Author: Kenneth Okereafor
Publisher: CRC Press
ISBN: 1000357570
Category : Computers
Languages : en
Pages : 192
Book Description
As the 2020 global lockdown became a universal strategy to control the COVID-19 pandemic, social distancing triggered a massive reliance on online and cyberspace alternatives and switched the world to the digital economy. Despite their effectiveness for remote work and online interactions, cyberspace alternatives ignited several Cybersecurity challenges. Malicious hackers capitalized on global anxiety and launched cyberattacks against unsuspecting victims. Internet fraudsters exploited human and system vulnerabilities and impacted data integrity, privacy, and digital behaviour. Cybersecurity in the COVID-19 Pandemic demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel, academic, and social networking data. The book simplifies the socio-technical aspects of Cybersecurity and draws valuable lessons from the impacts COVID-19 cyberattacks exerted on computer networks, online portals, and databases. The book also predicts the fusion of Cybersecurity into Artificial Intelligence and Big Data Analytics, the two emerging domains that will potentially dominate and redefine post-pandemic Cybersecurity research and innovations between 2021 and 2025. The book’s primary audience is individual and corporate cyberspace consumers across all professions intending to update their Cybersecurity knowledge for detecting, preventing, responding to, and recovering from computer crimes. Cybersecurity in the COVID-19 Pandemic is ideal for information officers, data managers, business and risk administrators, technology scholars, Cybersecurity experts and researchers, and information technology practitioners. Readers will draw lessons for protecting their digital assets from email phishing fraud, social engineering scams, malware campaigns, and website hijacks.
Cybersecurity in the COVID-19 Pandemic
Author: Kenneth Okereafor
Publisher: CRC Press
ISBN: 1000357570
Category : Computers
Languages : en
Pages : 192
Book Description
As the 2020 global lockdown became a universal strategy to control the COVID-19 pandemic, social distancing triggered a massive reliance on online and cyberspace alternatives and switched the world to the digital economy. Despite their effectiveness for remote work and online interactions, cyberspace alternatives ignited several Cybersecurity challenges. Malicious hackers capitalized on global anxiety and launched cyberattacks against unsuspecting victims. Internet fraudsters exploited human and system vulnerabilities and impacted data integrity, privacy, and digital behaviour. Cybersecurity in the COVID-19 Pandemic demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel, academic, and social networking data. The book simplifies the socio-technical aspects of Cybersecurity and draws valuable lessons from the impacts COVID-19 cyberattacks exerted on computer networks, online portals, and databases. The book also predicts the fusion of Cybersecurity into Artificial Intelligence and Big Data Analytics, the two emerging domains that will potentially dominate and redefine post-pandemic Cybersecurity research and innovations between 2021 and 2025. The book’s primary audience is individual and corporate cyberspace consumers across all professions intending to update their Cybersecurity knowledge for detecting, preventing, responding to, and recovering from computer crimes. Cybersecurity in the COVID-19 Pandemic is ideal for information officers, data managers, business and risk administrators, technology scholars, Cybersecurity experts and researchers, and information technology practitioners. Readers will draw lessons for protecting their digital assets from email phishing fraud, social engineering scams, malware campaigns, and website hijacks.
Publisher: CRC Press
ISBN: 1000357570
Category : Computers
Languages : en
Pages : 192
Book Description
As the 2020 global lockdown became a universal strategy to control the COVID-19 pandemic, social distancing triggered a massive reliance on online and cyberspace alternatives and switched the world to the digital economy. Despite their effectiveness for remote work and online interactions, cyberspace alternatives ignited several Cybersecurity challenges. Malicious hackers capitalized on global anxiety and launched cyberattacks against unsuspecting victims. Internet fraudsters exploited human and system vulnerabilities and impacted data integrity, privacy, and digital behaviour. Cybersecurity in the COVID-19 Pandemic demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel, academic, and social networking data. The book simplifies the socio-technical aspects of Cybersecurity and draws valuable lessons from the impacts COVID-19 cyberattacks exerted on computer networks, online portals, and databases. The book also predicts the fusion of Cybersecurity into Artificial Intelligence and Big Data Analytics, the two emerging domains that will potentially dominate and redefine post-pandemic Cybersecurity research and innovations between 2021 and 2025. The book’s primary audience is individual and corporate cyberspace consumers across all professions intending to update their Cybersecurity knowledge for detecting, preventing, responding to, and recovering from computer crimes. Cybersecurity in the COVID-19 Pandemic is ideal for information officers, data managers, business and risk administrators, technology scholars, Cybersecurity experts and researchers, and information technology practitioners. Readers will draw lessons for protecting their digital assets from email phishing fraud, social engineering scams, malware campaigns, and website hijacks.
Cybercrime During the SARS-CoV-2 Pandemic
Author: Daniel Ventre
Publisher: John Wiley & Sons
ISBN: 1394226330
Category : Computers
Languages : en
Pages : 260
Book Description
The SARS-CoV-2 pandemic has had an undeniable impact on cybercrime. The initial crisis quickly became a global catastrophe with multiple consequences in economics, health, and political and social fields. This book explores how this global emergency has influenced cybercrime. Indeed, since feeding off new vulnerabilities, thanks to the effects of the pandemic crisis in various states around the world, cybercrime has increased and evolved. In 2020, the world was already dealing with numerous tensions and the effects of the global crisis have therefore only tended to exacerbate the issues that relate to cybercrime. For example, radicalization and identity theft has found an environment in which they thrive: the Internet. Criminals have been able to adapt their modus operandi, their targets and their attack vectors. However, on the plus side, the response of law enforcement and public authorities, in terms of the legal, policing and policy side of cybercrime, has also been adapted in order to better combat the increase in this phenomenon.
Publisher: John Wiley & Sons
ISBN: 1394226330
Category : Computers
Languages : en
Pages : 260
Book Description
The SARS-CoV-2 pandemic has had an undeniable impact on cybercrime. The initial crisis quickly became a global catastrophe with multiple consequences in economics, health, and political and social fields. This book explores how this global emergency has influenced cybercrime. Indeed, since feeding off new vulnerabilities, thanks to the effects of the pandemic crisis in various states around the world, cybercrime has increased and evolved. In 2020, the world was already dealing with numerous tensions and the effects of the global crisis have therefore only tended to exacerbate the issues that relate to cybercrime. For example, radicalization and identity theft has found an environment in which they thrive: the Internet. Criminals have been able to adapt their modus operandi, their targets and their attack vectors. However, on the plus side, the response of law enforcement and public authorities, in terms of the legal, policing and policy side of cybercrime, has also been adapted in order to better combat the increase in this phenomenon.
Responsible AI and Ethical Issues for Businesses and Governments
Author: Bistra Vassileva
Publisher:
ISBN: 9781799864387
Category : Technology & Engineering
Languages : en
Pages : 284
Book Description
"This book is aimed at scholars and practitioners who want to widen their understanding of artificial intelligence out of the 'narrow' technical perspective to a more broad viewpoint that embraces the links between AI theory, practice, and policy"--
Publisher:
ISBN: 9781799864387
Category : Technology & Engineering
Languages : en
Pages : 284
Book Description
"This book is aimed at scholars and practitioners who want to widen their understanding of artificial intelligence out of the 'narrow' technical perspective to a more broad viewpoint that embraces the links between AI theory, practice, and policy"--
Developments in the Field of Information and Telecommunications in the Context of International Security
Author: United Nations. Office for Disarmament Affairs
Publisher: Disarmament Study
ISBN: 9789211422818
Category : Political Science
Languages : en
Pages : 0
Book Description
This publication has been issued in implementation of the United Nations Disarmament Information Programme as a handy, convenient and attractive reference tool containing the report of the Secretary-General on verification in all its aspects, including the role of the UN in the field of verification. It also contains additional material related to the publication of the report. The publication continues the Disarmament Study Series and should serve as a valuable addition to the reference section of public and university libraries, permanent missions, research institutes and specialized non-governmental organisations.
Publisher: Disarmament Study
ISBN: 9789211422818
Category : Political Science
Languages : en
Pages : 0
Book Description
This publication has been issued in implementation of the United Nations Disarmament Information Programme as a handy, convenient and attractive reference tool containing the report of the Secretary-General on verification in all its aspects, including the role of the UN in the field of verification. It also contains additional material related to the publication of the report. The publication continues the Disarmament Study Series and should serve as a valuable addition to the reference section of public and university libraries, permanent missions, research institutes and specialized non-governmental organisations.
Criminal Contagion
Author: Tuesday Reitano
Publisher: Hurst Publishers
ISBN: 1787386163
Category : Social Science
Languages : en
Pages : 172
Book Description
Covid-19 is reshaping and challenging governments, societies and economies in previously unimaginable ways—but gangsters and profiteers have adapted. They have found new routes for illegal commodities, from narcotics to people. Shortages, lockdowns and public attitudes have brought the underworld and upperworld closer together, as criminals strive to meet needs, maximise opportunities and fill governance vacuums. Unscrupulous fraudsters are touting fake remedies to desperate people: counterfeit drugs, and trafficked wildlife used in traditional medicine. Social distancing and restrictions have seen online transactions and cyber-ops replacing or supplementing physical shipments, opening opportunities for scammers and hackers. Heavy-handed state responses have created new illicit markets by prohibiting the sale of particular goods and services, while some elites have capitalised on the pandemic for personal or political gain. Covid has cast a long shadow over the rule of law. Criminal Contagion uncovers its extraordinary impacts on the global illicit economy, and their long-term implications.
Publisher: Hurst Publishers
ISBN: 1787386163
Category : Social Science
Languages : en
Pages : 172
Book Description
Covid-19 is reshaping and challenging governments, societies and economies in previously unimaginable ways—but gangsters and profiteers have adapted. They have found new routes for illegal commodities, from narcotics to people. Shortages, lockdowns and public attitudes have brought the underworld and upperworld closer together, as criminals strive to meet needs, maximise opportunities and fill governance vacuums. Unscrupulous fraudsters are touting fake remedies to desperate people: counterfeit drugs, and trafficked wildlife used in traditional medicine. Social distancing and restrictions have seen online transactions and cyber-ops replacing or supplementing physical shipments, opening opportunities for scammers and hackers. Heavy-handed state responses have created new illicit markets by prohibiting the sale of particular goods and services, while some elites have capitalised on the pandemic for personal or political gain. Covid has cast a long shadow over the rule of law. Criminal Contagion uncovers its extraordinary impacts on the global illicit economy, and their long-term implications.
Stuck
Author: Heidi J. Larson
Publisher: Oxford University Press
ISBN: 0190077255
Category : Medical
Languages : en
Pages : 201
Book Description
Vaccine reluctance and refusal are no longer limited to the margins of society. Debates around vaccines' necessity -- along with quesitons around their side effects -- have gone mainstream, blending with geopolitical conflicts, political campaigns, celebrity causes, and "natural" lifestyles to win a growing number of hearts and minds. Today's anti-vaccine positions find audiences where they've never existed previously. Stuck examines how the issues surrounding vaccine hesitancy are, more than anything, about people feeling left out of the conversation. A new dialogue is long overdue, one that addresses the many types of vaccine hesitancy and the social factors that perpetuate them. To do this, Stuck provides a clear-eyed examination of the social vectors that transmit vaccine rumors, their manifestations around the globe, and how these individual threads are all connected.
Publisher: Oxford University Press
ISBN: 0190077255
Category : Medical
Languages : en
Pages : 201
Book Description
Vaccine reluctance and refusal are no longer limited to the margins of society. Debates around vaccines' necessity -- along with quesitons around their side effects -- have gone mainstream, blending with geopolitical conflicts, political campaigns, celebrity causes, and "natural" lifestyles to win a growing number of hearts and minds. Today's anti-vaccine positions find audiences where they've never existed previously. Stuck examines how the issues surrounding vaccine hesitancy are, more than anything, about people feeling left out of the conversation. A new dialogue is long overdue, one that addresses the many types of vaccine hesitancy and the social factors that perpetuate them. To do this, Stuck provides a clear-eyed examination of the social vectors that transmit vaccine rumors, their manifestations around the globe, and how these individual threads are all connected.
Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security
Author: Dawson, Maurice
Publisher: IGI Global
ISBN: 1799886956
Category : Computers
Languages : en
Pages : 282
Book Description
Developing nations have seen many technological advances in the last decade. Although beneficial and progressive, they can lead to unsafe mobile devices, system networks, and internet of things (IoT) devices, causing security vulnerabilities that can have ripple effects throughout society. While researchers attempt to find solutions, improper implementation and negative uses of technology continue to create new security threats to users. Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security brings together research-based chapters and case studies on systems security techniques and current methods to identify and overcome technological vulnerabilities, emphasizing security issues in developing nations. Focusing on topics such as data privacy and security issues, this book is an essential reference source for researchers, university academics, computing professionals, and upper-level students in developing countries interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.
Publisher: IGI Global
ISBN: 1799886956
Category : Computers
Languages : en
Pages : 282
Book Description
Developing nations have seen many technological advances in the last decade. Although beneficial and progressive, they can lead to unsafe mobile devices, system networks, and internet of things (IoT) devices, causing security vulnerabilities that can have ripple effects throughout society. While researchers attempt to find solutions, improper implementation and negative uses of technology continue to create new security threats to users. Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security brings together research-based chapters and case studies on systems security techniques and current methods to identify and overcome technological vulnerabilities, emphasizing security issues in developing nations. Focusing on topics such as data privacy and security issues, this book is an essential reference source for researchers, university academics, computing professionals, and upper-level students in developing countries interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.
Cybersecurity Management
Author: Nir Kshetri
Publisher: University of Toronto Press
ISBN: 1487531257
Category : Business & Economics
Languages : en
Pages : 429
Book Description
Cyberthreats are among the most critical issues facing the world today. Cybersecurity Management draws on case studies to analyze cybercrime at the macro level, and evaluates the strategic and organizational issues connected to cybersecurity. Cross-disciplinary in its focus, orientation, and scope, this book looks at emerging communication technologies that are currently under development to tackle emerging threats to data privacy. Cybersecurity Management provides insights into the nature and extent of cyberthreats to organizations and consumers, and how such threats evolve with new technological advances and are affected by cultural, organizational, and macro‐environmental factors. Cybersecurity Management articulates the effects of new and evolving information, communication technologies, and systems on cybersecurity and privacy issues. As the COVID-19 pandemic has revealed, we are all dependent on the Internet as a source for not only information but also person-to-person connection, thus our chances of encountering cyberthreats is higher than ever. Cybersecurity Management aims to increase the awareness of and preparedness to handle such threats among policy-makers, planners, and the public.
Publisher: University of Toronto Press
ISBN: 1487531257
Category : Business & Economics
Languages : en
Pages : 429
Book Description
Cyberthreats are among the most critical issues facing the world today. Cybersecurity Management draws on case studies to analyze cybercrime at the macro level, and evaluates the strategic and organizational issues connected to cybersecurity. Cross-disciplinary in its focus, orientation, and scope, this book looks at emerging communication technologies that are currently under development to tackle emerging threats to data privacy. Cybersecurity Management provides insights into the nature and extent of cyberthreats to organizations and consumers, and how such threats evolve with new technological advances and are affected by cultural, organizational, and macro‐environmental factors. Cybersecurity Management articulates the effects of new and evolving information, communication technologies, and systems on cybersecurity and privacy issues. As the COVID-19 pandemic has revealed, we are all dependent on the Internet as a source for not only information but also person-to-person connection, thus our chances of encountering cyberthreats is higher than ever. Cybersecurity Management aims to increase the awareness of and preparedness to handle such threats among policy-makers, planners, and the public.
Cybercrime in the Greater China Region
Author: Lennon Yao-Chung Chang
Publisher: Edward Elgar Pub
ISBN: 9780857936677
Category : Computers
Languages : en
Pages : 258
Book Description
'Lennon's research is an important contribution to the current limited understanding of the cybercrimes and related laws/regulations and incident reporting issues across the straits between the two major economies in the Asia region. A well researched book, and highly informative with practical suggestions for enhancing visibility and cooperation to improve the overall state of cybersecurity in the region, especially between the two economies.' - Meng-Chow Kang, Cisco Systems, China
Publisher: Edward Elgar Pub
ISBN: 9780857936677
Category : Computers
Languages : en
Pages : 258
Book Description
'Lennon's research is an important contribution to the current limited understanding of the cybercrimes and related laws/regulations and incident reporting issues across the straits between the two major economies in the Asia region. A well researched book, and highly informative with practical suggestions for enhancing visibility and cooperation to improve the overall state of cybersecurity in the region, especially between the two economies.' - Meng-Chow Kang, Cisco Systems, China
Hacking: The Next Generation
Author: Nitesh Dhanjani
Publisher: "O'Reilly Media, Inc."
ISBN: 1449379214
Category : Computers
Languages : en
Pages : 299
Book Description
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vulnerabilities in wireless technologies and cloud infrastructures. Written by seasoned Internet security professionals, this book helps you understand the motives and psychology of hackers behind these attacks, enabling you to better prepare and defend against them. Learn how "inside out" techniques can poke holes into protected networks Understand the new wave of "blended threats" that take advantage of multiple application vulnerabilities to steal corporate data Recognize weaknesses in today's powerful cloud infrastructures and how they can be exploited Prevent attacks against the mobile workforce and their devices containing valuable data Be aware of attacks via social networking sites to obtain confidential information from executives and their assistants Get case studies that show how several layers of vulnerabilities can be used to compromise multinational corporations
Publisher: "O'Reilly Media, Inc."
ISBN: 1449379214
Category : Computers
Languages : en
Pages : 299
Book Description
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vulnerabilities in wireless technologies and cloud infrastructures. Written by seasoned Internet security professionals, this book helps you understand the motives and psychology of hackers behind these attacks, enabling you to better prepare and defend against them. Learn how "inside out" techniques can poke holes into protected networks Understand the new wave of "blended threats" that take advantage of multiple application vulnerabilities to steal corporate data Recognize weaknesses in today's powerful cloud infrastructures and how they can be exploited Prevent attacks against the mobile workforce and their devices containing valuable data Be aware of attacks via social networking sites to obtain confidential information from executives and their assistants Get case studies that show how several layers of vulnerabilities can be used to compromise multinational corporations