Skip to main content
Top
Published in:
Cover of the book

2020 | OriginalPaper | Chapter

1. Introduction to Cyber Security

Author : Khaled Salah Mohamed

Published in: New Frontiers in Cryptography

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Today, cryptography plays a vital role in every electronic and communication system. Everyday many users generate and interchange large amount of information in various fields through the Internet, telephone conversations, and e-commerce transactions. In modern system-on-chips (SoCs), cybersecurity plays an integral role in protecting the confidentiality and integrity of information. Cybersecurity is protecting computers, servers, mobiles, networks, electronic devices, and data from malicious attacks [1]. Recent years have seen an unfortunate and disruptive growth in the number of cyber-attacks. There are mainly three threats to data security [2, 3]:

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference C. Paar, J. Pelzl, Understanding Cryptography: A Textbook for Students and Practitioners (Springer, London, UK, 2009)MATH C. Paar, J. Pelzl, Understanding Cryptography: A Textbook for Students and Practitioners (Springer, London, UK, 2009)MATH
2.
go back to reference C. Paar, J. Pelzl, B. Preneel, Understanding Cryptography: A Textbook for Students and Practitioners (Springer Heidelberg Dordrecht, Bochum, 2010)CrossRef C. Paar, J. Pelzl, B. Preneel, Understanding Cryptography: A Textbook for Students and Practitioners (Springer Heidelberg Dordrecht, Bochum, 2010)CrossRef
3.
go back to reference R.A. Mollin, Codes: The Guide to Secrecy from Ancient to Modern Times (Chapman and Hall/CRC, Boca Raton, 2005)CrossRef R.A. Mollin, Codes: The Guide to Secrecy from Ancient to Modern Times (Chapman and Hall/CRC, Boca Raton, 2005)CrossRef
4.
go back to reference S. Pincock, Codebreaker: The History of Codes and Ciphers, 1st edn. (Walker, 2016). ISBN: 978-0802715470 S. Pincock, Codebreaker: The History of Codes and Ciphers, 1st edn. (Walker, 2016). ISBN: 978-0802715470
5.
go back to reference William Stallings, Cryptography and Network Security Principles and Practices (Pearson Education Inc, 2006) William Stallings, Cryptography and Network Security Principles and Practices (Pearson Education Inc, 2006)
6.
go back to reference Ç.K. Koç, Cryptographic Engineering (Springer, 2009) Ç.K. Koç, Cryptographic Engineering (Springer, 2009)
7.
go back to reference K.M. Martin, Everyday Cryptography Fundamental Principles and Applications (Oxford University Press, 2012) K.M. Martin, Everyday Cryptography Fundamental Principles and Applications (Oxford University Press, 2012)
9.
go back to reference N. Sharma, Prabhjot, H. Kaur, A review of information security using cryptography technique. Int. J. Adv. Res. Comp. Sci. 8(Special Issue), 323–326 (2017) N. Sharma, Prabhjot, H. Kaur, A review of information security using cryptography technique. Int. J. Adv. Res. Comp. Sci. 8(Special Issue), 323–326 (2017)
10.
go back to reference S. Tayal, N. Gupta, P. Gupta, D. Goyal, M. Goyal, A review paper on network security and cryptography. Adv. Comp. Sci. Tech. 10(5), 763–770 (2017) S. Tayal, N. Gupta, P. Gupta, D. Goyal, M. Goyal, A review paper on network security and cryptography. Adv. Comp. Sci. Tech. 10(5), 763–770 (2017)
11.
go back to reference P.P. Charles, P.L. Shari, Security in Computing, 4th edn. (Prentice-Hall, Inc, 2008) P.P. Charles, P.L. Shari, Security in Computing, 4th edn. (Prentice-Hall, Inc, 2008)
12.
go back to reference S. William, Cryptography and Network Security: Principles and Practice, 2nd edn. (Prentice-Hall, Inc, 1999), pp. 23–50 S. William, Cryptography and Network Security: Principles and Practice, 2nd edn. (Prentice-Hall, Inc, 1999), pp. 23–50
13.
go back to reference U. Guin, N. Asadizanjani, M. Tehranipoor, Standards for hardware security. GetMobile: Mobile Comp. Comm. 23, 5–9 (2019)CrossRef U. Guin, N. Asadizanjani, M. Tehranipoor, Standards for hardware security. GetMobile: Mobile Comp. Comm. 23, 5–9 (2019)CrossRef
16.
go back to reference S. Bellovin, Problem Areas for the IP Security Protocols (Usenix Security Symposium, 1996) S. Bellovin, Problem Areas for the IP Security Protocols (Usenix Security Symposium, 1996)
17.
go back to reference C. McCubbin, A. Selcuk, D. Sidhu, Initialization vector attacks on the IPsec protocol suite, in IEEE Workshop on Enterprise Security, (2000) C. McCubbin, A. Selcuk, D. Sidhu, Initialization vector attacks on the IPsec protocol suite, in IEEE Workshop on Enterprise Security, (2000)
Metadata
Title
Introduction to Cyber Security
Author
Khaled Salah Mohamed
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-58996-7_1