Digital earth : cyber threats, privacy and ethics in an age of paranoia /
An accessible introduction to the most prevalent cyber threats in our current climate, this book discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate such threats in our personal and professional lives.
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Cambridge, United Kingdom :
IT Governance Publishing,
2022.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover
- Title
- Copyright
- About the author
- Acknowledgements
- Contents
- Introduction
- Chapter one: The spike in phishing amid the COVID-19 pandemic
- Key terms for this chapter
- Chaos theory in cyber threat mitigation
- The application of chaos theory to the assessment of phishing attacks
- Chapter two: A glance at the history of phishing mitigation practices
- The risk of phishing to federal health care agencies
- Applications of chaos theory in cyber threat mitigation, including phishing attacks
- Machine learning tools for phishing prevention
- Persuasive factors used in phishing attacks
- User awareness of email legitimacy verification techniques
- Chapter three: The hard truth
- How little many users understand about identifying malicious emails
- Tackling email headers
- Next steps: Computer- assisted threat detection
- Chapter four: Disinformation versus misinformation in a post-COVID world
- Global information sharing
- Content moderators
- How to spot misinformation
- Managing content moderation: In theory and practice
- Next steps: Head above water in cyberspace
- Chapter five: Cyber terrorism and the firepower of social media
- Why convey a message to the masses?
- Making it look alluring
- Using social media to attract and recruit
- Next steps: Keep an eye on that friend request
- Chapter six: Drones
- A search and rescue solution or the all-seeing eye in the sky?
- The technicalities of civilian privacy in UAV criminal investigation
- San Jose as a case study
- Those opposed
- Those in favor
- Calming the public outcry
- Balancing technological surveillance measures with public interest
- Next steps: Securing the wireless target
- Recent developments
- Chapter seven: Tying it all together
- Appendix A: Bibliography
- Further reading