Cybersecurity for Cyber-Enabled Multimedia Applications
نویسندگان
چکیده
Chin-Chen Chang Feng Chia University, Taiwan W ith the rapid popularity of social network applications and advanced digital devices, we have witnessed the explosive growth of multimedia big data in terms of both scale and variety over the last few years. A large amount of multimedia data has been produced from different platforms, applications, and environments, including from social networking services, surveillance systems, Internet of Things (IoT) remote sensing, and entertainment applications. Such increases in multimedia big data are influencing communication through seamless network connections, enhanced user experiences, and free information sharing. At the same time, security issues related to such multimedia big data have arisen.
منابع مشابه
Big Data in Distributed Analytics, Cybersecurity, Cyber Warfare and Digital Forensics
Big Data can reduce the processing time of large volumes of data in the distributed computing environment using Hadoop. It also can predict potential cybersecurity breaches, help stop cyber attacks, and facilitate post-breach digital forensic analysis. This paper introduces Big Data applications in distributed analytics, general cybersecurity (general cyber threats, cyber attacks, and cyber sec...
متن کاملNational Cyber Security Strategies: Global Trends in Cyberspace
Nations must define priorities, objectives, goals and scope when formulating a national strategy that covers cyberspace, cybersecurity, stakeholder engagement, capacity building, cyber governance, cybercrime and cyber defense. The goal of this article is to propose a National Cybersecurity Strategy Model (NCSSM) based on key pillars in order to tackle the completion of all the requirements in a...
متن کاملCybersecurity Practices for E-Government: An Assessment in Bhutan
The main goal of e-government implementation is to improve the effectiveness, efficiency and quality of public service delivery using Information and Communication Technologies (ICT). However, its success is dependent on the provision of information security goals such as confidentiality, integrity, availability and trust. Therefore, cybersecurity is vital for the successful adoption of e-gover...
متن کاملTowards a Human Factors Ontology for Cyber Security
Traditional cybersecurity risk assessment is reactive and based on business risk assessment approach. The 2014 NIST Cybersecurity Framework provides businesses with an organizational tool to catalog cybersecurity efforts and areas that need additional support. As part of an on-going effort to develop a holistic, predictive cyber security risk assessment model, the characterization of human fact...
متن کاملCyber Responsibility to Protect: Legal Obligations of States Directly Affected by Cyber-Incidents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481 R I. Cyber Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 484 R II. Imposing Legal Responsibility on Directly Affected States . 491 R III. Responsibility of DAS Before, During, and After Cybersecurity Incidents . . . . . . . ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEEE MultiMedia
دوره 24 شماره
صفحات -
تاریخ انتشار 2017