Implementing Security Infrastructures Protects from Escalating Fraud

Smart Safety

By IGI Global on Aug 28, 2013
Contributed by Kaitlyn Retherford, Discipline Manager

Architectures and Protocols for Secure Information Technology Infrastructures In today's digital society, the conveniences that technology provides come with some risks that seem impossible to avoid. According to a 2013 report by Javelin Strategy and Research, more than 12 million people suffered from some form of identity fraud in 2012 alone. And as data becomes more and more digitized, the numbers will rise.

Editors Antonio Ruiz Martínez, Rafael Marín-López, and Fernando Pereñíguez García of the University of Murcia in Spain, came together to explore and research this issue in the new IGI Global title Architectures and Protocols for Secure Information Technology Infrastructures. Presenting an insightful look into the security of technological innovations, they propose:

“Information and Communications Technologies (ICT) have experienced impressive evolutions. As a consequence, they have enabled a number of technologies (laptops, smartphones, tablets, TV, etc.) with important computational power capabilities compared with devices of some years ago. These advances have made the development of applications that facilitate an important number of activities through the Internet such as communication, collaboration, learning activities, purchases, establishment of social relationships, gaming, voting, banking operations, etc., possible. Although all these possibilities are advantageous to the user, they also present a number of security risks. These risks are derived from the need to establish communications between remote entities that cannot mutually verify in a physical manner who they are. For example, some relevant security risks are concerned with verifying whether the information has not changed during its exchange or being eavesdropped upon, whether a malware is manipulating the information we are working with and that is stored in our personal computer or mobile device, whether our device is being used to attack other computers, whether the information is properly stored and secured on the server we use, etc.”

Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues.

This publication is also part of IGI Global’s Advances in Information Security, Privacy, and Ethics Book Series bundle, which provides only the most cutting-edge research on how information is utilized in the digital age. The series covers topics such as Information Security Standards, Network Security Services, Privacy Issues of Social Networking, and Telecommunications Regulations, all of which are important factors to take into consideration when utilizing today’s digital technologies.
Browse for more posts in:
Security and ForensicsSoftwareInformation Security & PrivacyInformation TrustVirtual CommunitiesBook SeriesBooks & E-BooksInfoSci-DatabasesTopic CollectionsEastern EuropeEuropeAuthor NewsResources for InstructorsResources for Researchers

No comments Comments

Log in or sign up to comment.
Be the first to comment!

More from IGI Global

0
In this digital era, the risk of fraud and corruption is now a major concern for people everywhere, leaving individuals desperate for a solution.
IGI GlobalRead More
0
With the rapid growth in the world of FinTech, it can be hard for users to stay up to date with the most recent innovations.
IGI GlobalRead More
Computer Science and Information TechnologyBooks & E-Books
Scopus continues to recognize IGI Global books for their high-quality and importance within the academic community. Learn what this prestigious recognition means for the publisher and the experts behind these books.
IGI GlobalRead More
Books & E-BooksAwards & RecognitionReviews & Indexing
Researchers are finding correlations between environmental factors and the development and worsening of Parkinson's Disease.
IGI GlobalRead More
Medical, Healthcare, and Life SciencesEnvironmental, Agricultural, and Physical SciencesBooks & E-BooksResearch Trends
0
Check out this video of chapter author, Stephanie Kew Yen Nee highlighting their recent research and discoveries regarding electromagnetic wave control.
IGI GlobalRead More
Materials ScienceBooks & E-BooksChaptersPresentations
Your mental health and wellbeing may improve with a break from technology.
IGI GlobalRead More
Social Sciences and HumanitiesBooks & E-BooksResearch Trends
0
Amid the COVID-19 pandemic, there has been a significant shift towards remote work for employees globally.
IGI GlobalRead More
Business and ManagementBusiness & Organizational ResearchBooks & E-Books
IGI Global is pleased to announce a call for papers for the International Journal of Artificial Intelligence (AI) in Medicine and Healthcare (IJAIMH), an esteemed publication dedicated to advancing research and scholarship in medicine and healthcare.
IGI GlobalRead More
Medical, Healthcare, and Life SciencesJournalsArticlesOpen Access
The use of generative AI to create harmful content, including illegal child abuse images has raised concerns among law enforcement and child protection agencies. Tech company Mogul Elon Musk agrees that regulation of the quickly advancing field is necessary.
IGI GlobalRead More
Computer Science and Information TechnologyGovernment and LawSocial Sciences and HumanitiesArtificial IntelligenceBooks & E-BooksResearch Trends
Why Research-Based Content Is Valuable For Industry Practitioners And Professionals
First Previous 1 2 3 4 5 6 7 8 9 10  ... Next Last