The War on Cyber Crime

Digital Defense

By IGI Global on Aug 5, 2013
Contributed by Kaitlyn Retherford

Theory and Practice of Cryptography Solutions for Secure Information Systems Cyber attacks are hardly a new concept, but their presence is growing exponentially. In June alone, 69 web sites, including those of government offices, in the nation of South Korea suffered a massive shut down due to damaging cyber attacks, reportedly linked to North Korea ("South Korea Blames North for June Cyberattacks", New York Times). This offense is just a recent episode of the ongoing rivalry between the neighboring countries, addressing just a fraction of the attacks occurring on a global scale.

While government espionage attempts via online hacking are a prominent source of cyber crime around the world, agencies and officials are not the only ones at risk. As reported in “Universities Face a Rising Barrage of Cyberattacks” by New York Times reporter Richard Pérez-Peña, research universities in the United States face attempts of online security breaches by the millions. The University of Wisconsin sees up to 100,000 hacking attempts per day from countries such as China, Russia, and Vietnam.

With information constantly being sent and stored in digital realms, sensitive information belonging to individuals, companies, and institutions is at risk. Technological security measures are a necessity in today’s world in order to block these harmful attacks from causing lingering and damaging effects.

Theory and Practice of Cryptography Solutions for Secure Information Systems, a recent IGI Global publication, takes aim at exploring trends in Information Systems security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. An excerpt from the preface of the book states:

“Without proper security precautions, Information Systems are prone to unexpected and intolerable side effects, such as leakage of operational and confidential data, identity theft and unauthorized access, and possibly modification of private data, services, and systems. Security services are required in order to guarantee information security and protection of privacy, such as data confidentiality, data authentication, anonymity, entity authentication, non-repudiation of origin and receipt, access control, protection against denial of service and phishing, and secure processing and deletion of data. In a nutshell, dependable and trustworthy security solutions based on strong cryptography are needed.”

Theory and Practice of Cryptography Solutions for Secure Information Systems, edited by Atilla Elçi of Aksaray University in Turkey, Alexander G. Chefranov of Eastern Mediterranean University in North Cyprus, Huaxiong Wang of Nanyang Technological University in Singapore, and Mehmet A. Orgun, Rajan Shankaran, and Josef Pieprzyk, all of Macquarie University in Australia, is a reference book that serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications.

This publication is part of the Advances in Information Security, Privacy, and Ethics (AISPE) book series, a comprehensive collection of 13 titles that provide only the most cutting-edge research on how information is utilized in the digital age.
Browse for more posts in:
Security and ForensicsCyber BehaviorCyber Warfare & TerrorismDigital Crime & ForensicsInternet TechnologiesWeb Technologies & EngineeringBook SeriesBooks & E-BooksInfoSci-BooksAsiaChinaEastern EuropeNorth America

No comments Comments

Log in or sign up to comment.
Be the first to comment!

More from IGI Global

The World Health Organization (WHO) has reported a surge in Lassa fever cases in Nigeria, emphasizing the urgent need for containment measures.
IGI GlobalRead More
Medical, Healthcare, and Life SciencesHealthcare Information SystemsBooks & E-BooksResearch Trends
IGI Global congratulates the winners of this year's Journal Reviewer Award
IGI GlobalRead More
JournalsAwards & RecognitionOpen Access
For decades, academic publishing has been plagued with discrepancies surrounding authorship of scholarly research...
IGI GlobalRead More
Books & E-BooksAcquisitions
Two IGI Global publications have been recognized by Doody's for their excellence and niche topic focus.
IGI GlobalRead More
Medical, Healthcare, and Life SciencesMedia and CommunicationsBooks & E-BooksAwards & Recognition
Digital Inclusion Week underscored the urgent need for a national digital equity plan in the US due to disparities in internet access and digital skills.
IGI GlobalRead More
The majority of IGI Global's books Frontlist is now indexed by Scopus. Learn what this prestigious recognition means for the publisher and the experts behind these books.
IGI GlobalRead More
Books & E-BooksAwards & RecognitionReviews & Indexing
IGI Global is excited to introduce a new initiative to provide detailed insights into various fascinating subjects. Our brochures offer a comprehensive overview of timely publications covering the latest research topics...
IGI GlobalRead More
EducationBusiness and ManagementComputer Science and Information TechnologySocial Sciences and HumanitiesBooks & E-Books
Hear from Dr. Velliaris, who was voted as a Top 30 Global Guru in Education.
EducationBooks & E-BooksInterviewAuthor News
Cocoa prices surging to $10,000 per metric ton challenge chocolate manufacturers and consumers, risking supply chain stability and higher retail prices...
IGI GlobalRead More
Business and ManagementEnvironmental, Agricultural, and Physical SciencesSustainable DevelopmentBooks & E-BooksResearch Trends
First Previous 1 2 3 4 5 6 7 8 9 10  ... Next Last