Cybercrime, identity theft, and fraud: practicing safe internet - network security threats and vulnerabilities.
Robert C. NewmanPublished in: InfoSecCD (2006)
Keyphrases
- identity theft
- security threats
- criminal activities
- security issues
- security mechanisms
- security risks
- law enforcement
- personal information
- cyber crime
- personal data
- key management
- resource constrained
- information security
- access control
- security requirements
- sensitive data
- databases
- countermeasures
- cyber security
- privacy preserving
- lightweight
- anomaly detection
- peer to peer
- data streams