Human Factors of Social Engineering Attacks (SEAs) in Hybrid Cloud Environment: Threats and Risks

Author(s):  
Reza Alavi ◽  
Shareeful Islam ◽  
Haris Mouratidis
2021 ◽  
pp. 1-12
Author(s):  
Yassine Jebbar ◽  
Nattakorn Promwongsa ◽  
Fatna Belqasmi ◽  
Roch H. Glitho

Author(s):  
Belbergui Chaimaa ◽  
Elkamoun Najib ◽  
Hilal Rachid

Author(s):  
Jason R. C. Nurse

Cybercrime is a significant challenge to society, but it can be particularly harmful to the individuals who become victims. This chapter engages in a comprehensive and topical analysis of the cybercrimes that target individuals. It also examines the motivation of criminals that perpetrate such attacks and the key human factors and psychological aspects that help to make cybercriminals successful. Key areas assessed include social engineering (e.g., phishing, romance scams, catfishing), online harassment (e.g., cyberbullying, trolling, revenge porn, hate crimes), identity-related crimes (e.g., identity theft, doxing), hacking (e.g., malware, cryptojacking, account hacking), and denial-of-service crimes. As a part of its contribution, the chapter introduces a summary taxonomy of cybercrimes against individuals and a case for why they will continue to occur if concerted interdisciplinary efforts are not pursued.


Sci ◽  
2020 ◽  
Vol 2 (2) ◽  
pp. 22
Author(s):  
Miriam Kelly ◽  
Eoghan Furey ◽  
Kevin Curran

On 25 May 2018, the General Data Protection Regulation (GDPR)Article 17, the Right to Erasure (‘Right to be Forgotten’) came into force making it vital for organisations to identify, locate and delete all Personally Identifiable Information (PII) where a valid request is received from a data subject to erase their PII and the contractual period has expired. This must be done without undue delay and the organisation must be able to demonstrate reasonable measures were taken. Failure to comply may incur significant fines, not to mention impact to reputation. Many organisations do not understand their data, and the complexity of a hybrid cloud infrastructure means they do not have the resources to undertake this task. The variety of available tools are quite often unsuitable as they involve restructuring so there is one centralised data repository. This research aims to demonstrate compliance with GDPR’s Article 17 Right to Erasure (‘Right to be Forgotten’) is achievable in a Hybrid cloud environment by following a list of recommendations. However, 100% retrieval, 100% of time will not be possible, but we show that small organisations running an ad-hoc Hybrid cloud environment can demonstrate that reasonable measures were taken to be Right to Erasure (‘Right to be Forgotten’) compliant.


Sign in / Sign up

Export Citation Format

Share Document