Critical Cybersecurity Threats

Author(s):  
Adel Ismail Al-Alawi ◽  
Sara Abdulrahman Al-Bassam ◽  
Arpita A. Mehrotra

One common reason for cybercrime is the goal of damaging a business by hacking or destroying important information. Another such reason is the criminal's goal of gaining financially from the hack. This chapter analyzes Bahraini organizations' vulnerability to digital security threats. It has used qualitative research to analyze industry performance. Moreover, with the support of secondary research, it has also explored cybersecurity threats faced by such organizations. The discussion based on secondary data analysis has explored two major aspects of Bahraini organizations and the cybersecurity threats they face. Firstly, the data and finances of both sectors are at huge risk in Bahraini organizations. Secondly, one important aspect of exploration has been to identify the most frequently encountered forms of cybercrime. Its analysis reveals that the kind of cybersecurity threat that a business is most likely to face is cyberwarfare. This may affect two rival businesses while they are competing with each other. Competitors' data may be destroyed or hacked—leading to long-term losses.

Author(s):  
Adel Ismail Al-Alawi ◽  
Sara Abdulrahman Al-Bassam ◽  
Arpita A. Mehrotra

One common reason for cybercrime is the goal of damaging a business by hacking or destroying important information. Another such reason is the criminal's goal of gaining financially from the hack. This chapter analyzes Bahraini organizations' vulnerability to digital security threats. It has used qualitative research to analyze industry performance. Moreover, with the support of secondary research, it has also explored cybersecurity threats faced by such organizations. The discussion based on secondary data analysis has explored two major aspects of Bahraini organizations and the cybersecurity threats they face. Firstly, the data and finances of both sectors are at huge risk in Bahraini organizations. Secondly, one important aspect of exploration has been to identify the most frequently encountered forms of cybercrime. Its analysis reveals that the kind of cybersecurity threat that a business is most likely to face is cyberwarfare. This may affect two rival businesses while they are competing with each other. Competitors' data may be destroyed or hacked—leading to long-term losses.


PLoS ONE ◽  
2016 ◽  
Vol 11 (7) ◽  
pp. e0158536 ◽  
Author(s):  
Jan C. Holter ◽  
Thor Ueland ◽  
Jon Norseth ◽  
Cathrine Brunborg ◽  
Stig S. Frøland ◽  
...  

2020 ◽  
Vol 76 (11) ◽  
pp. 2933-2944
Author(s):  
Sarah A. Wu ◽  
Jill Morrison‐Koechl ◽  
Susan E. Slaughter ◽  
Laura E. Middleton ◽  
Natalie Carrier ◽  
...  

2019 ◽  
Vol 3 (Supplement_1) ◽  
pp. S290-S291
Author(s):  
Jeananne Elkins ◽  
Patricia C Griffiths

Abstract Frailty, a reduction in reserve capacity in people who are otherwise considered healthy, affects between 9 and 13% of adults who are older. Frailty is a poorly understood syndrome; however, frailty is correlated with negative CV procedure outcomes, falls and institutionalization. Little is known about frailty in caregivers. A secondary data analysis was conducted using the REACH II publicly available dataset and the Groningen Frailty Index (GFI). At consent two percent of REACH II caregivers had difficulty going to the toilet while 11% had difficulty walking outdoors. More than 1/3 had hearing and vision losses. 75% felt sad or dejected. 82% were taking more than 4 medications. Based on their calculated GFI, between 61% and 64% of the REACH II caregivers were frail. Frail caregivers and their care recipient were less likely to go to the emergency department (-0.110 coefficient; p = 0.004 95% CI -0.184 -0.035) and were less likely to be hospitalized overnight during the past 6 months (-0.121 coefficient; p=0.004; 95% CI -0.203 -0.040). Frailty is an under-recognized syndrome in caregivers. Little is known about the impact of frailty on the caregiving dyad; however, ED utilization and hospitalization was decreased in these caregivers and their care recipients. This decrease may imply a delay in seeking care; and, in fact, lead to worse health outcomes for the dyad. With the aging of Baby Boomers and the continued dependence for long term care delivered by unpaid caregivers, implementation of programs to prevent and treat frailty in caregivers is essential.


2017 ◽  
Vol 2017 ◽  
pp. 1-6 ◽  
Author(s):  
Ilko L. Maier ◽  
Katharina Schregel ◽  
André Karch ◽  
Mark Weber-Krueger ◽  
Rafael T. Mikolajczyk ◽  
...  

Background. Atrial fibrillation (AF) is an important cause of embolic stroke of undetermined source (ESUS). Imaging-patterns like multiple infarcts, simultaneous involvement of different circulations, infarcts of different ages, and isolated cortical infarcts are likely to indicate cardioembolic stroke. The aim of our study was to evaluate the association between embolic stroke patterns, ESUS, and the new diagnosis of AF. Methods. Stroke etiology and imaging characteristics from patients included in the Find-AF study were obtained. Embolic stroke patterns in CT- or MR-imaging were correlated with the diagnosis of ESUS as well as the short- (on baseline ECG and during 7-day Holter) and long-term (12-month follow-up) diagnosis of AF. Results. From 281 patients included in the Find-AF study, 127 (45.2%) patients with ischemic lesions detected in CT or MRI were included. 26 (20.5%) of these patients had ESUS. At least one embolic stroke pattern was detected in 67 (52.7%) patients. Embolic stroke patterns were not associated with ESUS (OR 1.57, 0.65–3.79, p=0.317), the short-term (OR 0.64, 0.26–1.58, p=0.327) or long-term diagnosis of AF (OR 0.72, 0.31–1.68, p=0.448). Conclusions. This secondary data analysis of the Find-AF study could not provide evidence for an association between embolic stroke patterns, ESUS, and the new diagnosis of AF.


Sign in / Sign up

Export Citation Format

Share Document