- Xiaofeng Chen
State Key Laboratory of Integrated Service Networks (ISN) Xidian University, Xian, P.R.China
xfchen@xidian.edu.cn - Willy Susilo
Centre for Computer and Information Security Research (CCISR)
wsusilo@uow.edu.au
ISSN: 2182-2069 (printed) / ISSN: 2182-2077 (online)
Guest Editorial: Special Issue on Cyber Security Protections and Applications
Nowadays, the Internet has become increasingly ubiquitous that supports many aspects of our lives. People and our societies have become increasingly dependent on the Internet for personal or professional uses, either for business or leisure. Despite all of the diverse advantages and benefits offered by the Internet, it also has become a common channel for communication and data transmission. Nevertheless, with the rapid development of network, many new challenges have been encountered and arising. In particular, a major issue is the security and privacy. Furthermore, the problem of privacy protection and any information leakage prevention becomes more severe, with some serious implications. These challenges come from the fact that the network may be compromised or controlled by malware or adversaries. Malware or adversary that targets the operating system is usually intended to collect sensitive information illegally. Clearly, these information security threats to vital national infrastructures and the risks of using these insecure services span from some serious financial loss to invasions of our privacy. Therefore, keeping the information safe and hence, the development of techniques for ensuring the security of data during transmission is an emerging and important problem in our society. To ensure a safe and prosperous human society and a good performance for network applications, information protection methods should be considered. Therefore, it is essential that we have effective techniques and tools to design and evaluate secure systems and demonstrate that they meet their security requirements.