Cargando…

Digital earth : cyber threats, privacy and ethics in an age of paranoia /

An accessible introduction to the most prevalent cyber threats in our current climate, this book discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate such threats in our personal and professional lives.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Katz, Sarah (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cambridge, United Kingdom : IT Governance Publishing, 2022.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ii 4500
001 JSTOR_on1313074265
003 OCoLC
005 20231005004200.0
006 m o d
007 cr cnu---unuuu
008 220429s2022 enk ob 000 0 eng d
040 |a YDX  |b eng  |e rda  |c YDX  |d JSTOR  |d EBLCP  |d OCLCO  |d OCLCF  |d YDXIT  |d OCLCQ  |d OCLCO 
020 |a 9781787783607  |q electronic book 
020 |a 178778360X  |q electronic book 
029 1 |a AU@  |b 000071968265 
035 |a (OCoLC)1313074265 
037 |a 22573/ctv2dz82bs  |b JSTOR 
050 4 |a QA76.9.A25  |b K38 2022 
082 0 4 |a 005.8  |2 23/eng/20220502 
049 |a UAMI 
100 1 |a Katz, Sarah,  |e author. 
245 1 0 |a Digital earth :  |b cyber threats, privacy and ethics in an age of paranoia /  |c Sarah Katz. 
264 1 |a Cambridge, United Kingdom :  |b IT Governance Publishing,  |c 2022. 
300 |a 1 online resource (108 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references. 
520 |a An accessible introduction to the most prevalent cyber threats in our current climate, this book discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate such threats in our personal and professional lives. 
505 0 |a Cover -- Title -- Copyright -- About the author -- Acknowledgements -- Contents -- Introduction -- Chapter one: The spike in phishing amid the COVID-19 pandemic -- Key terms for this chapter -- Chaos theory in cyber threat mitigation -- The application of chaos theory to the assessment of phishing attacks -- Chapter two: A glance at the history of phishing mitigation practices -- The risk of phishing to federal health care agencies -- Applications of chaos theory in cyber threat mitigation, including phishing attacks -- Machine learning tools for phishing prevention 
505 8 |a Persuasive factors used in phishing attacks -- User awareness of email legitimacy verification techniques -- Chapter three: The hard truth -- How little many users understand about identifying malicious emails -- Tackling email headers -- Next steps: Computer- assisted threat detection -- Chapter four: Disinformation versus misinformation in a post-COVID world -- Global information sharing -- Content moderators -- How to spot misinformation -- Managing content moderation: In theory and practice -- Next steps: Head above water in cyberspace 
505 8 |a Chapter five: Cyber terrorism and the firepower of social media -- Why convey a message to the masses? -- Making it look alluring -- Using social media to attract and recruit -- Next steps: Keep an eye on that friend request -- Chapter six: Drones -- A search and rescue solution or the all-seeing eye in the sky? -- The technicalities of civilian privacy in UAV criminal investigation -- San Jose as a case study -- Those opposed -- Those in favor -- Calming the public outcry -- Balancing technological surveillance measures with public interest -- Next steps: Securing the wireless target 
505 8 |a Recent developments -- Chapter seven: Tying it all together -- Appendix A: Bibliography -- Further reading 
588 |a Description based on online resource; title from digital title page (viewed on August 22, 2022). 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
590 |a JSTOR  |b Books at JSTOR All Purchased 
650 0 |a Computer security. 
650 0 |a Computer crimes  |x Prevention. 
650 0 |a Data protection. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a Computer crimes  |x Prevention  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Data protection  |2 fast 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.2307/j.ctv2dzzqm2  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6961991 
938 |a YBP Library Services  |b YANK  |n 302858793 
994 |a 92  |b IZTAP