CyberWar, CyberTerror, CyberCrime and CyberActivism

CyberWar, CyberTerror, CyberCrime and CyberActivism

Author: Julie Mehan

Publisher: IT Governance Publishing

Published: 2014-05-08

Total Pages: 352

ISBN-13: 1849285713

DOWNLOAD EBOOK

This book encourages cybersecurity professionals to take a wider view of what cybersecurity means, and to exploit international standards and best practice to create a culture of cybersecurity awareness within their organization that supplements technology-based defenses.


Cyberwar, Cyberterror, Cybercrime

Cyberwar, Cyberterror, Cybercrime

Author: Julie E. Mehan

Publisher: IT Governance Ltd

Published: 2009

Total Pages: 284

ISBN-13: 190535648X

DOWNLOAD EBOOK

CyberWar, CyberTerror, CyberCrime provides a stark and timely analysis of the increasingly hostile online landscape that today's corporate systems inhabit, and gives a practical introduction to the defensive strategies that can be employed in response.


Digital Earth - Cyber threats, privacy and ethics in an age of paranoia

Digital Earth - Cyber threats, privacy and ethics in an age of paranoia

Author: Sarah Katz

Publisher: IT Governance Ltd

Published: 2022-04-28

Total Pages: 108

ISBN-13: 178778360X

DOWNLOAD EBOOK

An accessible introduction to the most prevalent cyber threats in our current climate, this book discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate such threats in our personal and professional lives.


How Cyber Security Can Protect Your Business

How Cyber Security Can Protect Your Business

Author: Christopher Wright

Publisher: IT Governance Publishing Ltd

Published: 2019-11-26

Total Pages: 68

ISBN-13: 1787781976

DOWNLOAD EBOOK

How Cyber Security Can Protect your Business – A guide for all stakeholders provides an effective and efficient framework for managing cyber governance, risk and compliance, which organisations can adapt to meet their own risk appetite and synchronise with their people, processes and technology.


Cyber Espionage and International Law

Cyber Espionage and International Law

Author: Russell Buchan

Publisher: Bloomsbury Publishing

Published: 2018-12-27

Total Pages: 249

ISBN-13: 1782257357

DOWNLOAD EBOOK

The advent of cyberspace has led to a dramatic increase in state-sponsored political and economic espionage. This monograph argues that these practices represent a threat to the maintenance of international peace and security and assesses the extent to which international law regulates this conduct. The traditional view among international legal scholars is that, in the absence of direct and specific international law on the topic of espionage, cyber espionage constitutes an extra-legal activity that is unconstrained by international law. This monograph challenges that assumption and reveals that there are general principles of international law as well as specialised international legal regimes that indirectly regulate cyber espionage. In terms of general principles of international law, this monograph explores how the rules of territorial sovereignty, non-intervention and the non-use of force apply to cyber espionage. In relation to specialised regimes, this monograph investigates the role of diplomatic and consular law, international human rights law and the law of the World Trade Organization in addressing cyber espionage. This monograph also examines whether developments in customary international law have carved out espionage exceptions to those international legal rules that otherwise prohibit cyber espionage as well as considering whether the doctrines of self-defence and necessity can be invoked to justify cyber espionage. Notwithstanding the applicability of international law, this monograph concludes that policymakers should nevertheless devise an international law of espionage which, as lex specialis, contains rules that are specifically designed to confront the growing threat posed by cyber espionage.


Cyber Security: Analytics, Technology and Automation

Cyber Security: Analytics, Technology and Automation

Author: Martti Lehto

Publisher: Springer

Published: 2015-05-30

Total Pages: 268

ISBN-13: 3319183028

DOWNLOAD EBOOK

The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.


National Security: Breakthroughs in Research and Practice

National Security: Breakthroughs in Research and Practice

Author: Management Association, Information Resources

Publisher: IGI Global

Published: 2019-02-01

Total Pages: 944

ISBN-13: 1522579133

DOWNLOAD EBOOK

The tactical organization and protection of resources is a vital component for any governmental entity. Effectively managing national security through various networks ensures the highest level of protection and defense for citizens and classified information. National Security: Breakthroughs in Research and Practice is an authoritative resource for the latest research on the multiple dimensions of national security, including the political, physical, economic, ecological, and computational dimensions. Highlighting a range of pertinent topics such as data breaches, surveillance, and threat detection, this publication is an ideal reference source for government officials, law enforcement, professionals, researchers, IT professionals, academicians, and graduate-level students seeking current research on the various aspects of national security.


Artificial Intelligence - Ethical, social, and security impacts for the present and the future, Second edition

Artificial Intelligence - Ethical, social, and security impacts for the present and the future, Second edition

Author: Julie Mehan

Publisher: IT Governance Ltd

Published: 2024-08-08

Total Pages: 409

ISBN-13: 1787785130

DOWNLOAD EBOOK

A global perspective on AI The rise of AI and super-intelligent AI raises ethical issues. AI is the power behind Google’s search engine, enables social media sites to serve up targeted advertising, gives Alexa and Siri their voices, and enables OpenAI’s ChatGPT to produce written responses from just a few prompts by the user. It is also the technology enabling self-driving vehicles, predictive policing, and autonomous weapons that can kill without direct human intervention. All of these bring up complex ethical issues that are still unresolved and will continue to be the subject of ongoing debate. This book: Explores the complex topic of AI ethics in a cross-functional way; Enables understanding of the associated ethical challenges of AI technologies; Provides an up-to-date overview of the potential positive and negative outcomes of AI implementations; and Has been updated to reflect the ethical challenges of AI in 2024 and beyond, and the moral imperative of navigating this new terrain. This book presents a concrete approach to identifying appropriate ethical principles in AI solutions AI is much more than just a simple tool powering our smartphones or allowing us to ask Alexa about the latest cinema times. It is a technology that is, in very subtle but unmistakable ways, exerting an ever-increasing influence over our lives – and the more we use it, the more AI is altering our existence. This book presents a concrete approach to identifying appropriate ethical principles in AI solutions. There are untold how-to books on AI technology, replete with methods to improve and advance the statistics and algorithms of AI; however, the social, ethical and security impacts are often a secondary consideration – if they are discussed at all. This book explores the complex topic of AI ethics in a cross-functional way, alternating between theory and practice. Practical and recent events, and their associated challenges, are presented, such as the collateral effects of the COVID-19 pandemic on the application of AI technologies. The book also gives an up-to-date overview of the potential positive and negative outcomes of AI implementations together with an analysis of AI from an ethical perspective. Before you dive into a world populated with AI, read this book to understand the associated ethical challenges of AI technologies.


Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM

Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM

Author: Sabillon, Regner

Publisher: IGI Global

Published: 2020-08-07

Total Pages: 260

ISBN-13: 1799841634

DOWNLOAD EBOOK

With the continued progression of technologies such as mobile computing and the internet of things (IoT), cybersecurity has swiftly risen to a prominent field of global interest. This has led to cyberattacks and cybercrime becoming much more sophisticated to a point where cybersecurity can no longer be the exclusive responsibility of an organization’s information technology (IT) unit. Cyber warfare is becoming a national issue and causing various governments to reevaluate the current defense strategies they have in place. Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM provides emerging research exploring the practical aspects of reassessing current cybersecurity measures within organizations and international governments and improving upon them using audit and awareness training models, specifically the Cybersecurity Audit Model (CSAM) and the Cybersecurity Awareness Training Model (CATRAM). The book presents multi-case studies on the development and validation of these models and frameworks and analyzes their implementation and ability to sustain and audit national cybersecurity strategies. Featuring coverage on a broad range of topics such as forensic analysis, digital evidence, and incident management, this book is ideally designed for researchers, developers, policymakers, government officials, strategists, security professionals, educators, security analysts, auditors, and students seeking current research on developing training models within cybersecurity management and awareness.