Cybersecurity in the COVID-19 Pandemic

Cybersecurity in the COVID-19 Pandemic

Author: Kenneth Okereafor

Publisher: CRC Press

Published: 2021-03-17

Total Pages: 168

ISBN-13: 1000357570

DOWNLOAD EBOOK

As the 2020 global lockdown became a universal strategy to control the COVID-19 pandemic, social distancing triggered a massive reliance on online and cyberspace alternatives and switched the world to the digital economy. Despite their effectiveness for remote work and online interactions, cyberspace alternatives ignited several Cybersecurity challenges. Malicious hackers capitalized on global anxiety and launched cyberattacks against unsuspecting victims. Internet fraudsters exploited human and system vulnerabilities and impacted data integrity, privacy, and digital behaviour. Cybersecurity in the COVID-19 Pandemic demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel, academic, and social networking data. The book simplifies the socio-technical aspects of Cybersecurity and draws valuable lessons from the impacts COVID-19 cyberattacks exerted on computer networks, online portals, and databases. The book also predicts the fusion of Cybersecurity into Artificial Intelligence and Big Data Analytics, the two emerging domains that will potentially dominate and redefine post-pandemic Cybersecurity research and innovations between 2021 and 2025. The book’s primary audience is individual and corporate cyberspace consumers across all professions intending to update their Cybersecurity knowledge for detecting, preventing, responding to, and recovering from computer crimes. Cybersecurity in the COVID-19 Pandemic is ideal for information officers, data managers, business and risk administrators, technology scholars, Cybersecurity experts and researchers, and information technology practitioners. Readers will draw lessons for protecting their digital assets from email phishing fraud, social engineering scams, malware campaigns, and website hijacks.


Cybercrime During the SARS-CoV-2 Pandemic

Cybercrime During the SARS-CoV-2 Pandemic

Author: Daniel Ventre

Publisher: John Wiley & Sons

Published: 2023-08-15

Total Pages: 260

ISBN-13: 1786308010

DOWNLOAD EBOOK

The SARS-CoV-2 pandemic has had an undeniable impact on cybercrime. The initial crisis quickly became a global catastrophe with multiple consequences in economics, health, and political and social fields. This book explores how this global emergency has influenced cybercrime. Indeed, since feeding off new vulnerabilities, thanks to the effects of the pandemic crisis in various states around the world, cybercrime has increased and evolved. In 2020, the world was already dealing with numerous tensions and the effects of the global crisis have therefore only tended to exacerbate the issues that relate to cybercrime. For example, radicalization and identity theft has found an environment in which they thrive: the Internet. Criminals have been able to adapt their modus operandi, their targets and their attack vectors. However, on the plus side, the response of law enforcement and public authorities, in terms of the legal, policing and policy side of cybercrime, has also been adapted in order to better combat the increase in this phenomenon.


Responsible AI and Ethical Issues for Businesses and Governments

Responsible AI and Ethical Issues for Businesses and Governments

Author: Bistra Vassileva

Publisher:

Published: 2020-09

Total Pages: 284

ISBN-13: 9781799864387

DOWNLOAD EBOOK

"This book is aimed at scholars and practitioners who want to widen their understanding of artificial intelligence out of the 'narrow' technical perspective to a more broad viewpoint that embraces the links between AI theory, practice, and policy"--


Developments in the Field of Information and Telecommunications in the Context of International Security

Developments in the Field of Information and Telecommunications in the Context of International Security

Author: United Nations. Office for Disarmament Affairs

Publisher: Disarmament Study

Published: 2011

Total Pages: 0

ISBN-13: 9789211422818

DOWNLOAD EBOOK

This publication has been issued in implementation of the United Nations Disarmament Information Programme as a handy, convenient and attractive reference tool containing the report of the Secretary-General on verification in all its aspects, including the role of the UN in the field of verification. It also contains additional material related to the publication of the report. The publication continues the Disarmament Study Series and should serve as a valuable addition to the reference section of public and university libraries, permanent missions, research institutes and specialized non-governmental organisations.


Stuck

Stuck

Author: Heidi J. Larson

Publisher: Oxford University Press

Published: 2020-07-01

Total Pages: 201

ISBN-13: 0190077255

DOWNLOAD EBOOK

Vaccine reluctance and refusal are no longer limited to the margins of society. Debates around vaccines' necessity -- along with quesitons around their side effects -- have gone mainstream, blending with geopolitical conflicts, political campaigns, celebrity causes, and "natural" lifestyles to win a growing number of hearts and minds. Today's anti-vaccine positions find audiences where they've never existed previously. Stuck examines how the issues surrounding vaccine hesitancy are, more than anything, about people feeling left out of the conversation. A new dialogue is long overdue, one that addresses the many types of vaccine hesitancy and the social factors that perpetuate them. To do this, Stuck provides a clear-eyed examination of the social vectors that transmit vaccine rumors, their manifestations around the globe, and how these individual threads are all connected.


Criminal Contagion

Criminal Contagion

Author: Tuesday Reitano

Publisher: Hurst Publishers

Published: 2021-07-01

Total Pages: 172

ISBN-13: 1787386163

DOWNLOAD EBOOK

Covid-19 is reshaping and challenging governments, societies and economies in previously unimaginable ways—but gangsters and profiteers have adapted. They have found new routes for illegal commodities, from narcotics to people. Shortages, lockdowns and public attitudes have brought the underworld and upperworld closer together, as criminals strive to meet needs, maximise opportunities and fill governance vacuums. Unscrupulous fraudsters are touting fake remedies to desperate people: counterfeit drugs, and trafficked wildlife used in traditional medicine. Social distancing and restrictions have seen online transactions and cyber-ops replacing or supplementing physical shipments, opening opportunities for scammers and hackers. Heavy-handed state responses have created new illicit markets by prohibiting the sale of particular goods and services, while some elites have capitalised on the pandemic for personal or political gain. Covid has cast a long shadow over the rule of law. Criminal Contagion uncovers its extraordinary impacts on the global illicit economy, and their long-term implications.


Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security

Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security

Author: Dawson, Maurice

Publisher: IGI Global

Published: 2022-02-04

Total Pages: 282

ISBN-13: 1799886956

DOWNLOAD EBOOK

Developing nations have seen many technological advances in the last decade. Although beneficial and progressive, they can lead to unsafe mobile devices, system networks, and internet of things (IoT) devices, causing security vulnerabilities that can have ripple effects throughout society. While researchers attempt to find solutions, improper implementation and negative uses of technology continue to create new security threats to users. Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security brings together research-based chapters and case studies on systems security techniques and current methods to identify and overcome technological vulnerabilities, emphasizing security issues in developing nations. Focusing on topics such as data privacy and security issues, this book is an essential reference source for researchers, university academics, computing professionals, and upper-level students in developing countries interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.


The Oxford Handbook of Cyberpsychology

The Oxford Handbook of Cyberpsychology

Author: Alison Attrill-Smith

Publisher:

Published: 2019

Total Pages: 779

ISBN-13: 0198812744

DOWNLOAD EBOOK

The internet is so central to everyday life, that it is impossible to contemplate life without it. From finding romance, to conducting business, receiving health advice, shopping, banking, and gaming, the internet opens up a world of possibilities to people across the globe. Yet for all its positive attributes, it is also an environment where we witness the very worst of human behaviour - cybercrime, election interference, fake news, and trolling being just a few examples. What is it about this unique environment that can make people behave in ways they wouldn't contemplate in real life. Understanding the psychological processes underlying and influencing the thinking, interpretation and behaviour associated with this online interconnectivity is the core premise of Cyberpsychology. The Oxford Handbook of Cyberpsychology explores a wide range of cyberpsychological processes and activities through the research and writings of some of the world's leading cyberpsychology experts. The book is divided into eight sections covering topics as varied as online research methods, self-presentation and impression management, technology across the lifespan, interaction and interactivity, online groups and communities, social media, health and technology, video gaming and cybercrime and cybersecurity. The Oxford Handbook of Cyberpsychology will be important reading for those who have only recently discovered the discipline as well as more seasoned cyberpsychology researchers and teachers.


Hacking: The Next Generation

Hacking: The Next Generation

Author: Nitesh Dhanjani

Publisher: "O'Reilly Media, Inc."

Published: 2009-08-29

Total Pages: 299

ISBN-13: 1449379214

DOWNLOAD EBOOK

With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vulnerabilities in wireless technologies and cloud infrastructures. Written by seasoned Internet security professionals, this book helps you understand the motives and psychology of hackers behind these attacks, enabling you to better prepare and defend against them. Learn how "inside out" techniques can poke holes into protected networks Understand the new wave of "blended threats" that take advantage of multiple application vulnerabilities to steal corporate data Recognize weaknesses in today's powerful cloud infrastructures and how they can be exploited Prevent attacks against the mobile workforce and their devices containing valuable data Be aware of attacks via social networking sites to obtain confidential information from executives and their assistants Get case studies that show how several layers of vulnerabilities can be used to compromise multinational corporations


Social Engineering

Social Engineering

Author: Christopher Hadnagy

Publisher: John Wiley & Sons

Published: 2018-06-25

Total Pages: 327

ISBN-13: 1119433754

DOWNLOAD EBOOK

Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire—why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the “system” in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer’s bag of tricks. Examine the most common social engineering tricks used to gain access Discover which popular techniques generally don’t work in the real world Examine how our understanding of the science behind emotions and decisions can be used by social engineers Learn how social engineering factors into some of the biggest recent headlines Learn how to use these skills as a professional social engineer and secure your company Adopt effective counter-measures to keep hackers at bay By working from the social engineer’s playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.