, this book series is ideal for reference by IT professionals, academicians, and upper-level students. Coverage • Internet Governance IGI Global is currently accepting • Security Information Management manuscripts for publication within this • Cyberethics series. To submit a proposal for a volume in • Computer ethics this series, please contact our Acquisition • Device Fingerprinting Editors at [email protected] or • Security Classifications visit: http://www.igi-global.com/publish/. • Access Control • IT Risk • CIA Triad of Information Security • Cookies The Advances in Information Security, Privacy, and Ethics (AISPE) Book Series (ISSN 1948-9730) is published by IGI Global, 701 E. Chocolate Avenue, Hershey, PA 17033-1240, USA, www.igi-global.com. This series is composed of titles available for purchase individually; each title is edited to be contextually exclusive from any other title within the series. For pricing and ordering information please visit http://www.igi-global.com/book-series/advances-information-security- privacy-ethics/37157. Postmaster: Send all address changes to above address. Copyright © 2022 IGI Global. All rights, including translation in other languages reserved by the publisher. No part of this series may be reproduced or used in any form or by any means – graphics, electronic, or mechanical, including photocopying, recording, taping, or information and retrieval systems – without written permission from the publisher, except for non commercial, educational use, including classroom teaching purposes. The views expressed in this series are those of the authors, but not necessarily of IGI Global. Titles in this Series For a list of additional titles in this series, please visit: www.igi-global.com/book-series/advances-information-security-privacy-ethics/37157 Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks Biswa Mohan Sahoo (Amity University, India) and Suman Avdhesh Yadav (Amity University, India) Information Science Reference • © 2022 • 325pp • H/C (ISBN: 9781668439210) • US $250.00 Global Perspectives on Information Security Regulations Compliance, Controls, and Assurance Guillermo A. Francia III (University of West Florida, USA) and Jeffrey S. Zanzig (Jacksonville State University, USA) Information Science Reference • © 2022 • 309pp • H/C (ISBN: 9781799883906) • US $240.00 Handbook of Research on Cyber Law, Data Protection, and Privacy Nisha Dhanraj Dewani (Maharaja Agrasen Institute of Management Studies, Guru Gobind Singh Indraprastha University, India) Zubair Ahmed Khan (University School of Law and Legal Studies, Guru Gobind Singh Indraprastha University, India) Aarushi Agarwal (Maharaja Agrasen Institute of Management Studies, India) Mamta Sharma (Gautam Buddha University, India) and Shaharyar Asaf Khan (Manav Rachna University, India) Information Science Reference • © 2022 • 390pp • H/C (ISBN: 9781799886419) • US $305.00 Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic Ryma Abassi (Sup’Com, University of Carthage, Tunisia) and Aida Ben Chehida Douss (Sup’Com, University of Carthage, Tunisia) Information Science Reference • © 2022 • 276pp • H/C (ISBN: 9781799891642) • US $240.00 Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity Anacleto Correia (CINAV, Portuguese Naval Academy, Portugal) and Victor Lobo (Nova- IMS, Naval Academy, Portugal) Information Science Reference • © 2022 • 315pp • H/C (ISBN: 9781799894308) • US $250.00 701 East Chocolate Avenue, Hershey, PA 17033, USA Tel: 717-533-8845 x100 • Fax: 717-533-8661 E-Mail: [email protected] • www.igi-global.com Table of Contents Preface ................................................................................................................xiv Acknowledgment ................................................................................................xx Chapter 1 Cyber Security Trend Analysis: An Indian Perspective.........................................1 Saurabh Tiwari, University of Petroleum and Energy Studies, India Rajeev Srivastava, University of Petroleum and Energy Studies, India Chapter 2 Role of Artificial Intelligence on Cybersecurity and Its Control .........................15 Ramesh Chandra Rath, Jharkhand University of Technology, India Sukanta Kumar Baral, Indira Gandhi National Tribal University, India Richa Goel, Amity University, India Chapter 3 Analysis and Mitigation Strategies of Security Issues of Software-Defined Networks ..............................................................................................................36 Aswani Kumar Aswani Cherukuri, Vellore Institute of Technology, India Sushant Sinha, Vellore Institute of Technology, India Chapter 4 Role of Bangladesh Bank on Cybersecurity in FinTech ......................................71 Saila Sarmin Rapti, Bangladesh Bank, Bangladesh Nabila Fahria, Bangladesh Bank, Bangladesh Sunita Rani Das, Bangladesh Bank, Bangladesh Chapter 5 Cyber Security Legal Framework in India: An Appraisal ...................................91 Diptirekha Mohapatra, Sambalpur University, India Chapter 6 A Study on Big Data Privacy in Cross-Industrial Challenges and Legal Implications ........................................................................................................112 Tilottama Singh, Amity University, India Richa Goel, Amity University, India Sukanta Kumar Baral, Indira Gandhi National Tribal University, India Chapter 7 Smart Healthcare and Digitalization: Technological and Cybersecurity Challenges ..........................................................................................................124 Navita Mahajan, Amity University, India Seema Garg, Amity University, India Shreyas Pandita, Amity University, India Geetansh Sehgal, Amity University, India Chapter 8 Internet Banking Safety Framework: An Evaluation of the Banking Industry in Bangladesh .....................................................................................................148 Ayon Dutta, University of Dhaka, Bangladesh Partho Ghosh, North South University, Bangladesh Avishak Bala, North South University, Bangladesh Chapter 9 Data Privacy Policy: Cyber Security Implications on Retail Operations ..........159 Rabinarayan Patnaik, Institute of Management and Information Science, India Chapter 10 Cyber Security at the Heart of Open Banking: An Existing and Futuristic Approach ............................................................................................................182 Lopamudra Hota, National Institute of Technology, Rourkela, India Dhruba Charan Hota, Maharaja Bir Bikram College, India Chapter 11 A Study on the Perceptions of Internet Users With Respect to Information Sensitivity in Delhi ............................................................................................202 Shivani Choudhary, Amity School of Economics, Amity University, India Neeru Sidana, Amity School of Economics, Amity University, India Richa Goel, Amity International Business School, Amity University, India Compilation of References ..............................................................................221 About the Contributors ...................................................................................237 Index ..................................................................................................................243 Detailed Table of Contents Preface ................................................................................................................xiv Acknowledgment ................................................................................................xx Chapter 1 Cyber Security Trend Analysis: An Indian Perspective.........................................1 Saurabh Tiwari, University of Petroleum and Energy Studies, India Rajeev Srivastava, University of Petroleum and Energy Studies, India The last few years are known as the era of digitization, which also focuses on Industry 4.0. On one side, these latest tools and techniques like IoT, big data analytics, blockchain help the organizations to make better decision making and better future predictions in terms of processes and services; on the other hand, it also leads to the new problem known as cybercrime. Keeping data on the cloud and processing it using cloud-based technology gives more opportunities to hackers to misuse things. Many governments and organizations invest in huge amounts to train their employees and save their data from such cybercrimes. These cybercrimes not only impact organizations but also the females and children of the countries. The purpose of this study is to know the current state of cybercrime in India and to identify the impact of cybercrime on females and children. Chapter 2 Role of Artificial Intelligence on Cybersecurity and Its Control .........................15 Ramesh Chandra Rath, Jharkhand University of Technology, India Sukanta Kumar Baral, Indira Gandhi National Tribal University, India Richa Goel, Amity University, India Cyber security is paramount in all aspects of life, particularly in digital technology. Stories of artificial intelligence and data breaches, ID theft, cracking the security code, operating machines with remote sensors, and other such incidents abound, affecting millions of individuals and organizations. The problems in developing appropriate controls and processes and applying them with utmost precision to combat cyber- attacks and crimes have always been unending. With recent advances in artificial intelligence, the ever-increasing danger of cyber-attacks and crimes has grown tremendously. It has been used in nearly every branch of research and engineering. AI has sparked a revolution in everything from healthcare to robotics. This ball of fire could not be kept away from cyber thieves, and therefore, “normal” cyber-attacks have evolved into “intelligent” cyber-attacks. The authors of this chapter attempt to discuss prospective artificial intelligence approaches to use such strategies in cyber security for expecting outcome-based conclusions related to future research work. Chapter 3 Analysis and Mitigation Strategies of Security Issues of Software-Defined Networks ..............................................................................................................36 Aswani Kumar Aswani Cherukuri, Vellore Institute of Technology, India Sushant Sinha, Vellore Institute of Technology, India The rapid development in telecommunication technologies in the last decade gave rise to a new set of sophisticated security threats. Software-defined networking (SDN) is a new network paradigm that isolates the network control plane from the data plane. This provides network programmability, which reduces operating costs and enables business growth. However, this new technology has several security threats, which is a major concern in its adaptation. This chapter presents a comprehensive review of the security issues of SDN and mitigation strategies. Chapter 4 Role of Bangladesh Bank on Cybersecurity in FinTech ......................................71 Saila Sarmin Rapti, Bangladesh Bank, Bangladesh Nabila Fahria, Bangladesh Bank, Bangladesh Sunita Rani Das, Bangladesh Bank, Bangladesh Following the COVID-19 outbreak, the world has seen another rising challenge of accessing financial services. By limiting the transmission of COVID-19, fintech accelerated access to financial services for all aspects of society, allowing individuals to become more flexible and comfortable with fintech. However, cyber-attacks can hinder the progress of this evolution by attacking any type of banking channel, including traditional banking, internet banking, credit cards, ATMs, agent banking, and mobile banking. From the standpoint of central bank risk management, this chapter investigates fintech and the associated field of cybersecurity. Chapter 5 Cyber Security Legal Framework in India: An Appraisal ...................................91 Diptirekha Mohapatra, Sambalpur University, India Cybercrimes have become a global phenomenon due to the digital world. Cybercrimes

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.