Author: Sudhanshu Maurya
Publisher: Springer Nature
ISBN: 9811925380
Category : Technology & Engineering
Languages : en
Pages : 483
Book Description
The book is a collection of best selected research papers presented at International Conference on Cyber-Technologies and Emerging Sciences (ICCTES 2021), organized by Graphic Era Hill University, Bhimtal Campus, Uttarakhand, India, during 17 – 18 December 2021. The book covers state-of-the-art applications, innovative methods, and analyze the unexplored and unsolved challenges to establish the relative solutions to advance the existing applications and theories of Cyber-Technologies and Emerging Sciences.
Cyber Technologies and Emerging Sciences
Author: Sudhanshu Maurya
Publisher: Springer Nature
ISBN: 9811925380
Category : Technology & Engineering
Languages : en
Pages : 483
Book Description
The book is a collection of best selected research papers presented at International Conference on Cyber-Technologies and Emerging Sciences (ICCTES 2021), organized by Graphic Era Hill University, Bhimtal Campus, Uttarakhand, India, during 17 – 18 December 2021. The book covers state-of-the-art applications, innovative methods, and analyze the unexplored and unsolved challenges to establish the relative solutions to advance the existing applications and theories of Cyber-Technologies and Emerging Sciences.
Publisher: Springer Nature
ISBN: 9811925380
Category : Technology & Engineering
Languages : en
Pages : 483
Book Description
The book is a collection of best selected research papers presented at International Conference on Cyber-Technologies and Emerging Sciences (ICCTES 2021), organized by Graphic Era Hill University, Bhimtal Campus, Uttarakhand, India, during 17 – 18 December 2021. The book covers state-of-the-art applications, innovative methods, and analyze the unexplored and unsolved challenges to establish the relative solutions to advance the existing applications and theories of Cyber-Technologies and Emerging Sciences.
Cybersecurity Issues in Emerging Technologies
Author: Leandros Maglaras
Publisher: CRC Press
ISBN: 1000459217
Category : Computers
Languages : en
Pages : 157
Book Description
The threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing attack surface with a diversity of attack vectors, a clear asymmetry between attackers and defenders, billions of connected IoT devices, mostly reactive detection and mitigation approaches, and finally big data challenges. The clear asymmetry of attacks and the enormous amount of data are additional arguments to make it necessary to rethink cybersecurity approaches in terms of reducing the attack surface, to make the attack surface dynamic, to automate the detection, risk assessment, and mitigation, and to investigate the prediction and prevention of attacks with the utilization of emerging technologies like blockchain, artificial intelligence and machine learning. This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. The issues that are discussed and analyzed include smart connected cars, unmanned ships, 5G/6G connectivity, blockchain, agile incident response, hardware assisted security, ransomware attacks, hybrid threats and cyber skills gap. Both theoretical analysis and experimental evaluation of state-of-the-art techniques are presented and discussed. Prospective readers can be benefitted in understanding the future implications of novel technologies and proposed security solutions and techniques. Graduate and postgraduate students, research scholars, academics, cybersecurity professionals, and business leaders will find this book useful, which is planned to enlighten both beginners and experienced readers.
Publisher: CRC Press
ISBN: 1000459217
Category : Computers
Languages : en
Pages : 157
Book Description
The threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing attack surface with a diversity of attack vectors, a clear asymmetry between attackers and defenders, billions of connected IoT devices, mostly reactive detection and mitigation approaches, and finally big data challenges. The clear asymmetry of attacks and the enormous amount of data are additional arguments to make it necessary to rethink cybersecurity approaches in terms of reducing the attack surface, to make the attack surface dynamic, to automate the detection, risk assessment, and mitigation, and to investigate the prediction and prevention of attacks with the utilization of emerging technologies like blockchain, artificial intelligence and machine learning. This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. The issues that are discussed and analyzed include smart connected cars, unmanned ships, 5G/6G connectivity, blockchain, agile incident response, hardware assisted security, ransomware attacks, hybrid threats and cyber skills gap. Both theoretical analysis and experimental evaluation of state-of-the-art techniques are presented and discussed. Prospective readers can be benefitted in understanding the future implications of novel technologies and proposed security solutions and techniques. Graduate and postgraduate students, research scholars, academics, cybersecurity professionals, and business leaders will find this book useful, which is planned to enlighten both beginners and experienced readers.
Emerging Cyber Threats and Cognitive Vulnerabilities
Author: Vladlena Benson
Publisher: Academic Press
ISBN: 0128165944
Category : Psychology
Languages : en
Pages : 254
Book Description
Emerging Cyber Threats and Cognitive Vulnerabilities identifies the critical role human behavior plays in cybersecurity and provides insights into how human decision-making can help address rising volumes of cyberthreats. The book examines the role of psychology in cybersecurity by addressing each actor involved in the process: hackers, targets, cybersecurity practitioners and the wider social context in which these groups operate. It applies psychological factors such as motivations, group processes and decision-making heuristics that may lead individuals to underestimate risk. The goal of this understanding is to more quickly identify threat and create early education and prevention strategies. This book covers a variety of topics and addresses different challenges in response to changes in the ways in to study various areas of decision-making, behavior, artificial intelligence, and human interaction in relation to cybersecurity. - Explains psychological factors inherent in machine learning and artificial intelligence - Discusses the social psychology of online radicalism and terrorist recruitment - Examines the motivation and decision-making of hackers and "hacktivists" - Investigates the use of personality psychology to extract secure information from individuals
Publisher: Academic Press
ISBN: 0128165944
Category : Psychology
Languages : en
Pages : 254
Book Description
Emerging Cyber Threats and Cognitive Vulnerabilities identifies the critical role human behavior plays in cybersecurity and provides insights into how human decision-making can help address rising volumes of cyberthreats. The book examines the role of psychology in cybersecurity by addressing each actor involved in the process: hackers, targets, cybersecurity practitioners and the wider social context in which these groups operate. It applies psychological factors such as motivations, group processes and decision-making heuristics that may lead individuals to underestimate risk. The goal of this understanding is to more quickly identify threat and create early education and prevention strategies. This book covers a variety of topics and addresses different challenges in response to changes in the ways in to study various areas of decision-making, behavior, artificial intelligence, and human interaction in relation to cybersecurity. - Explains psychological factors inherent in machine learning and artificial intelligence - Discusses the social psychology of online radicalism and terrorist recruitment - Examines the motivation and decision-making of hackers and "hacktivists" - Investigates the use of personality psychology to extract secure information from individuals
Cyber Forensics
Author: Albert J. Marcella
Publisher: CRC Press
ISBN: 100042488X
Category : Law
Languages : en
Pages : 382
Book Description
Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to influence daily business decisions, the proactive use of cyber forensics to better assess the risks that the exploitation of these technologies pose to enterprise-wide operations is rapidly becoming a strategic business objective. This book moves beyond the typical, technical approach to discussing cyber forensics processes and procedures. Instead, the authors examine how cyber forensics can be applied to identifying, collecting, and examining evidential data from emerging and hybrid technologies, while taking steps to proactively manage the influence and impact, as well as the policy and governance aspects of these technologies and their effect on business operations. A world-class team of cyber forensics researchers, investigators, practitioners and law enforcement professionals have come together to provide the reader with insights and recommendations into the proactive application of cyber forensic methodologies and procedures to both protect data and to identify digital evidence related to the misuse of these data. This book is an essential guide for both the technical and non-technical executive, manager, attorney, auditor, and general practitioner who is seeking an authoritative source on how cyber forensics may be applied to both evidential data collection and to proactively managing today’s and tomorrow’s emerging and hybrid technologies. The book will also serve as a primary or supplemental text in both under- and post-graduate academic programs addressing information, operational and emerging technologies, cyber forensics, networks, cloud computing and cybersecurity.
Publisher: CRC Press
ISBN: 100042488X
Category : Law
Languages : en
Pages : 382
Book Description
Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to influence daily business decisions, the proactive use of cyber forensics to better assess the risks that the exploitation of these technologies pose to enterprise-wide operations is rapidly becoming a strategic business objective. This book moves beyond the typical, technical approach to discussing cyber forensics processes and procedures. Instead, the authors examine how cyber forensics can be applied to identifying, collecting, and examining evidential data from emerging and hybrid technologies, while taking steps to proactively manage the influence and impact, as well as the policy and governance aspects of these technologies and their effect on business operations. A world-class team of cyber forensics researchers, investigators, practitioners and law enforcement professionals have come together to provide the reader with insights and recommendations into the proactive application of cyber forensic methodologies and procedures to both protect data and to identify digital evidence related to the misuse of these data. This book is an essential guide for both the technical and non-technical executive, manager, attorney, auditor, and general practitioner who is seeking an authoritative source on how cyber forensics may be applied to both evidential data collection and to proactively managing today’s and tomorrow’s emerging and hybrid technologies. The book will also serve as a primary or supplemental text in both under- and post-graduate academic programs addressing information, operational and emerging technologies, cyber forensics, networks, cloud computing and cybersecurity.
Cyberthreats
Author: Susan W Brenner
Publisher: Oxford University Press
ISBN: 0199745161
Category : Law
Languages : en
Pages : 321
Book Description
As new technologies develop, terrorist groups are developing new methods of attack by using the Internet, and by using cyberspace as a battlefield, it has become increasingly difficult to discover the identity of attackers and bring them to justice. The seemingly limitless boundaries of cyberspace has allowed virtually anyone to launch an attack from a remote and anonymous location. But once these attacks occur, it raises several important questions; who should respond, and how?; how should nation-states effectively deal with a cyber-attack?; and will the United States and other nation-states be able to survive in a world where virtual boundaries are limitless? In Cyberthreats: The Emerging Fault Lines of the Nation State Susan Brenner gives a thorough explanation of how military and law enforcement personnel respond to these attacks and why bringing cyber-terrorist to justice can be difficult and sometimes impossible.
Publisher: Oxford University Press
ISBN: 0199745161
Category : Law
Languages : en
Pages : 321
Book Description
As new technologies develop, terrorist groups are developing new methods of attack by using the Internet, and by using cyberspace as a battlefield, it has become increasingly difficult to discover the identity of attackers and bring them to justice. The seemingly limitless boundaries of cyberspace has allowed virtually anyone to launch an attack from a remote and anonymous location. But once these attacks occur, it raises several important questions; who should respond, and how?; how should nation-states effectively deal with a cyber-attack?; and will the United States and other nation-states be able to survive in a world where virtual boundaries are limitless? In Cyberthreats: The Emerging Fault Lines of the Nation State Susan Brenner gives a thorough explanation of how military and law enforcement personnel respond to these attacks and why bringing cyber-terrorist to justice can be difficult and sometimes impossible.
Emerging Security Technologies and EU Governance
Author: Antonio Calcara
Publisher: Routledge
ISBN: 1000092712
Category : Political Science
Languages : en
Pages : 382
Book Description
This book examines the European governance of emerging security technologies. The emergence of technologies such as drones, autonomous robotics, artificial intelligence, cyber and biotechnologies has stimulated worldwide debates on their use, risks and benefits in both the civilian and the security-related fields. This volume examines the concept of ‘governance’ as an analytical framework and tool to investigate how new and emerging security technologies are governed in practice within the European Union (EU), emphasising the relational configurations among different state and non-state actors. With reference to European governance, it addresses the complex interplay of power relations, interests and framings surrounding the development of policies and strategies for the use of new security technologies. The work examines varied conceptual tools to shed light on the way diverse technologies are embedded in EU policy frameworks. Each contribution identifies actors involved in the governance of a specific technology sector, their multilevel institutional and corporate configurations, and the conflicting forces, values, ethical and legal concerns, as well as security imperatives and economic interests. This book will be of much interest to students of science and technology studies, security studies and EU policy. Chapter 11 of this book is freely available as a downloadable Open Access PDF at http://www.taylorfrancis.com under a Creative Commons Attribution-Non Commercial-No Derivatives (CC-BY-NC-ND) 4.0 license.
Publisher: Routledge
ISBN: 1000092712
Category : Political Science
Languages : en
Pages : 382
Book Description
This book examines the European governance of emerging security technologies. The emergence of technologies such as drones, autonomous robotics, artificial intelligence, cyber and biotechnologies has stimulated worldwide debates on their use, risks and benefits in both the civilian and the security-related fields. This volume examines the concept of ‘governance’ as an analytical framework and tool to investigate how new and emerging security technologies are governed in practice within the European Union (EU), emphasising the relational configurations among different state and non-state actors. With reference to European governance, it addresses the complex interplay of power relations, interests and framings surrounding the development of policies and strategies for the use of new security technologies. The work examines varied conceptual tools to shed light on the way diverse technologies are embedded in EU policy frameworks. Each contribution identifies actors involved in the governance of a specific technology sector, their multilevel institutional and corporate configurations, and the conflicting forces, values, ethical and legal concerns, as well as security imperatives and economic interests. This book will be of much interest to students of science and technology studies, security studies and EU policy. Chapter 11 of this book is freely available as a downloadable Open Access PDF at http://www.taylorfrancis.com under a Creative Commons Attribution-Non Commercial-No Derivatives (CC-BY-NC-ND) 4.0 license.
Advances in Cyber Security
Author: D. Frank Hsu
Publisher: Fordham Univ Press
ISBN: 0823244563
Category : Computers
Languages : en
Pages : 273
Book Description
As you read this your computer is in jeopardy of being hacked and your identity being stolen. How can you protect yourself? The world's foremost cyber security experts from FBI Director Robert S. Mueller, III to Special Assistant to the President Howard A. Schmidt, share critical practical knowledge on how the cyberspace ecosystem is structured, how it functions, and what we can do to protect it and ourselves from attack
Publisher: Fordham Univ Press
ISBN: 0823244563
Category : Computers
Languages : en
Pages : 273
Book Description
As you read this your computer is in jeopardy of being hacked and your identity being stolen. How can you protect yourself? The world's foremost cyber security experts from FBI Director Robert S. Mueller, III to Special Assistant to the President Howard A. Schmidt, share critical practical knowledge on how the cyberspace ecosystem is structured, how it functions, and what we can do to protect it and ourselves from attack
Artificial Intelligence and Information Technologies
Author: Arvind Dagur
Publisher: CRC Press
ISBN: 1040115985
Category : Computers
Languages : en
Pages : 590
Book Description
This book contains the proceedings of a non-profit conference with the objective of providing a platform for academicians, researchers, scholars and students from various institutions, universities and industries in India and abroad to exchange their research and innovative ideas in the field of Artificial Intelligence and information technologies. It begins with exploring the research and innovation in the field of Artificial Intelligence and information technologies, including secure transaction, monitoring, real time assistance and security for advanced stage learners, researchers and academicians has been presented. It goes on to cover: Broad knowledge and research trends about Artificial Intelligence and information technologies and their role in today’s digital era Depiction of system model and architecture for clear picture of Artificial Intelligence in real life Discussion on the role of Artificial Intelligence in various real-life problems such as banking, healthcare, navigation, communication and security Explanation of the challenges and opportunities in Artificial Intelligence-based healthcare, education, banking and related industries Recent information technologies and challenges in this new epoch This book will be beneficial to researchers, academicians, undergraduate students, postgraduate students, research scholars, professionals, technologists and entrepreneurs.
Publisher: CRC Press
ISBN: 1040115985
Category : Computers
Languages : en
Pages : 590
Book Description
This book contains the proceedings of a non-profit conference with the objective of providing a platform for academicians, researchers, scholars and students from various institutions, universities and industries in India and abroad to exchange their research and innovative ideas in the field of Artificial Intelligence and information technologies. It begins with exploring the research and innovation in the field of Artificial Intelligence and information technologies, including secure transaction, monitoring, real time assistance and security for advanced stage learners, researchers and academicians has been presented. It goes on to cover: Broad knowledge and research trends about Artificial Intelligence and information technologies and their role in today’s digital era Depiction of system model and architecture for clear picture of Artificial Intelligence in real life Discussion on the role of Artificial Intelligence in various real-life problems such as banking, healthcare, navigation, communication and security Explanation of the challenges and opportunities in Artificial Intelligence-based healthcare, education, banking and related industries Recent information technologies and challenges in this new epoch This book will be beneficial to researchers, academicians, undergraduate students, postgraduate students, research scholars, professionals, technologists and entrepreneurs.
Cyber Influence and Cognitive Threats
Author: Vladlena Benson
Publisher: Academic Press
ISBN: 0128192054
Category : Psychology
Languages : en
Pages : 240
Book Description
In the wake of fresh allegations that personal data of Facebook users have been illegally used to influence the outcome of the US general election and the Brexit vote, the debate over manipulation of social Big Data continues to gain more momentum. Cyber Influence and Cognitive Threats addresses various emerging challenges in response to cybersecurity, examining cognitive applications in decision-making, behaviour and basic human interaction. The book examines the role of psychology in cybersecurity by addressing each factor involved in the process: hackers, targets, cybersecurity practitioners, and the wider social context in which these groups operate. Cyber Influence and Cognitive Threats covers a variety of topics including information systems, psychology, sociology, human resources, leadership, strategy, innovation, law, finance and others. - Explains psychological factors inherent in machine learning and artificial intelligence - Explores attitudes towards data and privacy through the phenomena of digital hoarding and protection motivation theory - Discusses the role of social and communal factors in cybersecurity behaviour and attitudes - Investigates the factors that determine the spread and impact of information and disinformation
Publisher: Academic Press
ISBN: 0128192054
Category : Psychology
Languages : en
Pages : 240
Book Description
In the wake of fresh allegations that personal data of Facebook users have been illegally used to influence the outcome of the US general election and the Brexit vote, the debate over manipulation of social Big Data continues to gain more momentum. Cyber Influence and Cognitive Threats addresses various emerging challenges in response to cybersecurity, examining cognitive applications in decision-making, behaviour and basic human interaction. The book examines the role of psychology in cybersecurity by addressing each factor involved in the process: hackers, targets, cybersecurity practitioners, and the wider social context in which these groups operate. Cyber Influence and Cognitive Threats covers a variety of topics including information systems, psychology, sociology, human resources, leadership, strategy, innovation, law, finance and others. - Explains psychological factors inherent in machine learning and artificial intelligence - Explores attitudes towards data and privacy through the phenomena of digital hoarding and protection motivation theory - Discusses the role of social and communal factors in cybersecurity behaviour and attitudes - Investigates the factors that determine the spread and impact of information and disinformation
Cybersecurity in Emerging Digital Era
Author: Rajeev Agrawal
Publisher:
ISBN: 9783030848439
Category :
Languages : en
Pages : 0
Book Description
This book constitutes selected and revised papers from the First International Conference on Cybersecurity in Emerging Digital Era, ICCEDE 2020, held in Greater Noida, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 9 full papers and 2 short papers presented in this volume were thoroughly reviewed and selected from 193 submissions. The papers are organized in topical sections on cyber security issues and challenges in emerging digital era; security resilience in contemporary applications.
Publisher:
ISBN: 9783030848439
Category :
Languages : en
Pages : 0
Book Description
This book constitutes selected and revised papers from the First International Conference on Cybersecurity in Emerging Digital Era, ICCEDE 2020, held in Greater Noida, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 9 full papers and 2 short papers presented in this volume were thoroughly reviewed and selected from 193 submissions. The papers are organized in topical sections on cyber security issues and challenges in emerging digital era; security resilience in contemporary applications.