Preface

Understanding and realizing the security and privacy challenges of information systems is a very critical and demanding task for both software engineers and developers to design and implement reliable and trustworthy information systems. These challenges earn even more attention nowadays where our society relies on the use of modern information systems to address its own needs. The number of Internet users that present a high degree of dependability on systems and services for fulfilling their daily activities increases at a great pace. Thus, it is important to understand and identify all the necessary factors that play a key role in satisfying the security and privacy of the system.

This book provides novel contributions and research efforts related to security and privacy by shedding light on the legal, ethical, and technical aspects of security and privacy. This book consists of 12 chapters divided in three groups. The first contains works that discuss the ethical and legal aspects of security and privacy, the second contains works that focus more on the technical aspects of security and privacy, and the third contains works that show the applicability of various solutions in the aforementioned fields.

This book is perfect for both experienced readers and young researchers that seek to study the different sub-disciplines of security and privacy. All authors that contributed in this book presented their works in a clear and easy to read way in order for everyone to be able to understand the meaning of their contribution in relation to the book's objectives. Since every author has a background in security and privacy and introduces new research topics and solutions through their work, this book can serve also as a valuable handbook for teaching purposes.

I would like to thank all authors for their contributions and the editorial team of IntechOpen for their valuable support to finish and publish this book. I would also like to thank my wife Liana for her support during the preparation of this book.

**II**

**Chapter 8 125**

Applications **139**

**Chapter 9 141**

**Chapter 10 155**

**Chapter 11 177**

**Chapter 12 195**

A Review of Several Privacy Violation Measures for Large Networks

Beyond Differential Privacy: Synthetic Micro-Data Generation with

Machine Learning Applications in Misuse and Anomaly Detection

Hardware Implementation of Audio Watermarking Based on DWT

Multimodal Biometrics for Person Authentication

*by Tanima Chatterjee, Nasim Mobasheri and Bhaskar DasGupta*

under Active Attacks

Deep Generative Neural Networks *by Ofer Mendelevitch and Michael D. Lesh*

*by Jaydip Sen and Sidra Mehtab*

*by Ryszard S. Choras*

Transform *by Amit M. Joshi*

**Section 3**

**Christos Kalloniatis** Associate Professor, University of the Aegean, Greece

**Carlos Travieso-Gonzalez** University of Las Palmas de Gran Canaria, Spain

**1**

Section 1

Legal and Ethical Issues

Section 1 Legal and Ethical Issues

**3**

**Chapter 1**

**Abstract**

Legal Aspects of International

The objective of the research is considering the international information security concept that has developed at the global and regional levels and analysis of legal instruments for its implementation and resolving problems of the regulation of relations in the global information society. A complex of general scientific and philosophical methods including the formal-logical, comparative-legal, formal-legal, systemic-structural, and problematic-theoretical methods, as well as methods of analysis and synthesis, generalization and description, and comparison, was used in the research. As a result of the research, it has been found that a unified concept of provision of the international information security has developed at the global and regional levels, which needs legal instruments for its implementation at the global level. In the drafting and acceptance of international treaties at the global level, the experience of the Council of Europe in prosecution of cybercrime and protection of privacy should be used. The findings can be used in the activities of international organizations in execution of their functions of unification and harmonization of the international information security law and by the national telecommunication

operators in the process of entering international and foreign markets.

**Keywords:** international law, global level, regional level, information security,

The technological progress has led to radical changes in the contemporary world.

The system of international relations changed. The development of information and communication technologies (ICT) has affected all the areas of public life including the economy, politics, social issues, and culture, bringing them together

By the present time, the information society concept has been represented in a number of international documents among which are the Declaration of Principles entitled "Building the Information Society: a Global Challenge in the New Millennium" (hereinafter referred to as the 2003 Declaration) and the Plan of Action of the World Summit on the Information Society of December 12, 2003. Information society is a more general category as compared to the global information society. It can be established within a single state or at the regional or global levels. At the global level, it will be referred to as the global information society. The global information society can be defined as a system of international relations that are established in the sphere of operation of information systems, which

in the framework of establishment of an information society.

Information Security

*Valentina Petrovna Talimonchik*

cyberterrorism, computer crimes, privacy

**1. Introduction**
