Securing the Future - Gururaj H L, Spoorthi M, Vinayakumar Ravi, Shreyas J, Kumar Sekhar Roy

Securing the Future

Introduction to Zero Trust in Cybersecurity
Buch | Softcover
XV, 87 Seiten
2024 | 2024
Springer International Publishing (Verlag)
978-3-031-63780-3 (ISBN)
53,49 inkl. MwSt

This book delves into the transformative concept of Zero Trust, challenging traditional notions of network security and advocating for a paradigm shift in cybersecurity strategies. Beginning with an exploration of the fundamentals behind Zero Trust and its core principles, the book progresses to practical insights on implementing Zero Trust networks and extending its principles to cloud environments. It addresses the crucial aspects of compliance and governance within the Zero Trust framework and provides real-world applications and case studies showcasing successful Zero Trust implementations. Furthermore, it underscores the importance of cultivating Zero Trust awareness throughout organizational culture to fortify security measures effectively. Highlighting both the challenges and the future potential of Zero Trust, this book offers a roadmap for organizations seeking to bolster their cybersecurity defenses amidst an evolving threat landscape.

Dr Gururaj H L: working as Associate Professor in the Department of Information Technology at Manipal Institute of Technology (MIT) in Bengaluru, India, where he brings a wealth of experience and expertise to the realm of academia and research. His commitment to scholarly pursuits and his dedication to fostering technological innovation have earned him recognition both nationally and internationally. With a strong foundation in computer science and engineering, Dr. Gururaj H L completed his Ph.D. at Malnad College of Engineering, Visvesvaraya Technological University, Belagavi, Karnataka, India, from 2014 to 2019. His doctoral research focused on areas such as QoS aware network congestion control, laying the groundwork for his future contributions to the field. Prior to his current position, Dr. [Your Name] held faculty positions at esteemed institutions, including VVCE, Mysuru, Karnataka, and MCE, Hassan, Karnataka, where he served as Associate Professor and Assistant Professor, respectively. His dedication to teaching and mentorship has been evident throughout his career, shaping the minds of countless students and inspiring the next generation of technologists.

 

In recognition of his academic achievements, Dr. Gururaj has been appointed as an ACM Distinguished Speaker by the ACM US Council, a testament to his expertise and leadership in the field. Additionally, he has received numerous awards and accolades for his contributions to research and education, including the Young Scientist International Travel Support Award and several Best Project Guide Awards. And his research interests span a wide range of cutting-edge technologies, including Cyber Security, Blockchain Technology, network security, cloud computing, and Machine Learning. His multidisciplinary approach to research reflects his commitment to addressing complex challenges and driving innovation in the field of information technology. As the Faculty Sponsor of the MITB ACM Student Chapter, he plays a pivotal role in nurturing the talents of aspiring technologists, providing them with guidance, mentorship, and opportunities for professional development. His passion for education and his dedication to advancing the field of information technology make him a valuable asset to the academic community.

 

Spoorthi M: Working as an Assistant Professor at Vidyavardhaka College of Engineering, Mysuru, Karnataka. Completed Master of Technology (MTech) in Computer Science and Engineering from Vidyavardhaka College of Engineering, Mysuru, and Bachelor of Engineering (B.E)

 in Computer Science and Engineering from Government Engineering College, Chamarajanagara, Karnataka. Professional interests lie primarily in the fields of Cyber Security and Machine Learning. With a keen focus on these areas, has contributed significantly to academia and research.

 

About the publications:

Among notable works is a paper titled "A Review On Cyber Crimes During Pandemic Of Covid-19," published in the Journal of Network Security and Data Mining. Published a patent titled "URL Phishing Detection System Using Hybrid Approach," demonstrating her innovative approach to tackling cybersecurity challenges.Additionally, contributed to the scholarly discourse through papers like

"Role of social engineering in cyber security" published in CRC Press, Taylor and Francis' Recent Trends in Computational Sciences, and "Social Engineering Threat: Phishing Detection using Machine Learning Approach" presented at the 2023 IEEE 3rd Mysore Sub Section International Conference (MysuruCon), available in IEEE Xplore.

Outside of research pursuits:

Has actively engaged in sharing expertise as a Resource Person for various workshops and Faculty Development Programs on Cyber Security and Ethical Hacking. This commitment to knowledge dissemination underscores her dedication to nur

Chapter 1. Foundations of Cybersecurity.- Chapter 2. Introduction to Zero Trust.- Chapter 3. Implementing Zero Trust Networks.- Chapter 4. Zero Trust for Cloud.- Chapter 5. Compliance and Governance in Zero Trust.- Chapter 6. Applications & Case Studies of Successful Zero Trust.- Chapter 7. Zero Trust Awareness: Creating A Culture Aware of Security.- Chapter 8. Challenges and Future Scope.

Erscheinungsdatum
Reihe/Serie SpringerBriefs in Applied Sciences and Technology
SpringerBriefs in Computational Intelligence
Zusatzinfo XV, 87 p. 17 illus., 16 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik
Schlagworte Business implications of zero trust • Cybersecurity for IT managers • Cybersecurity principles book • Executive's guide to zero trust • Implementing zero trust strategies • Zero trust architecture guide • Zero trust cybersecurity book • Zero trust frameworks explained
ISBN-10 3-031-63780-1 / 3031637801
ISBN-13 978-3-031-63780-3 / 9783031637803
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich