Cyber security, cyber crime and cyber forensics : applications ... - GBV

37 downloads 8306 Views 181KB Size Report
Combined Impact of Outsourcing and Hard Times on BPO Risk and Security. 24 ... A Comparison of Cyber-Crime Definitions in India and the United States. 33.
Cyber Security, Cyber Crime and Cyber Forensics:

Applications Raghu

Perspectives

Santanam

Arizona State M.

and

University, USA

Sethumadhavan

Amrita Vishwa

Vidyapeetham,

India

Mohit Virendra State University of New York at Buffalo, USA

Information Science

I

»l%Tf03i REFERENCE

lijjj

INFORMATION SCIENCE REFERENCE

Hershey



New York

Table of Contents

Preface

xiv

Acknowledgment

xix

Section 1 Cyber-Crirae:

Policies and

Implications

Chapter 1 The UID

Project: Lessons Learned from the West and Challenges Identified for Rajarshi Chakraborthy, University ofBuffalo at SUNYNew York, USA Haricharan

Rengamani, University ofBuffalo

at

India

1

SUNY New York, USA

Ponnurangam Kumaraguru, Indraprastha Institute ofInformation Technology, India RaghavRao, University ofBuffalo at SUNY New York, USA Chapter

2

Combined

Impact of Outsourcing and Hard Times

on

BPO Risk and

Security

24

C. Warren Axelrod, Delta Risk, USA Sukumar

Haldar, Anshinsoft Inc., USA

Chapter 3 Comparison of Cyber-Crime Definitions

A

in India and the United States

33

Himanshu H. S.

Maheshwari, University of South Florida, USA Hyman, University of South Florida, USA

Manish Agrawal,

University of South Florida, USA

Chapter 4

Emergency Response

of Mumbai Terror Attacks: An

Activity Theory Analysis

Divya Shankar, University of Buffalo at SUNY New York, USA Manish Agrawal, University of South Florida, USA H.

RaghavRao, University ofBuffalo

at

SUNY New

York, USA

46

Chapter

5

Pirates of the

Copyright

and

Cyberspace:

Issues Involved

59

Charulata

Chaudhary, Rajiv Gandhi National University of Law, India Ishupal Singh Kang, Rajiv Gandhi National University of Law, India

Section 2

Cyber-Security: Technology

Review

Chapter 6 Classifying Host Anomalies: Using Ontology in Information Security Monitoring

70

Ramachandran, Bhabha Atomic Research Centre, India

Suja

R. S. Mundada, Bhabha Atomic Research Centre, India A. K.

Bhatlacharjee, Bhabha Atomic Research Centre, India

C. S. R. C.

Murthy, Bhabha Atomic Research Centre, India

R. Sharma, Bhabha Atomic Research Centre, India

Chapter 7 Securing Next Generation Internet Services

87

Asoke K. Talukder, ABV Indian Institute

of Information Technology

&

Management,

India

& Geschickten Solutions, India

Chapter

8

An Examination

ofldentity Management Models in

Kenneth J. Giuliani, V. Kumar

Setting

106

Murty, University of Toronto, Canada

9

Securing

Cloud Environment

N. Harini, Amrita

T. R,

Internet

University of Toronto Mississauga, Canada

Chapter

C, K.

an

Shyamala,

Vishwa

115

India

Vidyapeetham, Vidyapeetham,

Amrita Vishwa

Padmanabhan,

Amrita Vishwa

Indie

Vidyapeetham, India

Chapter 10 DoS Attacks in MANETs: Detection and Countermeasure

Rajbir Kaur,

Malaviya

National Institute

of Technology,

124

India

M. S. Gaur,

Malaviya National Institute of Technology, India Lalith Suresh, Malaviya National Institute of Technology, India V. Laxmi,

Malaviya National Institute of Technology, India

Chapter 11 Detecting Cheating Aggregators and Report Dropping Attacks in Wireless Sensor Networks Mohit Virendra, State University of New York at Buffalo, USA Qi Duan, State University of New York Shambhu

at

Buffalo, USA

Upadhyaya, State University ofNew York at Buffalo, USA

146

Chapter 12 Extended Time Machine

Design using Reconfigurable Computing Recording and Retrieval of Gigabit Network Traffic S.

Sajan Kumar, Amrita Vishwa Raju Pilli, Amrita

168

India

Vidyapeetham, Vidyapeetham, Vishwa Vidyapeetham, India

M. Hart Krishna Prasad, Amrita Vishwa Suresh

for Efficient

India

Chapter 13 Metamorphic Malwarc Analysis and Detection Methods Vinod P., V. Laxmi,

Malaviya

178

National Institute

India

of Technology, Malaviya National Institute of Technology, India

M. S. Gain;

Malaviya National Institute of Technology, India

Section 3

Cyber-Security: Methods Chapter Towards

Algorithms

14

Checking Tampering of Software

N. V, Narendra Kumar, Tata Institute

Harshit Shah, Amrita Vishwa R. K.

Chapter

and

Shyamasundar,

204

ofFundamental Research, India

Vidyapeetham, India

Tata Institute

of Fundamental Research, India

15

Complexity Measures

of

Cryptographically Secure Boolean Functions Chungath Srinivasan, Amrita Vishwa Vidyapeetham, India

Lakshmy M.

K. V., Amrita Vishwa

Sethumadhavan, Amrita

220

Vidyapeetham, India

Vishwa

Vidyapeetham, India

Chapter 16 Einstein-Podolsky-Rosen Paradox Some

and

Certain Aspects of Quantum Cryptology with

Applications

Narayanankutty Karuppath, P. Achuthan, Amrita Vishwa

231 Amrita Vishwa

Vidyapeetham,

Vidyapeetham, India India

Chapter 17 Error Linear

Complexity Measures of Binary Multisequences Sindhu M., Amrita Vishwa Vidyapeetham, India

Sajan Kumar S., Amrita Vishwa Vidyapeetham, India M, Sethumadhavan, Amrita Vishwa

Vidyapeetham, India

240

Chapter A

Survey

18

Digital Image Steganographic Methods Amritha. P. P., Amrita Vishwa Vidyapeetham, India Gireesh Kumar T., Amrita Vishwa Vidyapeetham, India on

Compilation

of References

250

259

About the Contributors

280

Index

287