Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution - Advances in Information Security, Privacy, and Ethics
Latest Publications


TOTAL DOCUMENTS

20
(FIVE YEARS 0)

H-INDEX

1
(FIVE YEARS 0)

Published By IGI Global

9781522547631, 9781522547648

Author(s):  
Peter Beaumont

This chapter presents a case study of automated maritime container terminals (CTs). It has the aim of demonstrating that the risks derived from the use of technology associated with the Fourth Industrial Revolution (4IR) are both real and dangerous. The work explains the critical function of CTs in the global supply chain and outlines the economic and social consequences that could result if their operations were to be disrupted. The motivations of a range of threat-actors are presented, and it is established that there are feasible scenarios in which any one of the major threat-actor categories may wish to cause disruption at CTs. The vulnerabilities of yard cranes are investigated, and it is concluded that there are likely to be exploitable vulnerabilities in the industrial control system (ICS) networks used on these cranes. The chapter argues that many CT operations are likely to be exposed to significant cyber-based risks and that this exposure will increase with the roll-out of further 4IR technologies unless appropriate control measures are implemented.


Author(s):  
Suchinthi Fernando

This chapter discusses the importance of information security education for everyone, ranging from organizations to professionals and students, all the way through to individual users of information and communication systems. It discusses the different subject areas in information security and shows how instead of being intimidated by it, different categories of users can obtain varying depths of information security education based on their cyber-activities and need for knowledge. Information security professionals would require an in-depth knowledge in all aspects of information security, and information technology professionals and students would require an overall education in these areas, while most users of information and communication systems would only require a basic education to help protect their information assets in cyberspace.


Author(s):  
John Gyang Chaka ◽  
Mudaray Marimuthu

Cloud computing enables end users to make use of third party's resources to support their computing needs. The services offered by cloud computing make the technology very critical to the fourth industrial revolution. The benefits include cost minimization, scalability of services, speed, integration and higher data management, low innovation risk, and quicker response to organizational needs, among others. However, these benefits have been threatened by a number of security threats. This chapter seeks to curtail the effects of these threats by enlightening and educating users on the current ways to mitigate them. The chapter first defines cloud computing and highlights its relevance or benefits to businesses in the fourth industrial revolution. In addition, various security threats that are associated with cloud computing are brought to the fore. Thereafter, various measures that are used to mitigate the threats are discussed. The chapter concludes that with adequate enlightenment, the full benefits of cloud computing in industry 4.0 would be better enjoyed by users.


Author(s):  
Paul Kariuki

It is critical that cyber education curriculum considers the growing cyber technologies and which aspects of these technologies need to be aligned with the fourth industrial revolution. This chapter seeks to present a comprehensive analysis of the current level of cyber security education in South Africa. It will also track the current trends of cyber security education in the country as well as examining any challenges being experienced including any knowledge gaps. In the end, the chapter proposes recommendations for consideration in strengthening cybersecurity education in the country in to achieve advanced cyber security responses, capable of mitigating any cyber security threats. Offering quality cyber security education is important in preparing the next generation cyber security practitioners, who are highly competent and capable of developing innovative solutions in response to the growing global demand of cyber technologies. The chapter ends by proposing specific strategies that can guide towards this ideal in the context of the fourth industrial revolution.


Author(s):  
Thokozani Ian Nzimakwe

Cybersecurity is the practice of making the networks that constitute cyber space secure against intrusions. The aim is to maintain the confidentiality, the availability and integrity of information, by detecting interferences. Traditionally, cybersecurity has focused on preventing intrusions and monitoring ports. The evolving threat landscape, however, calls for a more dynamic approach. It is increasingly clear that total cybersecurity is impossible, unless government develops a cyber-security strategy. The aim of this chapter is to discuss government's dynamic approach to addressing challenges of cybersecurity. The chapter looks at the co-ordination of cyber-security activities so as to have a coordinated approach to cyber-crime. This chapter also highlights the idea of protecting sensitive data for the public good. It is generally accepted that technology has become indispensable in modern society. Government's cybersecurity presents a unique challenge simply because of the volume of threats that agencies working for government face on a daily basis.


Author(s):  
Maximiliano Emanuel Korstanje ◽  
Adrian Scribano ◽  
Freddy Alex Timmermann

While a lot of studies focus on the contours of cybercrime and cyber terrorism as well as their effects in daily lives, less attention has been given to the use of ICT by terrorists. In fact, through the ebbs and flows of technology, the society of information seems to develop a particular vulnerability to the fear instilled by terrorism. This particularly reveals a paradox because the original technology, which was oriented to make of our lives safer, is used by terrorist cells to inspire a terror-driven atmosphere, which only nourishes intolerance and ethnocentrism. The authors, in this review chapter, discuss critically the cutting-edge role of technology in the struggle against terrorism.


Author(s):  
Stephen Mugisha Akandwanaho ◽  
Irene Govender

A generic self-evolving multi-agent approach is proposed in this chapter. Most of the existing security approaches are custom designed for specific threats and attacks. However, the fusion of technologies and systems in the fourth industrial revolution and therefore the nature of its current cyber environment increasingly attracts multiple cyber threats in a single interface. In order to solve this problem, a generic self-evolving multi-agent approach is proposed. Multiple agents interact with each other in light of their reactions towards the environment and its inherent changes. Information from individual agents is collected and integrated to form the abstract compartment of the structure. The important aspects are analyzed including demonstrating how the abstract domain can be obtained from the custom interactions at the low-level domain of the proposed approach. The analysis explores the existing works in the area and how they have been advanced in the fourth industrial revolution.


Author(s):  
Rajashree Chaurasia

“Ransomware” is a type of malware that tries to extort money from its victims by hijacking the victim's computer in some way and holding it to ransom. It renders the computer unusable until a ransom amount is paid to the extortionist. And it is very unfortunate that, in many cases, even after the ransom is paid, the victim's computer is not released. Ransomware, as we know it, is gaining popularity at an immense rate among the most notorious cyber-criminals of the world. It isn't just a virus, it's a damned good game plan to becoming a millionaire in a matter of months! This chapter details what ransomware is, how it originated, which families of attacks it falls under, how ransomware is classified, the impact of ransomware on a global scale, the life cycle of a typical ransomware attack, mitigation and containment strategies, trending strains of 2017, and future trends in ransomware attacks. In future, these attack types will dominate our industries and wreak havoc, destroying life and property, if left unchecked.


Author(s):  
Jhaharha Lackram ◽  
Indira Padayachee

Social engineering refers to the art of using deception and manipulating individuals to gain access to systems or information assets and subsequently compromising these systems and information assets. Information security must provide protection to the confidentiality, integrity, and availability of information. In order to mitigate information security's weakest link, it becomes necessary to understand the ways in which human behavior can be exploited via social engineering. This chapter will seek to analyze the role of social engineering in information security breaches and the factors that contribute to its success. A variety of social engineering attacks, impacts, and mitigations will be discussed. Human factors such as trust, obedience, and fear are easily exploited, thereby allowing social engineers to execute successful attacks. However, with effective countermeasures such as information security awareness training, education, and audit procedures, the impacts of social engineering can be decreased or eliminated altogether.


Author(s):  
Thea Van der Westhuizen ◽  
Thakur Singh

Cybersecurity and security mechanisms of mobile device play an important part in product development, but are not often a top priority when customers select their favorite brand. A key factor that has been ignored as a result of the rapid pace of the market is that of youth brand loyalty. Brand loyalty remains one of the key factors in global markets that determine core consumers and security concerns feature became less important. This chapter aims to ascertain the key factors of brand loyalty and measure what consumers base their decision on whilst selecting a brand. The chapter will look at social value, emotional value, functional value, involvement, and perceived value of the consumer to the brand. Based on quantitative results, a conclusion will be drawn on what the key factors of brand loyalty are. Recommendations will be made on how mobile brand companies can use these KSFs when developing new products in order to procure more loyal consumers, as well as to increase awareness of the importance of the security features of the device when making a choice to purchase a brand.


Sign in / Sign up

Export Citation Format

Share Document