- Table View
- List View
Cybersecurity and Identity Access Management
by Bharat S. Rawal Gunasekaran Manogaran Alexender PeterThis textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft. The book then highlights the cyber security protection techniques and overall risk assessments to detect and resolve these issues at the beginning stage to minimize data loss or damage. This book is written in a way that it presents the topics in a simplified holistic and pedagogical manner with end-of chapter exercises and examples to cater to undergraduate students, engineers and scientists who will benefit from this approach.
Cybersecurity and Privacy - Bridging the Gap (River Publishers Series In Communications Ser.)
by Samant Khajuria Lene Tolstrup Sørensen Knud Erik SkoubyThe huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is increasingly on the agenda both at company and at individual level. Cybersecurity and Privacy - bridging the gap addresses two very complex fields of the digital world, i.e., Cybersecurity and Privacy. These multifaceted, multidisciplinary and complex issues are usually understood and valued differently by different individuals, data holders and legal bodies. But a change in one field immediately affects the others. Policies, frameworks, strategies, laws, tools, techniques, and technologies - all of these are tightly interwoven when it comes to security and privacy. This book is another attempt to bridge the gap between the industry and academia. The book addresses the views from academia and industry on the subject.
Cybersecurity and Privacy in Cyber Physical Systems
by Yassine Maleh Shojafar Mohammad Darwish Ashraf Haqiq AbdelkrimCybersecurity and Privacy in Cyber-Physical Systems collects and reports on recent high-quality research that addresses different problems related to cybersecurity and privacy in cyber-physical systems (CPSs). It Presents high-quality contributions addressing related theoretical and practical aspects Improves the reader’s awareness of cybersecurity and privacy in CPSs Analyzes and presents the state of the art of CPSs, cybersecurity, and related technologies and methodologies Highlights and discusses recent developments and emerging trends in cybersecurity and privacy in CPSs Proposes new models, practical solutions, and technological advances related to cybersecurity and privacy in CPSs Discusses new cybersecurity and privacy models, prototypes, and protocols for CPSs This comprehensive book promotes high-quality research by bringing together researchers and experts in CPS security and privacy from around the world to share their knowledge of the different aspects of CPS security. Cybersecurity and Privacy in Cyber-Physical Systems is ideally suited for policymakers, industrial engineers, researchers, academics, and professionals seeking a thorough understanding of the principles of cybersecurity and privacy in CPSs. They will learn about promising solutions to these research problems and identify unresolved and challenging problems for their own research. Readers will also have an overview of CPS cybersecurity and privacy design.
Cybersecurity and Secure Information Systems: Challenges and Solutions in Smart Environments (Advanced Sciences and Technologies for Security Applications)
by Aboul Ella Hassanien Mohamed ElhosenyThis book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application. It gathers contributions by both academic and industrial researchers, covering all aspects of cybersecurity and addressing issues in secure information systems as well as other emerging areas. The content comprises high-quality research articles and reviews that promote a multidisciplinary approach and reflect the latest advances, challenges, requirements and methodologies. Thus, the book investigates e.g. security vulnerabilities, cybercrime, and privacy issues related to big data analysis, as well as advances in digital forensics, secure smart city services, and risk mitigation strategies for devices employing cyber-physical systems. Given its scope, the book offers a valuable resource for students, researchers, IT professionals and providers, citizens, consumers and policymakers involved or interested in the modern security procedures needed to protect our information and communication resources. Its goal is to foster a community committed to further research and education, and one that can also translate its findings into concrete practices.
Cybersecurity Awareness (Advances in Information Security #88)
by Jerry Andriessen Thomas Schaberreiter Alexandros Papanikolaou Juha RöningThis contributed volume tells the story of the establishment of a cybersecurity awareness framework for organizations, and how it was piloted in two public sector municipal contexts. It presents a clear picture of cybersecurity issues in municipalities and proposes a socio-technical solution for creating cybersecurity awareness, how to build the solution and what the impact is on the municipal contexts. The 9 chapters for this book also provide information regarding the design, the deployment and the evaluation of the technology.This book builds on the success of the European Horizon 2020 research and innovation project CS-AWARE. The research proposes the first cybersecurity situational awareness solution for local public administrations based on an analysis of the context, provides automatic incident detection and visualization, and enables information exchange with relevant national and EU level authorities involved in legislation and network security.Cybersecurity is one of the most challenging security problems for commercial companies, NGOs, governmental institutions as well as individuals. Reaching beyond the technology focused boundaries of classical information technology (IT) security, cybersecurity includes organizational and behavioral aspects of IT systems and that needs to comply to legal and regulatory framework for cybersecurity. While large corporations might have the resources to follow those developments and bring their IT infrastructure and services in line with the requirements, the burden for smaller organizations like local public administrations will be substantial and the required resources might not be available. New and innovative solutions that would help local public administration to ease the burden of being in line with cybersecurity requirements are needed.This book targets researchers working in cybersecurity, computer scientists, social scientists and advanced level students studying computer science and other related disciplines. Cybersecurity professionals as well as professionals working in local government contexts, including policy makers, communication experts and system administrators will also benefit from this book.
Cybersecurity Awareness Among Students and Faculty
by Abbas MoallemIn modern times, all individuals need to be knowledgeable about cybersecurity. They must have practical skills and abilities to protect themselves in cyberspace. What is the level of awareness among college students and faculty, who represent the most technologically active portion of the population in any society? According to the Federal Trade Commission’s 2016 Consumer Sentinel Network report, 19 percent of identity theft complaints came from people under the age of 29. About 74,400 young adults fell victim to identity theft in 2016. This book reports the results of several studies that investigate student and faculty awareness and attitudes toward cybersecurity and the resulting risks. It proposes a plan of action that can help 26,000 higher education institutions worldwide with over 207 million college students, create security policies and educational programs that improve security awareness and protection. Features Offers an understanding of the state of privacy awareness Includes the state of identity theft awareness Covers mobile phone protection Discusses ransomware protection Discloses a plan of action to improve security awareness
Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs: Proceedings of the 15th International Conference on Global Security, Safety and Sustainability, London, October 2023 (Advanced Sciences and Technologies for Security Applications)
by Hamid JahankhaniThis book provides an opportunity for researchers, scientists, government officials, strategist and operators and maintainers of large, complex and advanced systems and infrastructure to update their knowledge with the state of best practice in the challenging domains while networking with the leading representatives, researchers and solution providers. The advancement of Artificial Intelligence (AI), coupled with the prolificacy of the Internet of Things (IoT) devices are creating smart societies that are interconnected. Space exploration and satellite, drone and UAV technology have travelled a long way in recent years and some may debate that we are in the midst of a revolution; in terms of development and the increasing number of these devices being launched. But with this revolutionary progress, it presents itself with new challenges in terms of governance. The ethical implications of connecting the physical and digital worlds, and presenting the reality of a truly interconnected society, presents the realization of the concept of smart societies in reality.Drawing on 14 years of successful events on Information security, digital forensics and cybercrime, the 15th ICGS3-23 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. In an era of unprecedented volatile, political and economic environment across the world, computer based systems face ever more increasing challenges, disputes and responsibilities and while the Internet has created a global platform for the exchange of ideas, goods and services, however, it has also created boundless opportunities for cyber-crime.This book presents new materials and contributes to knowledge through the technological advances that are being made across artificial intelligence (AI), machine learning, blockchain and quantum computing. These technologies driven by a digital revolution are expected to be disruptive and provide major digital transformation in the way societies operate today. As a result, these advances provide social and economic benefits, but, also, provide new challenges that security industry need to raise their game to combat them.
Cybersecurity for Executives: A Practical Guide
by C. Joseph Touhill Gregory J. TouhillPractical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues Covers 'What to Do When You Get Hacked?' including Business Continuity and Disaster Recovery planning, Public Relations, Legal and Regulatory issues, and Notifications and Disclosures Provides steps for integrating cybersecurity into Strategy; Policy and Guidelines; Change Management and Personnel Management Identifies cybersecurity best practices that executives can and should use both in the office and at home to protect their vital information
Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing (Springer Series in Advanced Manufacturing)
by Dirk Schaefer Lane ThamesThis book introduces readers to cybersecurity and its impact on the realization of the Industry 4. 0 vision. It covers the technological foundations of cybersecurity within the scope of the Industry 4. 0 landscape and details the existing cybersecurity threats faced by Industry 4. 0, as well as state-of-the-art solutions with regard to both academic research and practical implementations. Industry 4. 0 and its associated technologies, such as the Industrial Internet of Things and cloud-based design and manufacturing systems are examined, along with their disruptive innovations. Further, the book analyzes how these phenomena capitalize on the economies of scale provided by the Internet. The book offers a valuable resource for practicing engineers and decision makers in industry, as well as researchers in the design and manufacturing communities and all those interested in Industry 4. 0 and cybersecurity.
Cybersecurity for Reconfigurable Hardware Based Critical Infrastructures
by Krishnendu Guha Jyoti Prakash Singh Amlan ChakrabartiThe book commences with an introductory section on reconfigurable computing and thereafter delves into its applications in critical infrastructures. This book analyzes how such systems may be affected due to vulnerabilities and also discusses how these can be attacked by adversaries or cybercriminals. This book also discusses protection mechanisms related to such threats. It initially starts with an introduction to the various industrial revolutions and the changes in security needs, followed by a basic description of reconfigurable hardware based critical infrastructures. Further, the book contains discussion on security administration and planning, auditing, monitoring and analysis, risk-response and recovery, control and countermeasures highlighting their need in reconfigurable hardware-based platforms. In addition to these, new concepts are introduced such as AI/ML for cybersecurity, digital forensics related to reconfigurable hardware based critical infrastructures. Finally, a hands on learning experience is presented to provide the readers with a practical flavour. The book will be useful to students (graduate and undergraduate), researchers, academicians and industry professionals.
Cybersecurity for Smart Cities: Practices and Challenges (Advanced Sciences and Technologies for Security Applications)
by Mohiuddin Ahmed Paul Haskell-DowlandEnsuring cybersecurity for smart cities is crucial for a sustainable cyber ecosystem. Given the undeniable complexity of smart cities, fundamental issues such as device configurations and software updates should be addressed when it is most needed to fight cyber-crime and ensure data privacy. This book addresses the cybersecurity challenges associated with smart cities, aiming to provide a bigger picture of the concepts, intelligent techniques, practices and research directions in this area. Furthermore, this book serves as a single source of reference for acquiring knowledge on the technology, processes and people involved in the next-generation of cyber-smart cities.
Cybersecurity for Space: Protecting the Final Frontier
by Jacob G. OakleyThis is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats. Space is one of the fastest growing military, government, and industry sectors. Because everything in today’s world exists within or connected to cyberspace, there is a dire need to ensure that cybersecurity is addressed in the burgeoning field of space operations. You will be introduced to the basic concepts involved in operating space systems that include low earth orbit (LEO), geosynchronous orbit (GEO), and others. Using the related high-level constraints, threats, and vectors, you will be able to frame a clear picture of the need and challenges of bringing cybersecurity to bear on satellites, space vehicles, and their related systems. The author, who has spent seven years in the US Marine Corps and was originally involved in satellite communications and later cyber operations, is now a seasoned cybersecurity practitioner currently implementing cybersecurity vision and strategy to a large portfolio of systems and programs, many focused specifically in space. A published academic and experienced professional, he brings a practical, real-world and tempered approach to securing space vehicles and their systems. What You Will Learn Understand what constitutes a space system and the challenges unique to operations of all spacecraftGet introduced to various space vehicles and their unique constraints and challengesBe aware of the physical and cyber threats to the space vehicle and its ability to fly and orbitKnow the physical and cyber vectors from which threats may manifestStudy the micro- and macro-analysis provided of space system attack scenariosBe familiar with the high-level problems of cybersecurity in the space domain Who This Book Is For This book is written for two audiences: those with a background in space operations as well as those in cybersecurity. It offers the guidance needed to understand the unique challenges to space operations that affect the implementation of cybersecurity.
Cybersecurity for Space: A Guide to Foundations and Challenges
by Jacob G. OakleySpace is one of the fastest growing military, government and industry sectors. Because everything in today’s world exists within or connected to cyberspace, there is a dire need to ensure cybersecurity is addressed in the burgeoning field of space operations. This revised and expanded edition will prime the reader with the knowledge needed to understand the unique challenges to space operations which affect the implementation of cybersecurity. Further, the reader will have foundational knowledge on what impacts cyber threats can have on space systems and how cybersecurity must rise to meet them. The author, who spent years in the United States Marine Corps, originally involved in satellite communications is now a seasoned cyber security practitioner who has provided cyber security vision and strategy to a large portfolio of systems and programs, many focused specifically in space. A published academic and experienced professional, he brings a practical, real-world and tempered approach to securing the final frontier. What You Will Learn Basic concepts of how different space vehicles operate in general. How such systems and their components integrate into cyberspace. A clear picture of the potential damage available via cyber-attacks to such systems. Basic efforts to mitigate such cyber threats will be presented through the various portions of space operations. Foundational issues at the intersection of the space and cyber domains Who This Book Is For This book is written for anyone curious about warfare in the era of cyber everything, those involved in cyber operations and cyber warfare, as well as security practitioners and policy or decision makers who are on the sending or receiving end of such activity.
Cybersecurity Fundamentals: A Real-World Perspective
by Kutub Thakur Al-Sakib Khan PathanCybersecurity Fundamentals: A Real-World Perspective explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. This book covers fundamental issues using practical examples and real-world applications to give readers a rounded understanding of the subject and how it is applied. The first three chapters provide a deeper perspective on computer networks, cybersecurity, and different types of cyberattacks that hackers choose to unleash on cyber environments. It then goes on to cover the types of major computer malware and cybersecurity attacks that shook the cyber world in the recent years, detailing the attacks and analyzing their impact on the global economy. The details of the malware codes that help the hacker initiate the hacking attacks on networks are fully described. It then covers high-tech cybersecurity programs, devices, and mechanisms that are extensively adopted in modern security systems. Examples of those systems include intrusion detection systems (IDS), intrusion prevention systems (IPS), and security firewalls. It demonstrates how modern technologies can be used to create and manage passwords for secure data. This book also covers aspects of wireless networks and their security mechanisms. The details of the most commonly used Wi-Fi routers are provided with step-by-step procedures to configure and secure them more efficiently. Test questions are included throughout the chapters to ensure comprehension of the material. Along with this book’s step-by-step approach, this will allow undergraduate students of cybersecurity, network security, and related disciplines to gain a quick grasp of the fundamental topics in the area. No prior knowledge is needed to get the full benefit of this book.
CyberSecurity in a DevOps Environment: From Requirements to Monitoring
by Andrey Sadovykh Dragos Truscan Wissam Mallouli Ana Rosa Cavalli Cristina Seceleanu Alessandra BagnatoThis book provides an overview of software security analysis in a DevOps cycle including requirements formalisation, verification and continuous monitoring. It presents an overview of the latest techniques and tools that help engineers and developers verify the security requirements of large-scale industrial systems and explains novel methods that enable a faster feedback loop for verifying security-related activities, which rely on techniques such as automated testing, model checking, static analysis, runtime monitoring, and formal methods. The book consists of three parts, each covering a different aspect of security engineering in the DevOps context. The first part, "Security Requirements", explains how to specify and analyse security issues in a formal way. The second part, "Prevention at Development Time", offers a practical and industrial perspective on how to design, develop and verify secure applications. The third part, "Protection at Operations", eventually introduces tools for continuous monitoring of security events and incidents. Overall, it covers several advanced topics related to security verification, such as optimizing security verification activities, automatically creating verifiable specifications from security requirements and vulnerabilities, and using these security specifications to verify security properties against design specifications and generate artifacts such as tests or monitors that can be used later in the DevOps process. The book aims at computer engineers in general and does not require specific knowledge. In particular, it is intended for software architects, developers, testers, security professionals, and tool providers, who want to define, build, test, and verify secure applications, Web services, and industrial systems.
Cybersecurity in China: The New Wave (Springerbriefs In Cybersecurity Ser.)
by Greg AustinThis book offers the first benchmarking study of China’s response to the problems of security in cyber space. There are several useful descriptive books on cyber security policy in China published between 2010 and 2016. As a result, we know quite well the system for managing cyber security in China, and the history of policy responses. What we don’t know so well, and where this book is useful, is how capable China has become in this domain relative to the rest of the world. This book is a health check, a report card, on China’s cyber security system in the face of escalating threats from criminal gangs and hostile states. The book also offers an assessment of the effectiveness of China’s efforts. It lays out the major gaps and shortcomings in China’s cyber security policy. It is the first book to base itself around an assessment of China’s cyber industrial complex, concluding that China does not yet have one. As Xi Jinping said in July 2016, the country’s core technologies are dominated by foreigners.
Cybersecurity in France (SpringerBriefs in Cybersecurity)
by Philippe BaumardThis Brief presents the overarching framework in which each nation is developing its own cyber-security policy, and the unique position adopted by France. Modern informational crises have penetrated most societal arenas, from healthcare, politics, economics to the conduct of business and welfare. Witnessing a convergence between information warfare and the use of "fake news", info-destabilization, cognitive warfare and cyberwar, this book brings a unique perspective on modern cyberwarfare campaigns, escalation and de-escalation of cyber-conflicts. As organizations are more and more dependent on information for the continuity and stability of their operations, they also become more vulnerable to cyber-destabilization, either genuine, or deliberate for the purpose of gaining geopolitical advantage, waging wars, conducting intellectual theft and a wide range of crimes. Subsequently, the regulation of cyberspace has grown into an international effort where public, private and sovereign interests often collide. By analyzing the particular case of France national strategy and capabilities, the authors investigate the difficulty of obtaining a global agreement on the regulation of cyber-warfare. A review of the motives for disagreement between parties suggests that the current regulation framework is not adapted to the current technological change in the cybersecurity domain. This book suggests a paradigm shift in handling and anchoring cyber-regulation into a new realm of behavioral and cognitive sciences, and their application to machine learning and cyber-defense.
Cybersecurity in Healthcare Applications
by S. Poonkuntran Rajesh Kumar Dhanaraj S. Aanjankumar Malathy SathyamoothyThe book explores the critical challenge of securing sensitive medical data in the face of rising cyber threats. It examines how artificial intelligence can be leveraged to detect and mitigate cyber threats in healthcare environments. It integrates advanced technologies such as AI security applications, blockchain techniques, cryptanalysis, and 5G security to strengthen the protection of healthcare systems. By offering insights into the latest vulnerability assessment technologies and effective protection strategies, this book serves as an essential resource for professionals and researchers dedicated to enhancing cyber security in the healthcare industry.
Cybersecurity in Italy: Governance, Policies and Ecosystem (SpringerBriefs in Cybersecurity)
by Luigi MartinoThis book presents a detailed and innovative analysis of the governance, policies and ecosystem that define the Italian cybersecurity posture. It explores the complex interplay between technology and policy in shaping national security strategies in the digital era. The author introduces the reader to the critical importance of a policy-driven approach to cyber security, highlighting the challenges and necessary evolution prompted by rapid technological advancements and the expanding relevance of cyberspace. It emphasizes the multifaceted nature of cyber security that extends beyond technological solutions to encompass a broad socio-political analytical framework. The author also illustrates the need for an integrated approach that includes policies development, stakeholder engagement and strategic national objectives. This book delves into the organizational structure and dynamics of Italian national cybersecurity ecosystem, while shedding light on the collaborative interactions among different actors within this complex field. It meticulously outlines the roles and responsibilities of public, private and civil sectors in enhancing Italy’s cyber resilience. Key developments such as the establishment of the National Cybersecurity Agency and the formulation of strategic objectives to safeguard national cyber perimeter are critically examined. This examination not only reflects on the strategies employed but also on the challenges and achievements in fostering a robust cyber security environment able to respond to both current and emerging threats. Through a blend of theoretical insights and practical case studies, supplemented by more than 30 semi-structured interviewees. This book also offers a comprehensive overview of efforts implemented by Italy in 10 years of policy making experience with the aim to structure the appropriate cyber security national institutional architecture. It provides valuable perspectives on the effectiveness of these policies, the ongoing adjustments required to address the fluid nature of cyber threats, and the implications of these efforts on both national and international scales. Upper-under graduate level and graduate level students in computer science or students interested in cybersecurity will want to purchase this book as a study guide. Researchers working in cybersecurity as well as Policy Makers, Legislators, Decision Makers and CISO will also want to purchase this book as a reference book.
Cybersecurity in Nigeria: A Case Study of Surveillance and Prevention of Digital Crime (SpringerBriefs in Cybersecurity)
by Aamo IorliamThis book reviews the use of digital surveillance for detecting, investigating and interpreting fraud associated with critical cyberinfrastructures in Nigeria, as it is well known that the country’s cyberspace and cyberinfrastructures are very porous, leaving too much room for cyber-attackers to freely operate. In 2017, there were 3,500 successful cyber-attacks on Nigerian cyberspace, which led to the country losing an estimated 450 million dollars. These cybercrimes are hampering Nigeria’s digital economy, and also help to explain why many Nigerians remain skeptical about Internet marketing and online transactions. If sensitive conversations using digital devices are not well monitored, Nigeria will be vulnerable to cyber-warfare, and its digital economy, military intelligence, and related sensitive industries will also suffer. The Nigerian Army Cyber Warfare Command was established in 2018 in order to combat terrorism, banditry, and other attacks by criminal groups in Nigeria. However, there remains an urgent need to produce digital surveillance software to help law enforcement agencies in Nigeria to detect and prevent these digitally facilitated crimes. The monitoring of Nigeria’s cyberspace and cyberinfrastructure has become imperative, given that the rate of criminal activities using technology has increased tremendously. In this regard, digital surveillance includes both passive forensic investigations (where an attack has already occurred) and active forensic investigations (real-time investigations that track attackers). In addition to reviewing the latest mobile device forensics, this book covers natural laws (Benford’s Law and Zipf’s Law) for network traffic analysis, mobile forensic tools, and digital surveillance software (e.g., A-BOT). It offers valuable insights into how digital surveillance software can be used to detect and prevent digitally facilitated crimes in Nigeria, and highlights the benefits of adopting digital surveillance software in Nigeria and other countries facing the same issues.
Cybersecurity in Robotic Autonomous Vehicles: Machine Learning Applications to Detect Cyber Attacks
by null Ahmed Alruwaili null Sardar M. Islam null Iqbal GondalCybersecurity in Robotic Autonomous Vehicles introduces a novel intrusion detection system (IDS) specifically designed for AVs, which leverages data prioritisation in CAN IDs to enhance threat detection and mitigation. It offers a pioneering intrusion detection model for AVs that uses machine and deep learning algorithms.Presenting a new method for improving vehicle security, the book demonstrates how the IDS has incorporated machine learning and deep learning frameworks to analyse CAN bus traffic and identify the presence of any malicious activities in real time with high level of accuracy. It provides a comprehensive examination of the cybersecurity risks faced by AVs with a particular emphasis on CAN vulnerabilities and the innovative use of data prioritisation within CAN IDs.The book will interest researchers and advanced undergraduate students taking courses in cybersecurity, automotive engineering, and data science. Automotive industry and robotics professionals focusing on Internet of Vehicles and cybersecurity will also benefit from the contents.
Cybersecurity in the Age of Smart Societies: Proceedings of the 14th International Conference on Global Security, Safety and Sustainability, London, September 2022 (Advanced Sciences and Technologies for Security Applications)
by Hamid JahankhaniThis book provides an opportunity for researchers, scientists, government officials, strategist and operators and maintainers of large, complex and advanced systems and infrastructure to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. The ongoing pandemic has created a new level of threats which presents new challenges around privacy, data protection, malicious application, unprotected networks or networks with basic protection that are being used as a gateway to larger infrastructure with complicated architecture, and unintentional misuse such as those associated with algorithmic bias. All these have increased the number of attack vectors that can be used to attack such networks. Drawing on 13 years of successful events on information security, digital forensics and cyber-crime, the 14th ICGS3-22 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. In an era of unprecedented volatile, political and economic environment across the world, computer-based systems face ever more increasing challenges, disputes and responsibilities, and whilst the Internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber-crime. This volume presents new materials and contribute to knowledge through the technological advances that are being made across artificial intelligence (AI), machine learning, blockchain and quantum computing. These technologies driven by a digital revolution are expected to be disruptive and provide major digital transformation in the way societies operate today. As result, although these advances provide social and economic benefits, but, also, provide new challenges that security industry need to raise their game to combat them.
Cybersecurity in the COVID-19 Pandemic
by Kenneth OkereaforAs the 2020 global lockdown became a universal strategy to control the COVID-19 pandemic, social distancing triggered a massive reliance on online and cyberspace alternatives and switched the world to the digital economy. Despite their effectiveness for remote work and online interactions, cyberspace alternatives ignited several Cybersecurity challenges. Malicious hackers capitalized on global anxiety and launched cyberattacks against unsuspecting victims. Internet fraudsters exploited human and system vulnerabilities and impacted data integrity, privacy, and digital behaviour. Cybersecurity in the COVID-19 Pandemic demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel, academic, and social networking data. The book simplifies the socio-technical aspects of Cybersecurity and draws valuable lessons from the impacts COVID-19 cyberattacks exerted on computer networks, online portals, and databases. The book also predicts the fusion of Cybersecurity into Artificial Intelligence and Big Data Analytics, the two emerging domains that will potentially dominate and redefine post-pandemic Cybersecurity research and innovations between 2021 and 2025. The book’s primary audience is individual and corporate cyberspace consumers across all professions intending to update their Cybersecurity knowledge for detecting, preventing, responding to, and recovering from computer crimes. Cybersecurity in the COVID-19 Pandemic is ideal for information officers, data managers, business and risk administrators, technology scholars, Cybersecurity experts and researchers, and information technology practitioners. Readers will draw lessons for protecting their digital assets from email phishing fraud, social engineering scams, malware campaigns, and website hijacks.
Cybersecurity Lessons from CoVID-19
by Robert SladeUsing the SARS-CoV-2/CoVID-19 pandemic as a giant case study, and following the structure of the domains of information security, this book looks at what the crisis teaches us about security. It points out specific security fundamentals where social, medical, or business responses to the crisis failed or needed to make specific use of those concepts. For the most part, these lessons are simply reminders of factors that get neglected during times of non-crisis. The lessons particularly point out the importance of planning and resilience in systems and business. Those studying cybersecurity and its preventive measures and applications, as well as those involved in risk management studies and assessments, will all benefit greatly from the book. Robert Slade has had an extensive and prolific career in management, security, and telecommunications research, analysis, and consultancy. He has served as an educator visiting universities and delivering lecturers and seminars.
Cybersecurity Management in Education Technologies: Risks and Countermeasures for Advancements in E-learning
by Abd El-Latif, Ahmed A.This book explores the intersection of cybersecurity and education technologies, providing practical solutions, detection techniques, and mitigation strategies to ensure a secure and protected learning environment in the face of evolving cyber threats. With a wide range of contributors covering topics from immersive learning to phishing detection, this book is a valuable resource for professionals, researchers, educators, students, and policymakers interested in the future of cybersecurity in education. Features: • Offers both theoretical foundations and practical guidance for fostering a secure and protected environment for educational advancements in the digital age. • Addresses the need for cybersecurity in education in the context of worldwide changes in education sources and advancements in technology. • Highlights the significance of integrating cybersecurity into educational practices and protecting sensitive information to ensure students’ performance prediction systems are not misused. • Covers a wide range of topics including immersive learning, cybersecurity education, and malware detection, making it a valuable resource for professionals, researchers, educators, students, and policymakers.