A Taxonomy of Bitcoin Security Issues and Defense Mechanisms

Author(s):  
Prachi Gulihar ◽  
B.B. Gupta
Author(s):  
Kasarapu Ramani

Big data has great commercial importance to major businesses, but security and privacy challenges are also daunting this storage, processing, and communication. Big data encapsulate organizations' most important and sensitive data with multi-level complex implementation. The challenge for any organization is securing access to the data while allowing end user to extract valuable insights. Unregulated access privileges to the big data leads to loss or theft of valuable and sensitive. Privilege escalation leads to insider threats. Also, the computing architecture of big data is not focusing on session recording; therefore, it is becoming a challenge to identify potential security issues and to take remedial and mitigation mechanisms. Therefore, various big data security issues and their defense mechanisms are discussed in this chapter.


Author(s):  
Dina Mohsen Zoughbi ◽  
Nitul Dutta

Cloud computing is the most important technology at the present time, in terms of reducing applications costs and makes them more scalable and flexible. As the cloud currency is based on building virtualization technology, so it can secure a large-scale environment with limited security capacity such as the cloud. Where, Malicious activities lead the attackers to penetrate virtualization technologies that endanger the infrastructure, and then enabling attacker access to other virtual machines which running on the same vulnerable device. The proposed work in this paper is to review and discuss the attacks and intrusions that allow a malicious virtual machine (VM) to penetrate hypervisor, especially the technologies that malicious virtual machines work on, to steal more than their allocated quota from material resources, and the use of side channels to steal data and Passing buffer barriers between virtual machines. This paper is based on the Security Study of Cloud Hypervisors and classification of vulnerabilities, security issues, and possible solutions that virtual machines are exposed to. Therefore, we aim to provide researchers, academics, and industry with a better understanding of all attacks and defense mechanisms to protect cloud security. and work on building a new security architecture in a virtual technology based on hypervisor to protect and ensure the security of the cloud.


Author(s):  
Lawan Ahmed Mohammed

This chapter introduces the vulnerability and security issues associated with the use and operations of Internet cafés or cybercafés by demonstrating different methods of launching different attacks especially when using commercial Internet cafés in a way that renders the system or other systems inoperable. It discusses the challenges facing those operating and managing Internet cafes, governments, parents, and even educators to ensure proper preventive measures, guidelines, and laws needed to protect the system against breaches, misuses, and abuses. It also argues that defense mechanism against breaches should be dynamic and strong enough due to the increasing number of new freely available cracking tools and harmful Web sites. In addition, virus, worms, Trojan horse, adware, malware, and spyware are spreading beyond imagination. Further, the chapter discusses different defense mechanisms.


2013 ◽  
Vol 2013 ◽  
pp. 1-11 ◽  
Author(s):  
Frank Yeong-Sung Lin ◽  
Yu-Shun Wang ◽  
Ming-Yang Huang

Virtualization plays an important role in the recent trend of cloud computing. It allows the administrator to manage and allocate hardware resources flexibly. However, it also causes some security issues. This is a critical problem for service providers, who simultaneously strive to defend against malicious attackers while providing legitimate users with high quality service. In this paper, the attack-defense scenario is formulated as a mathematical model where the defender applies both proactive and reactive defense mechanisms against attackers with different attack strategies. In order to simulate real-world conditions, the attackers are assumed to have incomplete information and imperfect knowledge of the target network. This raises the difficulty of solving the model greatly, by turning the problem nondeterministic. After examining the experiment results, effective proactive and reactive defense strategies are proposed. This paper finds that a proactive defense strategy is suitable for dealing with aggressive attackers under “winner takes all” circumstances, while a reactive defense strategy works better in defending against less aggressive attackers under “fight to win or die” circumstances.


2019 ◽  
pp. 2014-2038
Author(s):  
Kasarapu Ramani

Big data has great commercial importance to major businesses, but security and privacy challenges are also daunting this storage, processing, and communication. Big data encapsulate organizations' most important and sensitive data with multi-level complex implementation. The challenge for any organization is securing access to the data while allowing end user to extract valuable insights. Unregulated access privileges to the big data leads to loss or theft of valuable and sensitive. Privilege escalation leads to insider threats. Also, the computing architecture of big data is not focusing on session recording; therefore, it is becoming a challenge to identify potential security issues and to take remedial and mitigation mechanisms. Therefore, various big data security issues and their defense mechanisms are discussed in this chapter.


Author(s):  
J.L. Carson ◽  
A.M. Collier

The ciliated cells lining the conducting airways of mammals are integral to the defense mechanisms of the respiratory tract, functioning in coordination with secretory cells in the removal of inhaled and cellular debris. The effects of various infectious and toxic agents on the structure and function of airway epithelial cell cilia have been studied in our laboratory, both of which have been shown to affect ciliary ultrastructure.These observations have led to questions about ciliary regeneration as well as the possible induction of ciliogenesis in response to cellular injury. Classical models of ciliogenesis in the conducting airway epithelium of the mammalian respiratory tract have been based primarily on observations of the developing fetal lung. These observations provide a plausible explanation for the embryological generation of ciliary beds lining the conducting airways but do little to account for subsequent differentiation of ciliated cells and ciliogenesis during normal growth and development.


2019 ◽  
Vol 4 (1) ◽  
pp. 59-76 ◽  
Author(s):  
Alison E. Fowler ◽  
Rebecca E. Irwin ◽  
Lynn S. Adler

Parasites are linked to the decline of some bee populations; thus, understanding defense mechanisms has important implications for bee health. Recent advances have improved our understanding of factors mediating bee health ranging from molecular to landscape scales, but often as disparate literatures. Here, we bring together these fields and summarize our current understanding of bee defense mechanisms including immunity, immunization, and transgenerational immune priming in social and solitary species. Additionally, the characterization of microbial diversity and function in some bee taxa has shed light on the importance of microbes for bee health, but we lack information that links microbial communities to parasite infection in most bee species. Studies are beginning to identify how bee defense mechanisms are affected by stressors such as poor-quality diets and pesticides, but further research on this topic is needed. We discuss how integrating research on host traits, microbial partners, and nutrition, as well as improving our knowledge base on wild and semi-social bees, will help inform future research, conservation efforts, and management.


Sign in / Sign up

Export Citation Format

Share Document