Author: Akashdeep Bhardwaj

New Age Cyber Threat Mitigation for Cloud Computing Networks

eBook: US $49 Special Offer (PDF + Printed Copy): US $78
Printed Copy: US $54
Library License: US $196
ISBN: 978-981-5136-12-8 (Print)
ISBN: 978-981-5136-11-1 (Online)
Year of Publication: 2023
DOI: 10.2174/9789815136111123010001

Introduction

Increasingly global and online social interactions and financial transactions involve digital data, computing devices and the internet. With cloud computing, remote computing, enterprise mobility and e-commerce on the rise, network security has become a priority. Selecting an appropriate algorithm and policy is a challenge for computer security engineers, as new technologies provide malicious users with opportunities to intrude into computer networks.

New Age Cyber Threat Mitigation for Cloud Computing Networks provides cloud and network engineers answers to cybersecurity challenges. It highlights new options, methodologies and feasible solutions that can be implemented in cloud architecture and IT Infrastructure, thereby securing end users. Chapters cover many topics related to cyber threats in the modern era.

These topics include:

  • - Ransomware and DDoS attacks
  • - Security algorithms
  • - Design and implementation solutions for resilient and fault-tolerant cloud and network services
  • - Security policy
  • - End user data security

Audience: Students, professionals, enthusiasts in computer security

Preface

Cybersecurity attacks have presented the highest priority to securing Cloud infrastructure by using encryption for cloud traffic and against new-age attacks. The use of encryption algorithms for security consideration to use for Cloud and network-based services that require critical data and link encryption. This book suggests the use of a network security framework to bridge the gap between high-level specification requirements and the low-level implementation phase for network infrastructure security using the network architecture model with the security policies associated with the network components required to be enforced. Increasing use of email security protocols with encryption, PKI-based crypto- graphic techniques, IP address verification, and DNS-based domain validation are discussed to mitigate spoofing and other email threats. This book provides global Cloud and Network engineers with new options and recommends new methodologies and feasible solutions that can be implemented to secure the Cloud architecture and IT Infrastructure, thereby securing end users. This includes designing and implementing solutions against new-age attacks on the cloud infrastructure and network services.

Akashdeep Bhardwaj
University of Petroleum and Energy Studies, Dehradun,
India