ABSTRACT

In this chapter we discuss a number of problems that need to be resolved. The organization of this chapter is as follows. In Section 29.2 we discuss digital identity. Identity management is about managing the identity of the individuals but at the same time ensuring privacy. In Section 29.3 we discuss identity theft. We hear about stolen credit cards and bank

accounts. How can we handle such threats? Section 29.4 addresses digital forensics. That is, how can we carry out essentially a postmortem on cyber-crimes? In Section 29.5 we discuss biometrics, which deals with technologies to identify a person based on, say, facial features. Section 29.6 discusses digital watermarking and steganalysis which deal with techniques for detecting encoded messages in images and video. In Section 29.7 we discuss risk management. That is, how can we analyze what the risks are and mitigate the risks? We also address economic analysis with respect to trust and security. In Section 29.7 we discuss various types of applications security such as securing e-mail. The role of database and applications security in homeland security is discussed in Section 29.8. The chapter is summarized in Section 29.9. Figure 29.1 illustrates the various topics addressed in this chapter.