Battlefield Cyberspace

Author(s):  
Maurice Dawson ◽  
Marwan Omar ◽  
Jonathan Abramson ◽  
Brian Leonard ◽  
Dustin Bessette

The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.

2018 ◽  
pp. 1553-1584
Author(s):  
Maurice Dawson ◽  
Marwan Omar ◽  
Jonathan Abramson ◽  
Brian Leonard ◽  
Dustin Bessette

The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.


2019 ◽  
pp. 1666-1696
Author(s):  
Maurice Dawson ◽  
Marwan Omar ◽  
Jonathan Abramson ◽  
Dustin Bessette

Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality. Further reviewed are some examples of the complex attacks that could interrupt human-robot interaction, children-computer interaction, mobile computing, social networks, and human-centered issues in security design.


Author(s):  
Maurice Dawson ◽  
Marwan Omar ◽  
Jonathan Abramson ◽  
Dustin Bessette

Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality. Further reviewed are some examples of the complex attacks that could interrupt human-robot interaction, children-computer interaction, mobile computing, social networks, and human-centered issues in security design.


Author(s):  
Pratik Shah ◽  
Vansh Damania ◽  
Hitansh Kadakia

As we all know nowadays everything is connected to the internet. Bits and bytes flow freely from one country to another country without any border guards. Technology progress has helped our world in many ways, but there are always two sides to everything. where there are good things. there are bad things also. In today’s society, we spend the majority of our time online, be it doing business, paying bills, making friends, selling cars, or purchasing a home, from applying to college to finding a life partner. Today’s criminals are taking the advantage of technology for crimes. The most often asked question is “What is the next big crime?” the answer in this paper. We covered some worst scenarios/cybercrimes you’ve never thought of. Before you begin with this paper, let us first tell you what this paper is not. It is not a guide on how to hack someone’s social media accounts, mobile devices, etc., or how to prevent yourself from hackers or cybercriminals. Yes, we covered some prevention techniques but, in the end, it all depends on you. This paper isn’t just what was going on yesterday or even what Is happening today. It is about where we are going tomorrow. This research paper throws light on the field of cybercrimes which are usually people don’t know.


2018 ◽  
Vol 4 (2) ◽  
pp. 85-95 ◽  
Author(s):  
Justyna Masłyk

Abstract The main purpose of this article is to present the results of research concerning the use of social media by companies from the SME sector in Podkarpackie Province. The article includes data obtained in the first stage of the study, which is a part of a research project on the use of social media in the area of creating the image of an organization / company as an employer.The survey covered the entire population of companies from the SME sector, which are registered in Podkarpackie Province (REGON database). The research phase, the results of which are presented in this article, mainly involved the analysis of data on companies from the SME sector in Podkarpackie Province in terms of their presence on the Internet (having an individual website, having company profiles on selected social networks). The results of the first stage of the study confirm that the companies see the potential of the online presence / functioning in social media (more and more companies have their own website, Facebook profiles). The dynamics of changes in this area is definitely not adequate to the pace of new media development. On the basis of preliminary results of further stages of the research, it can also be concluded that in the vast majority of cases, however, these are non-strategic and non-systematic activities.


Author(s):  
Э.Д. Алисултанова ◽  
Л.К. Хаджиева ◽  
М.З. Исаева

Данная статья посвящена созданию профориентационной (умной) лаборатории, которая призвана сформировать у школьников базовые представления о технологии Интернет вещей (IoT), угрозах кибербезопасности в этой сфере, мотивировать к получению в будущем профильного образования и построению карьеры в области обеспечения безопасности Интернет вещей (IoT) при функционировании умного производства. Обучение школьников в профориентационной лаборатории, построенное на основе применения интерактивных электронных образовательных ресурсов, прежде всего будет позиционировать карьерные возможности будущих специалистов в сфере обеспечения безопасности Интернет вещей (IoT) при функционировании умного производства. В рамках функционирования лаборатории особое внимание обучающихся сконцентрировано на тематиках правовых аспектов обеспечения кибербезопасности, главных тенденциях развития киберугроз в современном глобальном информационном пространстве и мерах, необходимых для их нейтрализации. This article is devoted to the creation of a career-oriented (smart) laboratory, which is designed to formulate in schoolchildren basic ideas about the Internet of Things (IoT) technology, cyber security threats in this area, motivate to receive specialized education in the future and build a career in the field of Internet things (IoT) security) with the functioning of smart manufacturing. The training of schoolchildren in a vocational guidance laboratory, based on the use of interactive electronic educational resources, will primarily position the career opportunities of future specialists in the field of Internet of Things (IoT) security in the operation of smart manufacturing. Within the framework of the functioning of the laboratory, special attention of students is concentrated on the topics of the legal aspects of ensuring cyber security, the main trends in the development of cyber threats in the modern global information space and the measures necessary to neutralize them.


2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Dylan Rafferty ◽  
Kevin Curran

Cyber security breaches are on the rise globally. Due to the introduction of legislation like the EU’s General Data Protection Regulation (GDPR), companies are now subject to further financial penalties if they fail to meet requirements in protecting user information.  In 2018, 75% of CEOs and board members considered cyber security and technology acquisitions among their top priorities, and blockchain based solutions were among the most considered options. Blockchain is a decentralised structure that offers multiple security benefits over traditional, centralised network architectures. These two approaches are compared in this chapter in areas such as data storage, the Internet of Things (IoT) and Domain Name System (DNS) in order to determine blockchain’s potential in the future of cyber security.


Author(s):  
Charlie E. Cabotaje ◽  
Erwin A. Alampay

Increased access and the convenience of participation to and through the internet encourage connectivity among citizens. These new and enhanced connections are no longer dependent on real-life, face-to-face interactions, and are less restricted by the boundaries of time and space (Frissen, 2005). In this chapter, two cases from the Philippines are documented and assessed in order to look at online citizen engagement. The first case looks at how people participate in promoting tourism in the Philippines through social media. The second case involves their use of social media for disaster response. Previous studies on ICTs and participation in the Philippines have looked at the role of intermediaries (see Alampay, 2002). Since then, the role of social media, in particular that of Facebook and Twitter, has grown dramatically and at times completely circumvents traditional notions of intermediation. The role of Facebook, in particular, will be highlighted in this chapter, and the authors will analyze its effectiveness, vis-à-vis traditional government channels for communication and delivery of similar services. By looking at these two cases and assessing the abovementioned aspects, it is hoped that the use of social media can be seen as an integral part of e-governance especially in engaging citizens to participate in local and national governance.


Author(s):  
Atzimba Baltazar Macías

The chapter aims at understanding a recent phenomenon in Mexican politics: the use of Internet and social media as a new and powerful resource for mobilization and social participation in the policy process. Based on a review of two recent movements in Mexico (#YoSoy132 and The Wirikuta Defense Front), the chapter argues that although the Internet is still restricted to the middle and upper classes, the use of social media and its impact transcends class boundaries, draws public attention, creates a valuable social capital for mobilization, and influences the decision-making process. The chapter does not intend to provide evidence to the theoretical discussion on why and how social media enhances political participation and mobilization; rather, it reflects the features shared by these two movements in order to draw some lines for further research. It finds that, if used appropriately, social media is actually an effective tool to facilitate mobilization and modify the public agenda.


Author(s):  
Ahmet Sarıtaş ◽  
Elif Esra Aydın

Today, using of the internet extended social media by individuals habitually enables both the business firms and politicians to reach their target mass at any time. In this context, internet has become a popular place recently where political communication and campaigns are realized by ensuring a new dimension to political campaigns. When we examine the posts and discussions in the social media, we can say that they are converted into open political sessions. As there are no censorship in such channels, individuals have a freedom to reach to any partial/impartial information and obtain transparent and fast feedback, and with this regard, political parties, leaders and candidates have a chance to be closer to electors. In this study, it is aimed to give information about the social media, present what medium has been used for election campaigns from the past until today and besides, by considering the effects of effective and efficient use of social media and new trends related to the internet by politicians, together with their applications in the world, to make suggestions about its situation and application in Turkey.


Sign in / Sign up

Export Citation Format

Share Document