Digital Earth  
Published by IT Governance Publishing
Publication Date:  Available in all formats
ISBN: 9781787783614
Pages: 0

EBOOK (EPUB)

EBOOK (PDF)

ISBN: 9781787783614 Price: INR 1674.75
Add to cart Buy Now
Digital Earth – Cyber threats, privacy and ethics in an age of paranoia Whether it’s the next big ransomware attack or cyber terrorism, digital threats have evolved drastically in recent years. Issues surrounding phishing, misinformation, cyber terrorism, physical security, and privacy continue to arise for both individual users and large enterprises. With technology an intrinsic part of our everyday lives, we need to be aware of digital threats, and be able to identify other threats such as phishing, ransomware, and spyware before they can wreak havoc in our professional or personal lives. This book discusses the most prevalent technological threats that we face today. It is an accessible guide that highlights the most common cyber attacks, and explores data ethics and privacy in an age where we hold so much of our PII (personally identifiable information) online. It covers cyber threats such as phishing, disinformation versus misinformation in a post-COVID-19 world, cyber terrorism, and the power of social media, and analyzes ever-evolving privacy concerns in response to technological advances. For example, does the use of drones by law enforcement offer us complete security or raise questions around the privacy of citizens? The book focuses on: The spike in phishing amid the COVID-19 pandemic Cyber terrorism The risks associated with social media Whether drones are a search-and-rescue solution or the all-seeing eye in the sky
Rating
Description
Digital Earth – Cyber threats, privacy and ethics in an age of paranoia Whether it’s the next big ransomware attack or cyber terrorism, digital threats have evolved drastically in recent years. Issues surrounding phishing, misinformation, cyber terrorism, physical security, and privacy continue to arise for both individual users and large enterprises. With technology an intrinsic part of our everyday lives, we need to be aware of digital threats, and be able to identify other threats such as phishing, ransomware, and spyware before they can wreak havoc in our professional or personal lives. This book discusses the most prevalent technological threats that we face today. It is an accessible guide that highlights the most common cyber attacks, and explores data ethics and privacy in an age where we hold so much of our PII (personally identifiable information) online. It covers cyber threats such as phishing, disinformation versus misinformation in a post-COVID-19 world, cyber terrorism, and the power of social media, and analyzes ever-evolving privacy concerns in response to technological advances. For example, does the use of drones by law enforcement offer us complete security or raise questions around the privacy of citizens? The book focuses on: The spike in phishing amid the COVID-19 pandemic Cyber terrorism The risks associated with social media Whether drones are a search-and-rescue solution or the all-seeing eye in the sky
Table of contents
  • Cover
  • Title
  • Copyright
  • Contents
  • Introduction
  • Chapter one: The spike in phishing amid the COVID-19 pandemic
    • Key terms for this chapter
    • Chaos theory in cyber threat mitigation
    • The application of chaos theory to the assessment of phishing attacks
  • Chapter two: A glance at the history of phishing mitigation practices
    • The risk of phishing to federal health care agencies
    • Applications of chaos theory in cyber threat mitigation, including phishing attacks
    • Machine learning tools for phishing prevention
    • Persuasive factors used in phishing attacks
    • User awareness of email legitimacy verification techniques
  • Chapter three: The hard truth – How little many users understand about identifying malicious emails
    • Tackling email headers
    • Next steps: Computer-assisted threat detection
  • Chapter four: Disinformation versus misinformation in a post-COVID world
    • Global information sharing
    • Content moderators
    • How to spot misinformation
    • Managing content moderation: In theory and practice
    • Next steps: Head above water in cyberspace
  • Chapter five: Cyber terrorism and the firepower of social media
    • Why convey a message to the masses?
    • Making it look alluring
    • Using social media to attract and recruit
    • Next steps: Keep an eye on that friend request
  • Chapter six: Drones – A search and rescue solution or the all-seeing eye in the sky?
    • The technicalities of civilian privacy in UAV criminal investigation
    • San Jose as a case study
    • Those opposed
    • Those in favor
    • Calming the public outcry
    • Balancing technological surveillance measures with public interest
    • Next steps: Securing the wireless target
    • Recent developments
  • Chapter seven: Tying it all together
  • Appendix A: Bibliography
  • Further reading
User Reviews
Rating